{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:47:08Z","timestamp":1771958828704,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s40860-021-00155-0","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T16:40:41Z","timestamp":1634316041000},"page":"397-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Review and analysis of classical algorithms and hash-based post-quantum algorithm"],"prefix":"10.1007","volume":"8","author":[{"given":"Moses Dogonyaro","family":"Noel","sequence":"first","affiliation":[]},{"given":"Victor Onomza","family":"Waziri","sequence":"additional","affiliation":[]},{"given":"Shafii Muhammad","family":"Abdulhamid","sequence":"additional","affiliation":[]},{"given":"Joseph Adebayo","family":"Ojeniyi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"155_CR1","doi-asserted-by":"publisher","unstructured":"Noel MD, Waziri OV, Abdulhamid MS, Ojeniyi AJ, Okoro MU (2020) Comparative analysis of classical and post-quantum digital signature algorithms used in Bitcoin transactions. In: 2020 2nd international conference on computer and information sciences (ICCIS), Al Jouf University, Saudi Arabia. IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/iccis49240.2020.9257656","DOI":"10.1109\/iccis49240.2020.9257656"},{"key":"155_CR2","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.tcs.2018.10.001","volume":"773","author":"M Pan","year":"2019","unstructured":"Pan M, Qiu D, Mateus P, Gruska J (2019) Entangling and disentangling in Grover\u2019s search algorithm. Theor Comput Sci 773:138\u2013152. https:\/\/doi.org\/10.1016\/j.tcs.2018.10.001","journal-title":"Theor Comput Sci"},{"key":"155_CR3","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/214952020","author":"CH Ugwuishiwu","year":"2020","unstructured":"Ugwuishiwu CH, Orji UE, Ugwu CI, Asogwa CN (2020) An overview of quantum cryptography and Shor\u2019s algorithm. Int J. https:\/\/doi.org\/10.30534\/ijatcse\/2020\/214952020","journal-title":"Int J"},{"key":"155_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-88702-7_3","volume-title":"Post-quantum cryptography","author":"J Buchmann","year":"2009","unstructured":"Buchmann J, Dahmen E, Szydlo M (2009) Hash-based digital signature schemes. Post-quantum cryptography. Springer, Berlin, pp 35\u201393"},{"issue":"19","key":"155_CR5","first-page":"9053","volume":"12","author":"D Mahto","year":"2017","unstructured":"Mahto D, Yadav DK (2017) RSA and ECC: a comparative analysis. Int J Appl Eng Res 12(19):9053\u20139061","journal-title":"Int J Appl Eng Res"},{"key":"155_CR6","doi-asserted-by":"publisher","unstructured":"Perbawa MR, Afryansyah DI, Sari RF (2017) Comparison of ECDSA and RSA signature scheme on NLSR performance. In: 2017 IEEE Asia Pacific conference on wireless and mobile (APWiMob), Bandung, Indonesia, IEEE, pp 7\u201311. https:\/\/doi.org\/10.1109\/APWiMob.2017.8284007","DOI":"10.1109\/APWiMob.2017.8284007"},{"key":"155_CR7","doi-asserted-by":"publisher","unstructured":"Toradmalle D, Singh R, Shastri H, Naik N, Panchidi V (2018) Prominence of ECDSA over RSA digital signature algorithm. In: 2018 2nd international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, IEEE, pp\u00a0253\u2013257.https:\/\/doi.org\/10.1109\/I-SMAC.2018.8653689","DOI":"10.1109\/I-SMAC.2018.8653689"},{"key":"155_CR8","first-page":"440","volume-title":"International conference on computer science, engineering and education applications","author":"M Iavich","year":"2020","unstructured":"Iavich M, Gagnidze A, Iashvili G, Okhrimenko T, Arakelian A, Fesenko A (2020) Improvement of Merkle signature scheme by means of optical quantum random number generators. International conference on computer science, engineering and education applications, vol 1247. Springer, Cham, pp 440\u2013453"},{"issue":"1","key":"155_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1504\/IJACT.2013.053435","volume":"3","author":"J Buchmann","year":"2013","unstructured":"Buchmann J, Dahmen E, Ereth S, H\u00fclsing A, R\u00fcckert M (2013) On the security of the Winternitz one-time signature scheme. Int J Appl Cryptogr 3(1):84\u201396","journal-title":"Int J Appl Cryptogr"},{"key":"155_CR10","doi-asserted-by":"crossref","unstructured":"Buchmann J, Dahmen E, H\u00fclsing A (2011) XMSS-a practical forward secure signature scheme based on minimal security assumptions. In: International workshop on post-quantum cryptography, Taipei, Taiwan, Springer, Berlin, pp\u00a0117\u2013129","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"155_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.ins.2020.05.024","volume":"539","author":"F Shahid","year":"2020","unstructured":"Shahid F, Khan A, Malik SUR, Choo KKR (2020) WOTS-S: a quantum secure compact signature scheme for distributed ledger. Inf Sci 539:229\u2013249. https:\/\/doi.org\/10.1016\/j.ins.2020.05.024","journal-title":"Inf Sci"},{"key":"155_CR12","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-49100-4_12","volume-title":"International