{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:20:23Z","timestamp":1776680423474,"version":"3.51.2"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:00:00Z","timestamp":1727395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:00:00Z","timestamp":1727395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00069-2","type":"journal-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T12:02:26Z","timestamp":1727438546000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Comparative analysis of lattice-based cryptographic schemes for secure IoT communications"],"prefix":"10.1007","volume":"4","author":[{"given":"Alvary Kefas","family":"Kwala","sequence":"first","affiliation":[]},{"given":"Shri","family":"Kant","sequence":"additional","affiliation":[]},{"given":"Alpna","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,27]]},"reference":[{"issue":"5","key":"69_CR1","doi-asserted-by":"publisher","first-page":"164","DOI":"10.4236\/jcc.2015.35021","volume":"3","author":"S Madakam","year":"2015","unstructured":"Madakam S, Ramaswamy R, Tripathi S. Internet of things (IoT): a literature review. J Comp Commun. 2015;3(5):164\u201373.","journal-title":"J Comp Commun"},{"key":"69_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09622-6","author":"AA Laghari","year":"2021","unstructured":"Laghari AA, Wu K, Laghari RA, Ali M, Khan AA. A review and state of art of Internet of Things (IoT). Arch Comp Methods Eng. 2021. https:\/\/doi.org\/10.1007\/s11831-021-09622-6.","journal-title":"Arch Comp Methods Eng"},{"key":"69_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2021.100121","volume":"2","author":"M Javaid","year":"2021","unstructured":"Javaid M, Haleem A, Rab S, Singh RP, Suman R. Sensors for daily life: a review. Sensors Int. 2021;2: 100121.","journal-title":"Sensors Int"},{"issue":"1","key":"69_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2005.12.003","volume":"25","author":"CM Roberts","year":"2006","unstructured":"Roberts CM. Radio frequency identification (RFID). Comput Secur. 2006;25(1):18\u201326.","journal-title":"Comput Secur"},{"issue":"4","key":"69_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38(4):393\u2013422.","journal-title":"Comput Netw"},{"issue":"1","key":"69_CR6","doi-asserted-by":"publisher","first-page":"18422","DOI":"10.1038\/s41598-023-45065-8","volume":"13","author":"SN Ashraf","year":"2023","unstructured":"Ashraf SN, Manickam S, Zia SS, Abro AA, Obaidat M. IoT empowered smart cybersecurity framework for intrusion detection in internet of drones. Sci Rep. 2023;13(1):18422.","journal-title":"Sci Rep"},{"key":"69_CR7","first-page":"9399887","volume":"2023","author":"DD Tran","year":"2023","unstructured":"Tran DD, Ogata K, Escobar S, Akleylek S, Otmani A. Kyber, saber, and SK-MLWR lattice-based key encapsulation mechanisms model checking with maude. IET Inform Sec. 2023;2023:9399887.","journal-title":"IET Inform Sec"},{"key":"69_CR8","unstructured":"Horowitz M, Grumbling E. Quantum computing: progress and prospects. 2019. https:\/\/books.google.com\/books?hl=en&lr=&id=jjiPDwAAQBAJ&oi=fnd&pg=PR1&dq=quantum+computing+review&ots=flPatrZz4E&sig=GsMsoo0Y4OFF1tiVtTxVbocjdxw. Accessed 18 May 2024."},{"key":"69_CR9","unstructured":"IoT devices and sensors: types, functions, and use cases-IFACET. https:\/\/ifacet.iitk.ac.in\/knowledge-hub\/internet-of-things\/iot-devices-and-sensors-types-functions-and-use-cases\/. Accessed 22 May 2024."},{"key":"69_CR10","unstructured":"Milanov E. The RSA algorithm. RSA laboratories. 2009: pp. 1\u201311."},{"issue":"1","key":"69_CR11","first-page":"1","volume":"1","author":"SU Nimbhorkar","year":"2012","unstructured":"Nimbhorkar SU, Malik LG. A survey on elliptic curve cryptography (ECC). Int J Adv Stud Comp Sci Eng. 2012;1(1):1\u20135.","journal-title":"Int J Adv Stud Comp Sci Eng"},{"key":"69_CR12","unstructured":"Chi DP, Choi JW, San Kim J, Kim T. Lattice based cryptography for beginners. Cryptol ePrint Arch. https:\/\/eprint.iacr.org\/2015\/938. Accessed 18 May 2024."},{"issue":"4","key":"69_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/cryptography6040056","volume":"6","author":"H Bandara","year":"2022","unstructured":"Bandara H, Herath Y, Weerasundara T, Alawatugoda J. On advances of lattice-based cryptographic schemes and their implementations. Cryptography. 2022;6(4):56.","journal-title":"Cryptography"},{"issue":"3","key":"69_CR14","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ipl.2008.09.028","volume":"109","author":"E Liberty","year":"2009","unstructured":"Liberty E, Zucker SW. The mailman algorithm: a note on matrix\u2013vector multiplication. Inf Proc Lett. 2009;109(3):179\u201382.","journal-title":"Inf Proc Lett"},{"issue":"2","key":"69_CR15","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1007\/s11042-020-09706-8","volume":"80","author":"VK Yadav","year":"2021","unstructured":"Yadav VK, Verma S, Venkatesan S. An efficient and light weight polynomial multiplication for ideal lattice-based cryptography. Multimed Tools Appl. 2021;80(2):3089\u2013120. https:\/\/doi.org\/10.1007\/s11042-020-09706-8.","journal-title":"Multimed Tools Appl"},{"key":"69_CR16","unstructured":"Satriawan A, Mareta R, Lee H. A complete beginner guide to the number theoretic transform (NTT). Cryptol ePrint Arch. 2024. https:\/\/eprint.iacr.org\/2024\/585. Accessed 18 May 2024."},{"key":"69_CR17","unstructured":"Galloway P. Learning with errors. http:\/\/koclab.cs.ucsb.edu\/teaching\/cren\/project\/2017\/galloway.pdf. Accessed 18 May 2024."},{"key":"69_CR18","doi-asserted-by":"crossref","unstructured":"Gur KD, Katz J, Silde T. Two-round threshold lattice signatures from threshold homomorphic encryption. Cryptol ePrint Arch. 2023. https:\/\/eprint.iacr.org\/2023\/1318. Accessed 18 May 2024.","DOI":"10.1007\/978-3-031-62746-0_12"},{"issue":"4","key":"69_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4855","volume":"35","author":"D Chaudhary","year":"2024","unstructured":"Chaudhary D, Durgarao MSP, Mishra D, Kumari S. A module lattice based construction of post quantum secure blockchain architecture. Trans Emerg Tel Tech. 2024;35(4): e4855. https:\/\/doi.org\/10.1002\/ett.4855.","journal-title":"Trans Emerg Tel Tech"},{"key":"69_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2024.114553","volume":"999","author":"H Lin","year":"2024","unstructured":"Lin H, Wang M, Zhuang J, Wang Y. Hardness of entropic module-LWE. Theoret Comput Sci. 2024;999: 114553.","journal-title":"Theoret Comput Sci"},{"key":"69_CR21","unstructured":"Pellet-Mary A, Tran N. Reductions from module lattices to free module lattices. 2023. https:\/\/hal.science\/hal-04119912\/. Accessed 18 May 2024."},{"issue":"1","key":"69_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.32604\/cmc.2023.036189","volume":"75","author":"ZJN Khan","year":"2023","unstructured":"Khan ZJN, Ullah I, Pathan MS, Lim H. Lattice-based authentication scheme to prevent quantum attack in public cloud environment. Comput Mater Continua. 2023;75(1):35\u201349.","journal-title":"Comput Mater Continua"},{"key":"69_CR23","first-page":"1","volume-title":"2023 12th Mediterranean conference on embedded computing (MECO)","author":"R Ristov","year":"2023","unstructured":"Ristov R, Koceski S. Quantum resilient public key cryptography in internet of things. In: Ristov R, editor. 2023 12th Mediterranean conference on embedded computing (MECO). Budva: IEEE; 2023. p. 1\u20134."},{"key":"69_CR24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i3.74-96","author":"JW Bos","year":"2023","unstructured":"Bos JW, Bronchain O, Custers F, Renes J, Verbakel D, van Vredendaal C. Enabling FrodoKEM on Embedded Devices. IACR Trans Cryptogr Hardw Embed Syst. 2023. https:\/\/doi.org\/10.46586\/tches.v2023.i3.74-96.","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"issue":"3","key":"69_CR25","first-page":"1562","volume":"69","author":"W Guo","year":"2021","unstructured":"Guo W, Li S, Kong L. An efficient implementation of KYBER. IEEE Trans Circuits Syst II Express Briefs. 