{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:37:33Z","timestamp":1776400653147,"version":"3.51.2"},"reference-count":144,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00238-x","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T17:59:08Z","timestamp":1763661548000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Implementation and performance of post-quantum cryptography for resource constrained consumer electronics"],"prefix":"10.1007","volume":"5","author":[{"given":"Muhammad Asghar","family":"Khan","sequence":"first","affiliation":[]},{"given":"Fazal","family":"Noor","sequence":"additional","affiliation":[]},{"given":"Shumaila","family":"Javaid","sequence":"additional","affiliation":[]},{"given":"Justyna","family":"\u017bywio\u0142ek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,20]]},"reference":[{"issue":"4","key":"238_CR1","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCE.2023.3277856","volume":"69","author":"D Javeed","year":"2023","unstructured":"Javeed D, Saeed MS, Ahmad I, Kumar P, Jolfaei A, Tahir M. An intelligent intrusion detection system for smart consumer electronics network. IEEE Trans Consum Electron. 2023;69(4):906\u201313.","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"238_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MCE.2021.3062800","volume":"11","author":"S Rani","year":"2022","unstructured":"Rani S, Gupta D, Garg S, Piran MJ, Hossain MS. Consumer electronic devices: evolution and edge security solutions. IEEE Consum Electron Mag. 2022;11(2):15\u201320.","journal-title":"IEEE Consum Electron Mag"},{"key":"238_CR3","doi-asserted-by":"crossref","unstructured":"Shruti, Rani S. Towards security of consumer electronic devices: an advanced attribute-based encryption approach for multimodal fog computing. IEEE Trans Consumer Electron. 2024, p. 1.","DOI":"10.1109\/TCE.2024.3409885"},{"issue":"no. 2","key":"238_CR4","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2022","unstructured":"Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl. 2022;26(2):571\u201390.","journal-title":"Pattern Anal Appl"},{"issue":"no. 6","key":"238_CR5","first-page":"155","volume":"20","author":"P Patro","year":"2023","unstructured":"Patro P, Kumar K, Kumar GS, Sahu AK. Intelligent data classification using optimized fuzzy neural network and improved cuckoo search optimization. Iran J Fuzzy Syst. 2023;20(6):155\u201369.","journal-title":"Iran J Fuzzy Syst"},{"issue":"6","key":"238_CR6","doi-asserted-by":"publisher","first-page":"3424","DOI":"10.1016\/j.jksuci.2020.06.003","volume":"34","author":"P Patro","year":"2022","unstructured":"Patro P, Kumar K, Suresh-Kumar G, Swain G. Similarity and wavelet transform based data partitioning and parameter learning for fuzzy neural network. J King Saud Univ Comput Inf Sci. 2022;34(6):3424\u201332.","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"1","key":"238_CR7","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00510-2","volume":"8","author":"C Wang","year":"2022","unstructured":"Wang C, Li X, Xu H, Li Z, Wang J, Yang Z, et al. Towards practical quantum computers: transmon qubit with a lifetime approaching 0.5 milliseconds. NPJ Quantum Inf. 2022;8(1):3.","journal-title":"NPJ Quantum Inf"},{"issue":"2","key":"238_CR8","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/COMST.2023.3254481","volume":"25","author":"Z Yang","year":"2023","unstructured":"Yang Z, Zolanvari M, Jain R. A survey of important issues in quantum computing and communications. IEEE Commun Surv Tutor. 2023;25(2):1059\u201394.