conference on research in security standardisation","author":"J Katz","year":"2016","unstructured":"Katz J (2016) Analysis of a proposed hash-based signature standard. International conference on research in security standardisation, vol 10074. Springer, Cham, pp 261\u2013273"},{"issue":"3","key":"155_CR13","first-page":"234","volume":"5","author":"M Karatay","year":"2020","unstructured":"Karatay M, Alk\u0131m E, G\u00fcrsoy NK, Kurt M (2020) A performance comparison of some hash functions in hash-based signature. J Mod Technol Eng 5(3):234\u2013241","journal-title":"J Mod Technol Eng"},{"key":"155_CR14","doi-asserted-by":"publisher","unstructured":"Panda PK, Chattopadhyay S (2017) A hybrid security algorithm for RSA cryptosystem. In: 2017 4th international conference on advanced computing and communication systems (ICACCS), Coimbatore, India, IEEE, pp\u00a01\u20136. https:\/\/doi.org\/10.1109\/ICACCS.2017.8014644","DOI":"10.1109\/ICACCS.2017.8014644"},{"issue":"1","key":"155_CR15","first-page":"51","volume":"10","author":"RS Abdeldaym","year":"2019","unstructured":"Abdeldaym RS, Abd Elkader HM, Hussein R (2019) Modified RSA algorithm using two public key and Chinese remainder theorem. Int J Electron Inf Eng 10(1):51\u201364","journal-title":"Int J Electron Inf Eng"},{"issue":"3","key":"155_CR16","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1080\/09720529.2019.1615673","volume":"23","author":"N Mehibel","year":"2020","unstructured":"Mehibel N, Hamadouche MH (2020) A new enhancement of elliptic curve digital signature algorithm. J Discrete Math Sci Cryptogr 23(3):743\u2013757. https:\/\/doi.org\/10.1080\/09720529.2019.1615673","journal-title":"J Discrete Math Sci Cryptogr"},{"issue":"11","key":"155_CR17","first-page":"333","volume":"8","author":"MF Mushtaq","year":"2017","unstructured":"Mushtaq MF, Jamel S, Disina AH, Pindar ZA, Shakir NSA, Deris MM (2017) A survey on the cryptographic encryption algorithms. Int J Adv Comput Sci Appl 8(11):333\u2013344","journal-title":"Int J Adv Comput Sci Appl"},{"key":"155_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.cosrev.2018.11.002","volume":"31","author":"L Gyongyosi","year":"2019","unstructured":"Gyongyosi L, Imre S (2019) A survey on quantum computing technology. Comput Sci Rev 31:51\u201371. https:\/\/doi.org\/10.1016\/j.cosrev.2018.11.002","journal-title":"Comput Sci Rev"},{"issue":"1","key":"155_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2020.3013019","volume":"8","author":"S Suhail","year":"2020","unstructured":"Suhail S, Hussain R, Khan A, Hong CS (2020) On the role of hash-based signatures in quantum-safe internet of things: current solutions and future directions. IEEE Internet Things J 8(1):1\u20137. https:\/\/doi.org\/10.1109\/JIOT.2020.3013019","journal-title":"IEEE Internet Things J"},{"key":"155_CR20","doi-asserted-by":"publisher","unstructured":"Holmgren J, Lombardi A (2018) Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications). In: 2018 IEEE 59th annual symposium on Foundations of Computer Science (FOCS), Paris, France, IEEE, pp 850\u2013858. https:\/\/doi.org\/10.1109\/FOCS.2018.00085","DOI":"10.1109\/FOCS.2018.00085"},{"key":"155_CR21","first-page":"194","volume-title":"International conference on availability, reliability, and security","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing A, Rausch L, Buchmann J (2013) Optimal parameters for XMSS-MT. International conference on availability, reliability, and security. Springer, Berlin, pp 194\u2013208"},{"issue":"3","key":"155_CR22","doi-asserted-by":"publisher","first-page":"421","DOI":"10.14569\/IJACSA.2017.080358","volume":"8","author":"AKD de Oliveira","year":"2017","unstructured":"de Oliveira AKD, Lopez J, Cabral R (2017) High performance of hash-based signature schemes. Int J Adv Comput Sci Appl 8(3):421\u2013432. https:\/\/doi.org\/10.14569\/IJACSA.2017.080358","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"7671","key":"155_CR23","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549(7671):188\u2013194","journal-title":"Nature"},{"key":"155_CR24","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fern\u00e1ndez-Caram\u00e9s","year":"2020","unstructured":"Fern\u00e1ndez-Caram\u00e9s TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091\u201321116. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968985","journal-title":"IEEE Access"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00155-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00155-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00155-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T19:52:32Z","timestamp":1667418752000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00155-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["155"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00155-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,15]]},"assertion":[{"value":"13 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}