2021;69(3):1562\u20136.","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"issue":"2","key":"69_CR26","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s13389-022-00303-z","volume":"13","author":"B-Y Peng","year":"2023","unstructured":"Peng B-Y, Marotzke A, Tsai M-H, Yang B-Y, Chen H-L. Streamlined NTRU prime on FPGA. J Cryptogr Eng. 2023;13(2):167\u201386. https:\/\/doi.org\/10.1007\/s13389-022-00303-z.","journal-title":"J Cryptogr Eng"},{"key":"69_CR27","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/ICMCSI61536.2024.00028","volume-title":"2024 5th international conference on mobile computing and sustainable informatics (ICMCSI)","author":"M Harmalkar","year":"2024","unstructured":"Harmalkar M, Jain K, Krishnan P. A survey of post quantum key encapsulation mechanism. In: Harmalkar M, editor. 2024 5th international conference on mobile computing and sustainable informatics (ICMCSI). Lalitpur: IEEE; 2024. p. 141\u20139."},{"key":"69_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20888-1","volume-title":"Embedded systems design using the MSP430FR2355 LaunchPadTM","author":"BJ LaMeres","year":"2023","unstructured":"LaMeres BJ. Embedded systems design using the MSP430FR2355 LaunchPadTM. Cham: Springer Nature; 2023."},{"key":"69_CR29","unstructured":"OQS. OQS algorithm performance visualizations. https:\/\/openquantumsafe.org\/benchmarking\/visualization\/ Accessed 18 May 2024."},{"key":"69_CR30","unstructured":"Documentation for ARM. https:\/\/documentation.solarwinds.com\/en\/success_center\/arm\/content\/arm_documentation.htm. Accessed 18 May 2024."},{"key":"69_CR31","unstructured":"\u2018Model Specific Documentation for RISC-V\/riscv32\/RV32IMC\u2019. https:\/\/www.ovpworld.org\/model-specific-documentation-for-risc-v-riscv32-rv32imc. Accessed 18 May 2024."},{"key":"69_CR32","first-page":"1","volume-title":"2019 2nd International conference on computing, mathematics and engineering technologies (iCoMET)","author":"P Rai","year":"2019","unstructured":"Rai P, Rehman M. ESP32 based smart surveillance system. In: Rai P, editor. 2019 2nd International conference on computing, mathematics and engineering technologies (iCoMET). Sukkur: IEEE; 2019. p. 1\u20133."},{"key":"69_CR33","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-031-20888-1_4","volume-title":"Embedded systems design using the MSP430FR2355 LaunchPadTM","author":"BJ LaMeres","year":"2023","unstructured":"LaMeres BJ. The MSP430. In: LaMeres BJ, editor. Embedded systems design using the MSP430FR2355 LaunchPadTM. Cham: Springer International Publishing; 2023. p. 135\u201352. https:\/\/doi.org\/10.1007\/978-3-031-20888-1_4."},{"issue":"14","key":"69_CR34","doi-asserted-by":"publisher","first-page":"4727","DOI":"10.3390\/s21144727","volume":"21","author":"F Salamone","year":"2021","unstructured":"Salamone F, Masullo M, Sibilio S. Wearable devices for environmental monitoring in the built environment: a systematic review. Sensors. 2021;21(14):4727.","journal-title":"Sensors"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00069-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00069-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00069-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T12:10:57Z","timestamp":1727439057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00069-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,27]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["69"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00069-2","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,27]]},"assertion":[{"value":"11 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}