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"238_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2017.3151325","volume":"15","author":"J Mulholland","year":"2017","unstructured":"Mulholland J, Mosca M, Braun J. The day the cryptography dies. IEEE Secur Priv. 2017;15(4):14\u201321.","journal-title":"IEEE Secur Priv"},{"issue":"8","key":"238_CR10","doi-asserted-by":"publisher","first-page":"5766","DOI":"10.1016\/j.jksuci.2021.01.018","volume":"34","author":"J Kaur","year":"2022","unstructured":"Kaur J, Ramkumar K. The recent trends in cyber security: a review. J King Saud Univ Comput Inf Sci. 2022;34(8):5766\u201381.","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"238_CR11","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120\u20136.","journal-title":"Commun ACM"},{"issue":"3","key":"238_CR12","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/cryptography7030044","volume":"7","author":"RK Ramesh","year":"2023","unstructured":"Ramesh RK, Dodmane R, Shetty S, Aithal G, Sahu M, Sahu AK. A novel and secure fake-modulus based Rabin-cryptosystem. Cryptography. 2023;7(3):44.","journal-title":"Cryptography"},{"issue":"177","key":"238_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N. Elliptic curve cryptosystems. Math Comput. 1987;48(177):203\u20139.","journal-title":"Math Comput"},{"key":"238_CR14","doi-asserted-by":"crossref","unstructured":"Miller VS. Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, 1985; p. 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"4","key":"238_CR15","doi-asserted-by":"publisher","first-page":"785","DOI":"10.24425\/ijet.2024.149609","volume":"70","author":"V Verma","year":"2024","unstructured":"Verma V. Lightweight mutual authentication protocol for iot devices using elliptical curves. Int J Electron Telecommun. 2024;70(4):785\u201390. https:\/\/doi.org\/10.24425\/ijet.2024.149609.","journal-title":"Int J Electron Telecommun"},{"key":"238_CR16","doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME. New directions in cryptography. In: Democratizing cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022, p. 365\u2013390.","DOI":"10.1145\/3549993.3550007"},{"issue":"6","key":"238_CR17","first-page":"186","volume":"25","author":"D Fox","year":"2001","unstructured":"Fox D. Digital signature standard (dss). Datenschutz und Datensicherheit. 2001;25(6):186\u201392.","journal-title":"Datenschutz und Datensicherheit"},{"issue":"2","key":"238_CR18","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999;41(2):303\u201332.","journal-title":"SIAM Rev"},{"key":"238_CR19","doi-asserted-by":"crossref","unstructured":"Grover LK. A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, 1996, p. 212\u2013219.","DOI":"10.1145\/237814.237866"},{"key":"238_CR20","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-981-19-9530-9_21","volume":"1085","author":"V Verma","year":"2023","unstructured":"Verma V. A study on quantum cryptography and its need. Stud Comput Intell. 2023;1085:407\u201335. https:\/\/doi.org\/10.1007\/978-981-19-9530-9_21.","journal-title":"Stud Comput Intell"},{"key":"238_CR21","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1007\/s11277-021-08527-8","volume":"120","author":"V Verma","year":"2021","unstructured":"Verma V, Malhotra K. A new secure quantum signature masked authentication scheme. Wirel Pers Commun. 2021;120:1659\u201374. https:\/\/doi.org\/10.1007\/s11277-021-08527-8.","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"238_CR22","first-page":"142","volume":"11","author":"V Verma","year":"2024","unstructured":"Verma V. Unveiling the power of blockchain in pharmaceutical supply chains: strengthening security and improving drug traceability. El-Cezeri J Sci Eng. 2024;11(2):142\u201351.","journal-title":"El-Cezeri J Sci Eng"},{"key":"238_CR23","doi-asserted-by":"crossref","unstructured":"Bernstein DJ. Introduction to post-quantum cryptography. In: Post-quantum cryptography. Springer, 2009; p. 1\u201314.","DOI":"10.1007\/978-3-540-88702-7_1"},{"issue":"7671","key":"238_CR24","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549(7671):188\u201394.","journal-title":"Nature"},{"key":"238_CR25","doi-asserted-by":"crossref","unstructured":"Barreto PS, Piazza Biasi F, Dahab R, L\u00f3pez-Hern\u00e1ndez JC, de Morais EM, de Oliveira AD, Pereira GC, Ricardini JE. A panorama of post-quantum cryptography. In: Open problems in mathematics and computational science. 