{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:38:38Z","timestamp":1759333118710,"version":"3.41.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T00:00:00Z","timestamp":1746576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T00:00:00Z","timestamp":1746576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11334-025-00609-1","type":"journal-article","created":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T02:01:34Z","timestamp":1746583294000},"page":"437-451","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Feasibility of quantum-safe digital signature algorithms on cloud virtual machines"],"prefix":"10.1007","volume":"21","author":[{"given":"Hanan","family":"Khaled","sequence":"first","affiliation":[]},{"given":"Sherif","family":"M. Saif","sequence":"additional","affiliation":[]},{"given":"Salwa","family":"M. Nassar","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Taher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,7]]},"reference":[{"key":"609_CR1","doi-asserted-by":"publisher","DOI":"10.1116\/5.0022519","author":"K Longmate","year":"2020","unstructured":"Longmate K, Ball EM, Dable-Heath E, Young RJ (2020) Signing information in the quantum era. AVS Quantum Sci. https:\/\/doi.org\/10.1116\/5.0022519","journal-title":"AVS Quantum Sci"},{"key":"609_CR2","doi-asserted-by":"crossref","unstructured":"Dwivedi A, Saini GK, Musa UI et al. (2023) Cybersecurity and prevention in the quantum era. In 2023 2nd international conference for innovation in technology (INOCON) (IEEE), pp 1\u20136","DOI":"10.1109\/INOCON57975.2023.10101186"},{"issue":"7909","key":"609_CR3","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","volume":"605","author":"D Joseph","year":"2022","unstructured":"Joseph D, Misoczki R, Manzano M, Tricot J, Pinuaga FD, Lacombe O, Leichenauer S, Hidary J, Venables P, Hansen R (2022) Transitioning organizations to post-quantum cryptography. Nature 605(7909):237\u2013243. https:\/\/doi.org\/10.1038\/s41586-022-04623-2","journal-title":"Nature"},{"key":"609_CR4","doi-asserted-by":"publisher","unstructured":"Kaiiali M, Sezer S, Khalid A (2019) Cloud computing in the quantum era. In 2019 IEEE conference on communications and network security (CNS), (IEEE). https:\/\/doi.org\/10.1109\/cns44998.2019.8952589","DOI":"10.1109\/cns44998.2019.8952589"},{"issue":"3","key":"609_CR5","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1147\/sj.1976.5388091","volume":"15","author":"JJ Donovan","year":"1976","unstructured":"Donovan JJ, Madnick SE (1976) Virtual machine advantages in security, integrity, and decision support systems [authors\u2019 response]. IBM Syst J 15(3):270\u2013278. https:\/\/doi.org\/10.1147\/sj.1976.5388091","journal-title":"IBM Syst J"},{"key":"609_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.30837\/rt.2022.3.210.05","volume":"210","author":"M Yesina","year":"2022","unstructured":"Yesina M, Ostrianska Y, Gorbenko I (2022) Status report on the third round of the NIST post-quantum cryptography standardization process. Radiotekhnika 210:75\u201386. https:\/\/doi.org\/10.30837\/rt.2022.3.210.05","journal-title":"Radiotekhnika"},{"key":"609_CR7","volume-title":"Status report on the third round of the nist post-quantum cryptography standardization process","author":"G Alagic","year":"2022","unstructured":"Alagic G, Apon D, Cooper D, Dang Q, Dang T, Kelsey J, Lichtinger J, Miller C, Moody D, Peralta R et al (2022) Status report on the third round of the nist post-quantum cryptography standardization process. National Institute of Standards and Technology, Gaithersburg"},{"issue":"1","key":"609_CR8","doi-asserted-by":"publisher","first-page":"351","DOI":"10.20533\/jitst.2046.3723.2015.0044","volume":"4","author":"AJ G","year":"2015","unstructured":"G AJ, A BK, A AO, A OS (2015) Post-quantum crystography based security framework for cloud computing. J Internet Technol Secur Trans 4(1):351\u2013357. https:\/\/doi.org\/10.20533\/jitst.2046.3723.2015.0044","journal-title":"J Internet Technol Secur Trans"},{"key":"609_CR9","doi-asserted-by":"publisher","first-page":"100242","DOI":"10.1016\/j.array.2022.100242","volume":"15","author":"M Kumar","year":"2022","unstructured":"Kumar M (2022) Post-quantum cryptography algorithm\u2019s standardization and performance analysis. Array 15:100242","journal-title":"Array"},{"key":"609_CR10","doi-asserted-by":"publisher","unstructured":"Raavi M, Wuthier S, Zhou X, Chang SY (2023) Post-quantum QUIC protocol in cloud networking. In 2023 joint European conference on networks and communications & 6G summit (EuCNC\/6G summit), (IEEE). https:\/\/doi.org\/10.1109\/eucnc\/6gsummit58263.2023.10188358","DOI":"10.1109\/eucnc\/6gsummit58263.2023.10188358"},{"issue":"3","key":"609_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.20517\/jsss.2022.15","volume":"3","author":"I Tzinos","year":"2022","unstructured":"Tzinos I, Limniotis K, Kolokotronis N (2022) Evaluating the performance of post-quantum secure algorithms in the tls protocol. J Surveill Secur Saf 3(3):101\u2013127. https:\/\/doi.org\/10.20517\/jsss.2022.15","journal-title":"J Surveill Secur Saf"},{"key":"609_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-030-44223-1_5","volume-title":"Benchmarking Post-quantum Cryptography in TLS","author":"C Paquin","year":"2020","unstructured":"Paquin C, Stebila D, Tamvada G (2020) Benchmarking Post-quantum Cryptography in TLS. Springer International Publishing, pp 72\u201391. https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5"},{"key":"609_CR13","unstructured":"Kampanakis P, Sikeridis D (2019) Two post-quantum signature use-cases: non-issues, challenges and potential solutions. In Proceedings of the 7th ETSI\/IQC quantum safe cryptography workshop, Seattle, WA, USA, vol 3"},{"issue":"4","key":"609_CR14","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/s10207-022-00587-6","volume":"21","author":"TG Tan","year":"2022","unstructured":"Tan TG, Szalachowski P, Zhou J (2022) Challenges of post-quantum digital signing in real-world applications: a survey. Int J Inf Secur 21(4):937\u2013952. https:\/\/doi.org\/10.1007\/s10207-022-00587-6","journal-title":"Int J Inf Secur"},{"key":"609_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.comcom.2021.05.019","volume":"176","author":"V Chamola","year":"2021","unstructured":"Chamola V, Jolfaei A, Chanana V, Parashari P, Hassija V (2021) Information security in the post quantum era for 5g and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput Commun 176:99\u2013118","journal-title":"Comput Commun"},{"issue":"9","key":"609_CR16","doi-asserted-by":"publisher","first-page":"14025","DOI":"10.1109\/tits.2021.3131668","volume":"23","author":"KA Shim","year":"2022","unstructured":"Shim KA (2022) A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Trans Intell Transp Syst 23(9):14025\u201314042. https:\/\/doi.org\/10.1109\/tits.2021.3131668","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"8","key":"609_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11128-020-02736-z","volume":"19","author":"X Xin","year":"2020","unstructured":"Xin X, Yang Q, Li F (2020) Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information. Quantum Inf Process 19(8):233. https:\/\/doi.org\/10.1007\/s11128-020-02736-z","journal-title":"Quantum Inf Process"},{"issue":"2","key":"609_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest