{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:55:09Z","timestamp":1770832509976,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:00:00Z","timestamp":1753920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00176-8","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T19:00:25Z","timestamp":1753988425000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing IoT communication: a module-LWE key exchange protocol with efficient error reconciliation technique"],"prefix":"10.1007","volume":"5","author":[{"given":"Alvary Kefas","family":"Kwala","sequence":"first","affiliation":[]},{"given":"Alpna","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Anshu","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,31]]},"reference":[{"key":"176_CR1","doi-asserted-by":"crossref","unstructured":"Shor PW, Algorithms for quantum computation: discrete logarithms and factoring, In: Proceedings 35th annual symposium on foundations of computer science, Ieee, 1994, pp. 124\u2013134. [Online]. https:\/\/ieeexplore.ieee.org\/abstract\/document\/365700\/. Accessed 04 Feb 2025.","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"6","key":"176_CR2","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11401-023-0053-6","volume":"44","author":"X Wang","year":"2023","unstructured":"Wang X, Xu G, Yu Y. Lattice-based cryptography: a survey. Chin Ann Math Ser B. 2023;44(6):945\u201360. https:\/\/doi.org\/10.1007\/s11401-023-0053-6.","journal-title":"Chin Ann Math Ser B"},{"key":"176_CR3","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1016\/j.procs.2018.04.243","volume":"131","author":"X Wang","year":"2018","unstructured":"Wang X, Hu A, Fang H. New variant for learning with errors problem. Procedia Comput Sci. 2018;131:502\u201310.","journal-title":"Procedia Comput Sci"},{"issue":"10","key":"176_CR4","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.3390\/math8101853","volume":"8","author":"JI Escribano Pablos","year":"2020","unstructured":"Escribano Pablos JI, Gonz\u00e1lez Vasco MI, Marriaga ME, P\u00e9rezdel Pozo \u00c1L. Compiled constructions towards post-quantum group key exchange: a design from kyber. Mathematics. 2020;8(10):1853.","journal-title":"Mathematics"},{"key":"176_CR5","unstructured":"OQS, OQS algorithm performance visualizations. [Online]. https:\/\/openquantumsafe.org\/benchmarking\/visualization\/. Accessed 18 Feb 2025."},{"issue":"6","key":"176_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O. On lattices, learning with errors, random linear codes, and cryptography. J ACM. 2009;56(6):1\u201340. https:\/\/doi.org\/10.1145\/1568318.1568324.","journal-title":"J ACM"},{"key":"176_CR7","doi-asserted-by":"publisher","unstructured":"Peikert C, Public-key cryptosystems from the worst-case shortest vector problem: extended abstract, In: Proceedings of the forty-first annual ACM symposium on Theory of computing, Bethesda MD USA: ACM, May 2009, pp. 333\u2013342. https:\/\/doi.org\/10.1145\/1536414.1536461.","DOI":"10.1145\/1536414.1536461"},{"key":"176_CR8","doi-asserted-by":"publisher","unstructured":"Rosca M, Stehl\u00e9 D, Wallet A, On the Ring-LWE and Polynomial-LWE Problems, In: Advances in Cryptology\u2013 EUROCRYPT 2018, vol. 10820, J. B. Nielsen and V. Rijmen, Eds., in Lecture Notes in Computer Science, vol. 10820., Cham: Springer International Publishing, 2018, pp. 146\u2013173. https:\/\/doi.org\/10.1007\/978-3-319-78381-9_6.","DOI":"10.1007\/978-3-319-78381-9_6"},{"key":"176_CR9","doi-asserted-by":"publisher","unstructured":"Stehl\u00e9 