2014; p. 387\u2013439.","DOI":"10.1007\/978-3-319-10683-0_16"},{"issue":"7909","key":"238_CR26","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","volume":"605","author":"D Joseph","year":"2022","unstructured":"Joseph D, Misoczki R, Manzano M, Tricot J, Pinuaga FD, Lacombe O, et al. Transitioning organizations to post-quantum cryptography. Nature. 2022;605(7909):237\u201343.","journal-title":"Nature"},{"key":"238_CR27","doi-asserted-by":"crossref","unstructured":"Khan MA, Khan MA. Securing IOT in the post-quantum era: implementation, challenges and future directions. IEEE Commun Standards Mag, 2025; p. 1","DOI":"10.1109\/MCOMSTD.2025.3584658"},{"issue":"2","key":"238_CR28","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/COMST.2023.3325761","volume":"26","author":"Z Yang","year":"2024","unstructured":"Yang Z, Alfauri H, Farkiani B, Jain R, D. Pietro R, Erbad A. A survey and comparison of post-quantum and quantum blockchains. IEEE Commun Surv Tutor. 2024;26(2):967\u20131002.","journal-title":"IEEE Commun Surv Tutor"},{"key":"238_CR29","unstructured":"Or TRNGS, Adversaries AQ. Certifiable quantum dice. 2012."},{"key":"238_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TQE.2022.3207111","volume":"3","author":"Z Yang","year":"2022","unstructured":"Yang Z, Salman T, Jain R, Pietro RD. Decentralization using quantum blockchain: a theoretical analysis. IEEE Trans Quantum Eng. 2022;3:1\u201316.","journal-title":"IEEE Trans Quantum Eng"},{"key":"238_CR31","doi-asserted-by":"publisher","first-page":"160 669","DOI":"10.1109\/ACCESS.2024.3479228","volume":"12","author":"K Chowdhury","year":"2024","unstructured":"Chowdhury K, Deb S, Roy KS, Podder D, Sahu AK. A systematic survey on TPE schemes for the cloud: classification, challenges, and future scopes. IEEE Access. 2024;12:160 669-160 689.","journal-title":"IEEE Access"},{"issue":"6","key":"238_CR32","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s11401-023-0053-6","volume":"44","author":"X Wang","year":"2023","unstructured":"Wang X, Xu G, Yu Y. Lattice-based cryptography: a survey. Chin Ann Math Ser B. 2023;44(6):945\u201360.","journal-title":"Chin Ann Math Ser B"},{"key":"238_CR33","unstructured":"Overbeck R, Sendrier N. Code-based cryptography. post-quantum cryptography. In: Bernstein DJ, Buchmann J, Dahmen E (eds). 2009."},{"key":"238_CR34","unstructured":"Weger V, Gassner N, Rosenthal J. A survey on code-based cryptography, arXiv preprint arXiv:2201.07119, 2022."},{"key":"238_CR35","doi-asserted-by":"crossref","unstructured":"Noel MD, Waziri VO, Abdulhamid SM, Ojeniyi JA. Review and analysis of classical algorithms and hash-based post-quantum algorithm. J Reliab Intell Environ. 2021; p. 1\u201318.","DOI":"10.1007\/s40860-021-00155-0"},{"issue":"4","key":"238_CR36","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2017.3151328","volume":"15","author":"J Ding","year":"2017","unstructured":"Ding J, Petzoldt A. Current state of multivariate cryptography. IEEE Secur Priv. 2017;15(4):28\u201336.","journal-title":"IEEE Secur Priv"},{"issue":"6","key":"238_CR37","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MITP.2019.2943136","volume":"21","author":"C Peng","year":"2019","unstructured":"Peng C, Chen J, Zeadally S, He D. Isogeny-based cryptography: a promising post-quantum technique. IT Prof. 2019;21(6):27\u201332.","journal-title":"IT Prof"},{"key":"238_CR38","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s00521-016-2723-8","volume":"29","author":"S Kanwal","year":"2018","unstructured":"Kanwal S, Ali R. A cryptosystem with noncommutative platform groups. Neural Comput Appl. 2018;29:1273\u20138.","journal-title":"Neural Comput Appl"},{"key":"238_CR39","unstructured":"Sauerwein K, Butler JM, Reed C, Reczek KK. A NIST scientific foundation review. 2023."