RL (1988) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17(2):281\u2013308. https:\/\/doi.org\/10.1137\/0217017","journal-title":"SIAM J Comput"},{"key":"609_CR19","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-88702-7_3","volume-title":"in Post-Quantum Cryptography","author":"J Buchmann","year":"2009","unstructured":"Buchmann J, Dahmen E, Szydlo M (2009) in Post-Quantum Cryptography. Springer Berlin Heidelberg, pp 35\u201393. https:\/\/doi.org\/10.1007\/978-3-540-88702-7_3"},{"issue":"4","key":"609_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s40860-021-00155-0","volume":"8","author":"MD Noel","year":"2021","unstructured":"Noel MD, Waziri VO, Abdulhamid SM, Ojeniyi JA (2021) Review and analysis of classical algorithms and hash-based post-quantum algorithm. J Reliab Intell Environ 8(4):397\u2013414. https:\/\/doi.org\/10.1007\/s40860-021-00155-0","journal-title":"J Reliab Intell Environ"},{"issue":"1\u20132","key":"609_CR21","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00607-009-0042-y","volume":"85","author":"J Buchmann","year":"2009","unstructured":"Buchmann J, Lindner R, R\u00fcckert M, Schneider M (2009) Post-quantum cryptography: lattice signatures. Computing 85(1\u20132):105\u2013125. https:\/\/doi.org\/10.1007\/s00607-009-0042-y","journal-title":"Computing"},{"key":"609_CR22","doi-asserted-by":"publisher","unstructured":"Sikeridis D, Kampanakis P, Devetsikiotis M (2020) Post-quantum authentication in TLS 1.3: a performance study. In Proceedings 2020 network and distributed system security symposium, (Internet Society). https:\/\/doi.org\/10.14722\/ndss.2020.24203","DOI":"10.14722\/ndss.2020.24203"},{"issue":"11","key":"609_CR23","doi-asserted-by":"publisher","first-page":"2542","DOI":"10.1109\/tpds.2020.2995562","volume":"31","author":"S Sun","year":"2020","unstructured":"Sun S, Zhang R, Ma H (2020) Efficient parallelism of post-quantum signature scheme SPHINCS. IEEE Trans Parallel Distrib Syst 31(11):2542\u20132555. https:\/\/doi.org\/10.1109\/tpds.2020.2995562","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"609_CR24","unstructured":"Bernstein DJ, Dobraunig C, Eichlseder M, Fluhrer SR, Gazdag SL, H\u00fclsing A, Kampanakis P, K\u00f6lbl S, Lange T, Lauridsen MM, Mendel F, Niederhagen R, Rechberger C, Rijneveld J, Schwabe P(2017) SPHINCS + Submission to the NIST post-quantum project"},{"key":"609_CR25","unstructured":"Alter DM, Schwabe P, Daemen J (2021) Optimizing the nist post quantum candidate sphincs+ using avx-512"},{"issue":"6","key":"609_CR26","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1587\/transinf.2019EDL8223","volume":"E104.D","author":"J Lee","year":"2021","unstructured":"Lee J, Kang TG, Cho K, Yum DH (2021) New parameter sets for sphincs+. IEICE Trans Inf Syst E104.D(6):890\u2013892. https:\/\/doi.org\/10.1587\/transinf.2019EDL8223","journal-title":"IEICE Trans Inf Syst"},{"issue":"6","key":"609_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi H, Dutt N, Ray S, Regazzoni F, Banerjee I, Cammarota R (2019) Post-quantum lattice-based cryptography implementations: a survey. ACM Comput Surv (CSUR) 51(6):1\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"5","key":"609_CR28","first-page":"1","volume":"36","author":"PA Fouque","year":"2018","unstructured":"Fouque PA, Hoffstein J, Kirchner P, Lyubashevsky V, Pornin T, Prest T, Ricosset T, Seiler G, Whyte W, Zhang Z et al (2018) Falcon: fast-fourier lattice-based compact signatures over ntru. Submiss NIST\u2019s Post-Quantum Cryptogr Stand Process 36(5):1\u201375","journal-title":"Submiss NIST\u2019s Post-Quantum Cryptogr Stand Process"},{"key":"609_CR29","unstructured":"Pornin T (2019) New efficient, constant-time