D, Steinfeld R, Tanaka K, Xagawa K, Efficient Public Key Encryption Based on Ideal Lattices: (Extended Abstract), In: Advances in Cryptology\u2013 ASIACRYPT 2009, vol. 5912, M. Matsui, Ed., in Lecture Notes in Computer Science, vol. 5912., Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 617\u2013635. https:\/\/doi.org\/10.1007\/978-3-642-10366-7_36.","DOI":"10.1007\/978-3-642-10366-7_36"},{"key":"176_CR10","unstructured":"Mukherjee A, Aikata A, Mert AC, Lee Y, Kwon S, Deryabin M, Roy SS, ModHE: modular homomorphic encryption using module lattices: potentials and limitations, Cryptology ePrint Archive, 2023, [Online]. https:\/\/eprint.iacr.org\/2023\/895. Accessed 04 Feb 2025."},{"issue":"6","key":"176_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings. J ACM. 2013;60(6):1\u201335. https:\/\/doi.org\/10.1145\/2535925.","journal-title":"J ACM"},{"issue":"3","key":"176_CR12","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois A, Stehl\u00e9 D. Worst-case to average-case reductions for module lattices. Des Codes Cryptogr. 2015;75(3):565\u201399. https:\/\/doi.org\/10.1007\/s10623-014-9938-4.","journal-title":"Des Codes Cryptogr"},{"key":"176_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/8299232","volume":"2022","author":"W Jia","year":"2022","unstructured":"Jia W, Xue G, Wang B, Hu Y. Module-LWE-based key exchange protocol using error reconciliation mechanism. Secur Commun Netw. 2022;2022:1\u20137. https:\/\/doi.org\/10.1155\/2022\/8299232.","journal-title":"Secur Commun Netw"},{"key":"176_CR14","unstructured":"Ding J, Xie X, Lin X, A simple provably secure key exchange scheme based on the learning with errors problem, Cryptology ePrint Archive, 2012, [Online]. https:\/\/eprint.iacr.org\/2012\/688. Accessed 04 Feb 2025."},{"key":"176_CR15","doi-asserted-by":"crossref","unstructured":"Bos JW, Costello C, Naehrig M, Stebila D, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, In: 2015 IEEE symposium on security and privacy, IEEE, 2015, pp. 553\u2013570. [Online]. https:\/\/ieeexplore.ieee.org\/abstract\/document\/7163047\/. Accessed 04 Feb 2025.","DOI":"10.1109\/SP.2015.40"},{"key":"176_CR16","unstructured":"Alkim E, Ducas L, P\u00f6ppelmann T, Schwabe P, Post-quantum key {Exchange\u2014A} new hope, In: 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 327\u2013343. [Online]. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/alkim. Accessed 04 Feb 2025."},{"key":"176_CR17","doi-asserted-by":"publisher","unstructured":"Bos J, Costello C, Ducas L, Mironov I, Naehrig M, Nikolaenko V, Stebila D. Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna Austria: ACM, Oct. 2016, pp. 1006\u20131018. https:\/\/doi.org\/10.1145\/2976749.2978425.","DOI":"10.1145\/2976749.2978425"},{"key":"176_CR18","doi-asserted-by":"publisher","unstructured":"Peikert C, Lattice Cryptography for the Internet, In: Post-Quantum Cryptography, vol. 8772, M. Mosca, Ed., In: Lecture Notes in Computer Science, vol. 8772., Cham: Springer International Publishing, 2014, pp. 197\u2013219. https:\/\/doi.org\/10.1007\/978-3-319-11659-4_12.","DOI":"10.1007\/978-3-319-11659-4_12"},{"issue":"9","key":"176_CR19","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.3390\/e23091108","volume":"23","author":"JN Ortiz","year":"2021","unstructured":"Ortiz JN, de Araujo RR, Aranha DF, Costa SI, Dahab R. The Ring-LWE problem in lattice-based cryptography: the case of twisted embeddings. Entropy. 