},{"key":"238_CR40","doi-asserted-by":"crossref","unstructured":"Baldi M, Santini P, Cancellieri G. Post-quantum cryptography based on codes: state of the art and open challenges. In: 2017 AEIT international annual conference. IEEE, 2017; p. 1\u20136.","DOI":"10.23919\/AEIT.2017.8240549"},{"key":"238_CR41","doi-asserted-by":"crossref","unstructured":"Mavroeidis V, Vishi K, Zych MD, J\u00f8sang A. The impact of quantum computing on present cryptography, arXiv preprint arXiv:1804.00200, 2018.","DOI":"10.14569\/IJACSA.2018.090354"},{"issue":"11","key":"238_CR42","first-page":"2608","volume":"14","author":"KS Roy","year":"2019","unstructured":"Roy KS, Kalita HK. A survey on post-quantum cryptography for constrained devices. Int J Appl Eng Res. 2019;14(11):2608\u201315.","journal-title":"Int J Appl Eng Res"},{"key":"238_CR43","doi-asserted-by":"crossref","unstructured":"Clancy TC, McGwier RW, Chen L. Post-quantum cryptography and 5g security: tutorial. In: Proceedings of the 12th conference on security and privacy in wireless and mobile networks, 2019; p. 285\u2013285.","DOI":"10.1145\/3317549.3324882"},{"issue":"6","key":"238_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi H, Dutt N, Ray S, Regazzoni F, Banerjee I, Cammarota R. Post-quantum lattice-based cryptography implementations: a survey. ACM Comput Surv. 2019;51(6):1\u201341.","journal-title":"ACM Comput Surv"},{"key":"238_CR45","doi-asserted-by":"crossref","unstructured":"Upadhyay L. Quantum cryptography: a survey. In: Innovations in bio-inspired computing and applications: proceedings of the 9th international conference on innovations in bio-inspired computing and applications (IBICA 2018) held in Kochi, India during December 17\u201319, 2018. Springer, 2019; pp. 20\u201335.","DOI":"10.1007\/978-3-030-16681-6_3"},{"key":"238_CR46","doi-asserted-by":"publisher","first-page":"21 091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fernandez-Carames","year":"2020","unstructured":"Fernandez-Carames TM, Fraga-Lamas P. Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access. 2020;8:21 091-21 116.","journal-title":"IEEE Access"},{"key":"238_CR47","doi-asserted-by":"crossref","unstructured":"Kumar M, Pattnaik P. Post quantum cryptography(pqc)\u2014an overview: (invited paper). In: 2020 IEEE high performance extreme computing conference (HPEC), 2020; p. 1\u20139.","DOI":"10.1109\/HPEC43674.2020.9286147"},{"key":"238_CR48","doi-asserted-by":"crossref","unstructured":"Partala J. Post-quantum cryptography in 6g. In: 6G Mobile Wireless Networks, 2021; pp. 431\u2013448.","DOI":"10.1007\/978-3-030-72777-2_20"},{"key":"238_CR49","unstructured":"Kan K, Une M et al. Recent trends on research and development of quantum computers and standardization of post-quantum cryptography. 2021."},{"key":"238_CR50","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.comcom.2021.05.019","volume":"176","author":"V Chamola","year":"2021","unstructured":"Chamola V, Jolfaei A, Chanana V, Parashari P, Hassija V. Information security in the post quantum era for 5G and beyond networks: threats to existing cryptography, and post-quantum cryptography. Comput Commun. 2021;176:99\u2013118.","journal-title":"Comput Commun"},{"issue":"4","key":"238_CR51","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040038","volume":"5","author":"C Balamurugan","year":"2021","unstructured":"Balamurugan C, Singh K, Ganesan G, Rajarajan M. Post-quantum and code-based cryptography\u2014some prospective research directions. Cryptography. 2021;5(4):38.","journal-title":"Cryptography"},{"key":"238_CR52","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1016\/j.procs.2022.12.086","volume":"215","author":"G Yalamuri","year":"2022","unstructured":"Yalamuri G, Honnavalli P, Eswaran S. A review of the present cryptographic arsenal to deal with post-quantum threats. Proc Comput Sci. 2022;215:834\u201345.","journal-title":"Proc Comput Sci"},{"key":"238_CR53","doi-asserted-by":"crossref","unstructured":"Zeydan E, Turk Y, Aksoy B, Ozturk SB. Recent advances in post-quantum cryptography for networks: a survey. In: 2022 seventh international conference on mobile and secure services (MobiSecServ), 2022; p. 1\u20138.","DOI":"10.1109\/MobiSecServ50855.2022.9727214"},{"key":"238_CR54","doi-asserted-by":"crossref","unstructured":"Bavdekar R, Jayant Chopde E, Agrawal A, Bhatia A, Tiwari K. Post quantum cryptography: a review of techniques, challenges and standardizations. In: 2023 international conference on information