implementations of falcon. Cryptology ePrint Archive"},{"key":"609_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/5226390","volume":"2022","author":"Y Kim","year":"2022","unstructured":"Kim Y, Song J, Youn TY, Seo SC (2022) Crystals-dilithium on ARMv8. Secur Commun Networks 2022:1\u201312. https:\/\/doi.org\/10.1155\/2022\/5226390","journal-title":"Secur Commun Networks"},{"key":"609_CR31","doi-asserted-by":"publisher","first-page":"213968","DOI":"10.1109\/access.2020.3040324","volume":"8","author":"AFD Abiega-L\u2019Eglisse","year":"2020","unstructured":"Abiega-L\u2019Eglisse AFD, Delgado-Vargas KA, Valencia-Rodriguez FQ, Gonzalez-Quiroga VG, Gallegos-Garcia G, Nakano-Miyatake M (2020) Performance of new hope and CRYSTALS-dilithium postquantum schemes in the transport layer security protocol. IEEE Access 8:213968\u2013213980. https:\/\/doi.org\/10.1109\/access.2020.3040324","journal-title":"IEEE Access"},{"key":"609_CR32","unstructured":"Bartoletti D, Rymer J, Mines C, Tajima C (2016) The forrester waveTM: Global public cloud platforms for enterprise developers, q3 2016"},{"key":"609_CR33","unstructured":"Sikeridis D, Papapanagiotou I, Rimal BP, Devetsikiotis M (2017) A comparative taxonomy and survey of public cloud infrastructure vendors. arXiv preprint arXiv:1710.01476"},{"key":"609_CR34","unstructured":"McClellan K, Carmel L, Custer C, Miretskiy Y, Rosenberg S, Xing J (2022) Cockroach 2022 cloud report"},{"key":"609_CR35","unstructured":"Services ESRIP (2009) Capacity planning and performance benchmark reference guide, v. 1.8. California"},{"key":"609_CR36","unstructured":"Consortium EMB (2024) CoreMark Benchmark . https:\/\/www.eembc.org\/coremark\/index.php"},{"key":"609_CR37","doi-asserted-by":"publisher","unstructured":"Kattepur A, Rath HK, Simha A (2017) A-priori estimation of computation times in fog networked robotics. In 2017 IEEE International Conference on Edge Computing (EDGE) (IEEE). https:\/\/doi.org\/10.1109\/ieee.edge.2017.11","DOI":"10.1109\/ieee.edge.2017.11"},{"issue":"2","key":"609_CR38","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/s10586-020-03148-5","volume":"24","author":"P Singh","year":"2020","unstructured":"Singh P, Kaur A, Gupta P, Gill SS, Jyoti K (2020) RHAS: robust hybrid auto-scaling for web applications in cloud computing. Clust Comput 24(2):717\u2013737. https:\/\/doi.org\/10.1007\/s10586-020-03148-5","journal-title":"Clust Comput"},{"key":"609_CR39","unstructured":"Popescu DA, Zilberman N, Moore A (2017) Characterizing the impact of network latency on cloud-based applications\u2019 performance"},{"issue":"10","key":"609_CR40","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1007\/s00607-023-01173-x","volume":"105","author":"G Fragiadakis","year":"2023","unstructured":"Fragiadakis G, Liagkou V, Filiopoulou E, Fragkakis D, Michalakelis C, Nikolaidou M (2023) Cloud services cost comparison: a clustering analysis framework. Computing 105(10):2061\u20132088. https:\/\/doi.org\/10.1007\/s00607-023-01173-x","journal-title":"Computing"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00609-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-025-00609-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-025-00609-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:05:24Z","timestamp":1750316724000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-025-00609-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,7]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["609"],"URL":"https:\/\/doi.org\/10.1007\/s11334-025-00609-1","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2025,5,7]]},"assertion":[{"value":"23 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}