2021;23(9):1108.","journal-title":"Entropy"},{"key":"176_CR20","doi-asserted-by":"publisher","unstructured":"Walden J, OpenSSL 3.0.0: an exploratory case study, In: Proceedings of the 19th International Conference on Mining Software Repositories, Pittsburgh Pennsylvania: ACM, May 2022, pp. 735\u2013737. https:\/\/doi.org\/10.1145\/3524842.3528035.","DOI":"10.1145\/3524842.3528035"},{"key":"176_CR21","unstructured":"Oppliger R, SSL and TLS: Theory and Practice. Artech House, 2023. [Online]. https:\/\/books.google.com\/books?hl=en%26lr=%26id=TOnNEAAAQBAJ%26oi=fnd%26pg=PP1%26dq=TLS%26ots=8auE3Ume0A%26sig=Y2mGhzew4nL6HHF0ufhU4EgsevI. Accessed 04 Feb 2025."},{"key":"176_CR22","doi-asserted-by":"publisher","unstructured":"Oder T, G\u00fcneysu T. Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs, In: Progress in Cryptology\u2013 LATINCRYPT 2017, vol. 11368, T. Lange and O. Dunkelman, Eds., in Lecture Notes in Computer Science, vol. 11368., Cham: Springer International Publishing, 2019, pp. 128\u2013142. https:\/\/doi.org\/10.1007\/978-3-030-25283-0_7.","DOI":"10.1007\/978-3-030-25283-0_7"},{"key":"176_CR23","doi-asserted-by":"crossref","unstructured":"Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P, Seiler G, Stehl\u00e9 D. CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM, In: 2018 IEEE European Symposium on Security and Privacy (EuroS%26P), IEEE, 2018, pp. 353\u2013367. [Online]. https:\/\/ieeexplore.ieee.org\/abstract\/document\/8406610\/. Accessed 04 Feb 2025.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"176_CR24","unstructured":"Alkim E, Ducas L, P\u00f6ppelmann T, Schwabe P, NewHope without reconciliation, Cryptology ePrint Archive, 2016, [Online]. https:\/\/eprint.iacr.org\/2016\/1157. Accessed 04 Feb 2025."},{"issue":"1","key":"176_CR25","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1049\/ise2.12008","volume":"15","author":"G Xue","year":"2021","unstructured":"Xue G, Wang B, Qu Q, Zhang W. Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature. IET Inf Secur. 2021;15(1):107\u201316. https:\/\/doi.org\/10.1049\/ise2.12008.","journal-title":"IET Inf Secur"},{"key":"176_CR26","unstructured":"Wu F, Zhou B, Jiang J, Lei T, Song J, Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm, Computers, Materials %26 Continua, vol. 76, no. 1, 2023, [Online]. https:\/\/search.ebscohost.com\/login.aspx?direct=true%26profile=ehost%26scope=site%26authtype=crawler%26jrnl=15462218%26AN=164310654%26h=8U2VK8Bmo2MpWKpPwg54hNyymn5FjW%2BPGLBJsYQxyiTzrppH2Qh9UKYg01S7FtqPtUZE72EXa3y3GROGhb1TaA%3D%3D%26crl=c. Accessed 22 May 2025."},{"issue":"3","key":"176_CR27","doi-asserted-by":"publisher","first-page":"454","DOI":"10.3390\/e25030454","volume":"25","author":"F Wu","year":"2023","unstructured":"Wu F, Zhou B, Zhang X. Identity-based proxy signature with message recovery over NTRU lattice. Entropy. 2023;25(3):454.","journal-title":"Entropy"},{"issue":"3","key":"176_CR28","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b","volume":"3","author":"EO Kiktenko","year":"2018","unstructured":"Kiktenko EO, Pozhar NO, Anufriev MN, Trushechkin AS, Yunusov RR, Kurochkin YV, Fedorov AK. Quantum-secured blockchain. Quant Sci Technol. 