networking (ICOIN), 2023; p. 146\u2013151.","DOI":"10.1109\/ICOIN56518.2023.10048976"},{"key":"238_CR55","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2023.2260333","author":"P Sharma","year":"2023","unstructured":"Sharma P, Gupta V, Sood SK. Post-quantum cryptography research landscape: a scientometric perspective. J Comput Inf Syst. 2023. https:\/\/doi.org\/10.1080\/08874417.2023.2260333.","journal-title":"J Comput Inf Syst"},{"key":"238_CR56","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2166261","author":"S Subramani","year":"2023","unstructured":"Subramani S, Svn SK. Review of security methods based on classical cryptography and quantum cryptography. Cybernet Syst. 2023. https:\/\/doi.org\/10.1080\/01969722.2023.2166261.","journal-title":"Cybernet Syst"},{"key":"238_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2023.105112","author":"A Shaller","year":"2023","unstructured":"Shaller A, Zamir L, Nojoumian M. Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures. Inf Comput. 2023. https:\/\/doi.org\/10.1016\/j.ic.2023.105112.","journal-title":"Inf Comput"},{"issue":"3","key":"238_CR58","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7030040","volume":"7","author":"D-T Dam","year":"2023","unstructured":"Dam D-T, Tran T-H, Hoang V-P, Pham C-K, Hoang T-T. A survey of post-quantum cryptography: start of a new race. Cryptography. 2023;7(3):40.","journal-title":"Cryptography"},{"key":"238_CR59","unstructured":"Iqbal SS, Zafar A. A survey on post quantum cryptosystems: concept, attacks, and challenges in iot devices. In: 2023 10th international conference on computing for sustainable global development (INDIACom), 2023; p. 460\u2013465."},{"key":"238_CR60","unstructured":"Liu T, Ramachandran G, Jurdak R. Post-quantum cryptography for internet of things: a survey on performance and optimization, arXiv preprint arXiv:2401.17538, 2024."},{"key":"238_CR61","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2024.3357836","author":"J Xie","year":"2024","unstructured":"Xie J, Zhao W, Lee H, Roy DB, Zhang X. Hardware circuits and systems design for post-quantum cryptography\u2013a tutorial brief. IEEE Trans Circuits Syst II Express Briefs. 2024. https:\/\/doi.org\/10.1109\/TCSII.2024.3357836.","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"238_CR62","doi-asserted-by":"crossref","unstructured":"H. Gharavi, J. Granjal, and E. Monteiro, \u201cPost-quantum blockchain security for the internet of things: Survey and research directions,\u201d IEEE Communications Surveys Tutorials, pp. 1\u20131, 2024.","DOI":"10.36227\/techrxiv.22821692"},{"key":"238_CR63","doi-asserted-by":"crossref","unstructured":"Grote O, Ahrens A, Benavente-Peces C. A review of post-quantum cryptography and crypto-agility strategies. In: 2019 international interdisciplinary PhD workshop (IIPhDW), 2019; p. 115\u2013120.","DOI":"10.1109\/IIPHDW.2019.8755433"},{"key":"238_CR64","doi-asserted-by":"publisher","first-page":"6849","DOI":"10.1109\/OJCOMS.2024.3486649","volume":"5","author":"MA Khan","year":"2024","unstructured":"Khan MA, Javaid S, Mohsan SAH, Tanveer M, Ullah I. Future-proofing security for uavs with post-quantum cryptography: a review. IEEE Open J Commun Soc. 2024;5:6849\u201371.","journal-title":"IEEE Open J Commun Soc"},{"issue":"3","key":"238_CR65","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1111\/1467-8551.00375","volume":"14","author":"D Tranfield","year":"2003","unstructured":"Tranfield D, Denyer D, Smart P. Towards a methodology for developing evidence-informed management knowledge by means of systematic review. Br J Manage. 2003;14(3):207\u201322.","journal-title":"Br J Manage"},{"issue":"2","key":"238_CR66","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1007\/s10586-022-03722-z","volume":"26","author":"AU Khan","year":"2023","unstructured":"Khan AU, Javaid N, Khan MA, Ullah I. A blockchain scheme for authentication, data sharing and non-repudiation to secure internet of wireless sensor things. Cluster Comput. 2023;26(2):945\u201360. https:\/\/doi.org\/10.1007\/s10586-022-03722-z.","journal-title":"Cluster Comput"},{"key":"238_CR67","doi-asserted-by":"crossref","unstructured":"Khan S, Khan M, Khan MA, Khan MA, Wang L, Wu K. A blockchain-enabled ai-driven secure searchable encryption framework for medical IOT systems. IEEE J Biomed Health Inf. 2025; pp. 1\u201314","DOI":"10.1109\/JBHI.2025.3538623"},{"key":"238_CR68","doi-asserted-by":"publisher","first-page":"6953125","DOI":"10.1155\/2022\/6953125","volume":"2022","author":"AS Yahaya","year":"2022","unstructured":"Yahaya AS, Javaid N, Ullah S, Khalid R, Javed MU, Khan RU, et al. A secure and efficient energy trading model using blockchain for a 5G-deployed smart community. Wirel Commun Mob Comput. 2022;2022:6953125. https:\/\/doi.org\/10.1155\/2022\/6953125.","journal-title":"Wirel Commun Mob Comput"},{"key":"238_CR69","doi-asserted-by":"publisher","first-page":"143 198","DOI":"10.1109\/ACCESS.2021.3121037","volume":"9","author":"SJ Nawaz","year":"2021","unstructured":"Nawaz SJ, Sharma SK, Patwary MN, Asaduzzaman M. Next-generation consumer electronics for 6G wireless era. IEEE Access. 2021;9:143 198-143 211.","journal-title":"IEEE Access"},{"key":"238_CR70","doi-asserted-by":"publisher","first-page":"134 578","DOI":"10.1109\/ACCESS.2024.3459041","volume":"12","author":"C Rupa","year":"2024","unstructured":"Rupa C, Malleswari RP, Sultana SA, Abbas M, Sahu AK. Data privacy protection using lucas series based hybrid reversible watermarking approach. IEEE Access. 2024;12:134 578-134 593.","journal-title":"IEEE Access"},{"key":"238_CR71","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1007\/s10586-024-04584-3","volume":"27","author":"D Podder","year":"2024","unstructured":"Podder D, Deb S, Banik D, et al. Robust medical and color image cryptosystem using array index and chaotic s-box. Cluster Comput. 2024;27:4321\u201346. https:\/\/doi.org\/10.1007\/s10586-024-04584-3.","journal-title":"Cluster Comput"},{"key":"238_CR72","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10044-022-01104-0","volume":"26","author":"AK Sahu","year":"2023","unstructured":"Sahu AK, Sahu M, Patro P, Sahu G, Nayak SR. Dual image-based reversible fragile watermarking scheme for tamper detection and localization. Pattern Anal Appl. 2023;26:571\u201390. https:\/\/doi.org\/10.1007\/s10044-022-01104-0.","journal-title":"Pattern Anal Appl"},{"key":"238_CR73","doi-asserted-by":"publisher","first-page":"46 317","DOI":"10.1109\/ACCESS.2019.2909490","volume":"7","author":"SJ Nawaz","year":"2019","unstructured":"Nawaz SJ, Sharma SK, Wyne S, Patwary MN, Asaduzzaman M. Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future. IEEE Access. 2019;7:46 317-46 350.","journal-title":"IEEE Access"},{"issue":"1818","key":"238_CR74","first-page":"97","volume":"100","author":"D Deutsch","year":"1985","unstructured":"Deutsch D. Quantum theory, the church\u2013turing principle and the universal quantum computer. Proc R Soc Lond Math Phys Sci. 1985;100(1818):97\u2013117.","journal-title":"Proc R Soc Lond Math Phys Sci"},{"issue":"7198","key":"238_CR75","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1038\/nature07128","volume":"453","author":"J Clarke","year":"2008","unstructured":"Clarke J, Wilhelm FK. Superconducting quantum bits. Nature. 2008;453(7198):1031\u201342.","journal-title":"Nature"},{"key":"238_CR76","unstructured":"Marella ST, Parisa HSK. Introduction to quantum computing. Quantum Computing and Communications, 2020."},{"key":"238_CR77","doi-asserted-by":"crossref","unstructured":"Riel H. Quantum computing technology. In: 2021 IEEE International Electron Devices Meeting (IEDM). IEEE, 2021; p. 1\u20133.","DOI":"10.1109\/IEDM19574.2021.9720538"},{"key":"238_CR78","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10676-017-9438-0","volume":"19","author":"M Mo\u00a8ller","year":"2017","unstructured":"Mo\u00a8ller M, Vuik C. On the impact of quantum computing technology on future developments in high-performance scientific computing. Ethics Inf Technol. 