2018;3(3): 035004.","journal-title":"Quant Sci Technol"},{"key":"176_CR29","doi-asserted-by":"crossref","unstructured":"Mullen GL, Panario D, Handbook of finite fields, vol. 17. CRC press Boca Raton, 2013. [Online].","DOI":"10.1201\/b15006"},{"key":"176_CR30","doi-asserted-by":"crossref","unstructured":"Mezo I, Combinatorics and number theory of counting sequences. Chapman and Hall\/CRC, 2019. [Online].","DOI":"10.1201\/9781315122656"},{"key":"176_CR31","unstructured":"R. Oppliger, Contemporary cryptography. Artech House, 2011. [Online]. https:\/\/books.google.com\/books?hl=en%26lr=%26id=PRU8XO47W9gC%26oi=fnd%26pg=PR7%26dq=R.+A.+Mollin,+Algebraic+Number+%22theory,+Chapman+and+Hall\/+CRC+Press,+New+York,+NY,+USA,+2nd+edition,+2011.%26ots=QQ-bhkyomc%26sig=W4h9KxMFKvMd2oclKCQkGjSxk6Y. Accessed 05 Feb 2025."},{"issue":"2","key":"176_CR32","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11235-021-00759-0","volume":"77","author":"V Dabra","year":"2021","unstructured":"Dabra V, Bala A, Kumari S. Reconciliation based key exchange schemes using lattices: a review. Telecommun Syst. 2021;77(2):413\u201334. https:\/\/doi.org\/10.1007\/s11235-021-00759-0.","journal-title":"Telecommun Syst"},{"key":"176_CR33","doi-asserted-by":"crossref","unstructured":"Saliba C, Luzzi L, Ling C, A reconciliation approach to key generation based on Module-LWE\u2019, in 2021 IEEE International Symposium on Information Theory (ISIT), IEEE, 2021, pp. 1636\u20131641. [Online]. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9517882\/. Accessed 22 May 2025.","DOI":"10.1109\/ISIT45174.2021.9517882"},{"key":"176_CR34","doi-asserted-by":"publisher","unstructured":"Chiku S, Hara K, Hashimoto K, Tomita T, Shikata J, How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption, In: Cryptology and Network Security, vol. 14906, M. Kohlweiss, R. Di Pietro, and A. Beresford, Eds., in Lecture Notes in Computer Science, vol. 14906., Singapore: Springer Nature Singapore, 2025, pp. 145\u2013165. https:\/\/doi.org\/10.1007\/978-981-97-8016-7_7.","DOI":"10.1007\/978-981-97-8016-7_7"},{"key":"176_CR35","unstructured":"Li S, Overview and discussion of attacks on CRYSTALS-Kyber, Cryptology ePrint Archive, 2023, [Online]. https:\/\/eprint.iacr.org\/2023\/1952. Accessed 18 Feb 2025."},{"key":"176_CR36","doi-asserted-by":"publisher","unstructured":"Gay W. Beginning STM32: Developing with FreeRTOS, libopencm3, and GCC. In: Maker Innovations Series. Berkeley: Apress, 2024. https:\/\/doi.org\/10.1007\/979-8-8688-0199-0.","DOI":"10.1007\/979-8-8688-0199-0"},{"key":"176_CR37","unstructured":"Barrett SF. Arduino microcontroller processing for everyone! Springer Nature, 2022. [Online]. https:\/\/books.google.com\/books?hl=en%26lr=%26id=KYNyEAAAQBAJ%26oi=fnd%26pg=PR1%26dq=Arduino+Due+Internals+Book%26ots=HY50KotyQf%26sig=NXihBLnK3ukI0yK0DYWHH2PuwAQ. Accessed 21 May 2025."},{"key":"176_CR38","unstructured":"Loker DR. Raspberry Pi Pico as an IoT Device, In: 2023 ASEE Annual Conference %26 Exposition, 2023. [Online]. https:\/\/peer.asee.org\/raspberry-pi-pico-as-an-iot-device. Accessed 21 May 2025."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00176-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00176-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00176-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T10:08:05Z","timestamp":1757326085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00176-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,31]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["176"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00176-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,31]]},"assertion":[{"value":"20 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable,","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"84"}}