2017;19:253\u201369.","journal-title":"Ethics Inf Technol"},{"key":"238_CR79","doi-asserted-by":"publisher","DOI":"10.1090\/gsm\/047","volume-title":"Classical and quantum computation","author":"AY Kitaev","year":"2002","unstructured":"Kitaev AY, Shen A, Vyalyi MN. Classical and quantum computation. New York: American Mathematical Society; 2002."},{"issue":"2","key":"238_CR80","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1063\/1.1359716","volume":"54","author":"MA Nielsen","year":"2001","unstructured":"Nielsen MA, Chuang IL. Quantum computation and quantum information. Phys Today. 2001;54(2):60.","journal-title":"Phys Today"},{"issue":"3","key":"238_CR81","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1038\/scientificamerican0308-62","volume":"298","author":"S Aaronson","year":"2008","unstructured":"Aaronson S. The limits of quantum. Sci Am. 2008;298(3):62\u20139.","journal-title":"Sci Am"},{"key":"238_CR82","first-page":"19","volume":"10","author":"WY Seo","year":"2018","unstructured":"Seo WY. Comparing RSA ECC and post quantum cryptography. J Math Anal Appl. 2018;10:19\u201333.","journal-title":"J Math Anal Appl"},{"key":"238_CR83","doi-asserted-by":"crossref","unstructured":"Gajbhiye S, Karmakar S, Sharma M, Sharma S. Paradigm shift from classical cryptography to quantum cryptography. In: 2017 international conference on intelligent sustainable systems (ICISS). IEEE, 2017; pp. 548\u2013555.","DOI":"10.1109\/ISS1.2017.8389231"},{"issue":"1","key":"238_CR84","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11277-022-10110-8","volume":"129","author":"A Ahilan","year":"2023","unstructured":"Ahilan A, Jeyam A. Breaking barriers in conventional cryptography by integrating with quantum key distribution. Wirel Pers Commun. 2023;129(1):549\u201367.","journal-title":"Wirel Pers Commun"},{"issue":"11","key":"238_CR85","doi-asserted-by":"publisher","first-page":"6734","DOI":"10.3390\/app13116734","volume":"13","author":"H-J Shiu","year":"2023","unstructured":"Shiu H-J, Yang C-T, Tsai Y-R, Lin W-C, Lai C-M. Maintaining secure level on symmetric encryption under quantum attack. Appl Sci. 2023;13(11):6734.","journal-title":"Appl Sci"},{"key":"238_CR86","doi-asserted-by":"crossref","unstructured":"Shrivastava P, Soni KK, Rasool A. Evolution of quantum computing based on grover\u2019s search algorithm. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT). IEEE, 2019; pp. 1\u20136.","DOI":"10.1109\/ICCCNT45670.2019.8944676"},{"issue":"1","key":"238_CR87","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s11220-020-00328-w","volume":"22","author":"M Sahu","year":"2021","unstructured":"Sahu M, Padhy N, Gantayat SS, Sahu AK. Shadow image based reversible data hiding using addition and subtraction logic on the lsb planes. Sens Imaging. 2021;22(1):7.","journal-title":"Sens Imaging"},{"key":"238_CR88","unstructured":"[Online]. Available: https:\/\/www.accenture.com\/ar-es\/services\/accenture-labs\/cybersecurity"},{"issue":"9","key":"238_CR89","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S1353-4858(20)30105-7","volume":"2020","author":"F Cavaliere","year":"2020","unstructured":"Cavaliere F, Mattsson J, Smeets B. The security implications of quantum cryptography and quantum computing. Netw Secur. 2020;2020(9):9\u201315.","journal-title":"Netw Secur"},{"key":"238_CR90","unstructured":"Chuang C, Hsu I, Lee T. A generalized distributed RSA key generation. Cryptology ePrint Archive, 2024."},{"key":"238_CR91","doi-asserted-by":"crossref","unstructured":"Rotem L, Segev G. Generically speeding-up repeated squaring is equivalent to factoring: Sharp thresholds for all generic-ring delay functions. In: Annual international cryptology conference. Springer, 2020; p. 481\u2013509.","DOI":"10.1007\/978-3-030-56877-1_17"},{"key":"238_CR92","unstructured":"Benger N. Cryptographic pairings: efficiency and DLP security, Ph.D. dissertation, Dublin City University, 2010."},{"key":"238_CR93","doi-asserted-by":"publisher","first-page":"199 197","DOI":"10.1109\/ACCESS.2020.3033758","volume":"8","author":"I Ullah","year":"2020","unstructured":"Ullah I, Amin NU, Almogren A, Khan MA, Uddin MI, Hua Q. A lightweight and secured certificate-based proxy signcryption (cb-ps) scheme for e-prescription systems. IEEE Access. 2020;8:199 197-199 212.","journal-title":"IEEE Access"},{"key":"238_CR94","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02673-x","volume":"19","author":"J Suo","year":"2020","unstructured":"Suo J, Wang L, Yang S, Zheng W, Zhang J. Quantum algorithms for typical hard problems: a perspective of cryptanalysis. Quantum Inf Process. 2020;19:1\u201326.","journal-title":"Quantum Inf Process"},{"issue":"3","key":"238_CR95","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSPEC.2019.8651931","volume":"56","author":"M Dyakonov","year":"2019","unstructured":"Dyakonov M. When will useful quantum computers be constructed? Not in the foreseeable future, this physicist argues. Here\u2019s why: the case against: quantum computing. IEEE Spectr. 2019;56(3):24\u20139.","journal-title":"IEEE Spectr"},{"issue":"9","key":"238_CR96","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11128-023-04089-9","volume":"22","author":"B-M Zhou","year":"2023","unstructured":"Zhou B-M, Yuan Z. Breaking symmetric cryptosystems using the offline distributed grover-meets-simon algorithm. Quantum Inf Process. 2023;22(9):333.","journal-title":"Quantum Inf Process"},{"key":"238_CR97","unstructured":"Langenberg BW. Quantum circuits for symmetric cryptanalysis, Ph.D. dissertation, Florida Atlantic University, 2018."},{"issue":"5","key":"238_CR98","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2018.3761719","volume":"16","author":"SP Jordan","year":"2018","unstructured":"Jordan SP, Liu Y-K. Quantum cryptanalysis: Shor, Grover, and beyond. IEEE Secur Priv. 2018;16(5):14\u201321.","journal-title":"IEEE Secur Priv"},{"key":"238_CR99","doi-asserted-by":"crossref","unstructured":"Isa H, Bahari I, Sufian H, Z\u2019aba MR, Aes: current security and efficiency analysis of its alternatives. In: 2011 7th international conference on information assurance and security (IAS). IEEE. 2011; pp. 267\u2013274.","DOI":"10.1109\/ISIAS.2011.6122831"},{"key":"238_CR100","doi-asserted-by":"crossref","unstructured":"Alhag NMM, Mohamed YA. An enhancement of data encryption standards algorithm (des). In: 2018 international conference on computer, control, electrical, and electronics engineering (ICCCEEE), 2018; p. 1\u20136.","DOI":"10.1109\/ICCCEEE.2018.8515843"},{"key":"238_CR101","doi-asserted-by":"crossref","unstructured":"Bernstein DJ, The salsa20 family of stream ciphers. In: New stream cipher designs: the eSTREAM finalists. Springer, 2008; p. 84\u201397.","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"238_CR102","doi-asserted-by":"crossref","unstructured":"McGrew DA, Viega J. The security and performance of the galois\/counter mode (gcm) of operation. In: International conference on cryptology in India. Springer, 2004; p. 343\u2013355.","DOI":"10.1007\/978-3-540-30556-9_27"},{"key":"238_CR103","doi-asserted-by":"crossref","unstructured":"Bernstein DJ. The poly1305-aes message-authentication code. In: International workshop on fast software encryption. Springer, 2005; p. 32\u201349.","DOI":"10.1007\/11502760_3"},{"key":"238_CR104","doi-asserted-by":"crossref","unstructured":"Gilbert H, Handschuh H. Security analysis of sha-256 and sisters. In: International workshop on selected areas in cryptography. Springer, 2003; p. 175\u2013193.","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"238_CR105","unstructured":"Dworkin MJ. Sha-3 standard: permutation-based hash and extendable-output functions, 2015."},{"key":"238_CR106","doi-asserted-by":"publisher","first-page":"155 949","DOI":"10.1109\/ACCESS.2021.3129224","volume":"9","author":"R Imam","year":"2021","unstructured":"Imam R, Areeb QM, Alturki A, Anwer F. Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access. 2021;9:155 949-155 976.","journal-title":"IEEE Access"},{"key":"238_CR107","doi-asserted-by":"crossref","unstructured":"Kivinen T, Kojo M. More modular exponential (modp) Diffie\u2013Hellman groups for internet key exchange (ike). Tech Rep. 2003.","DOI":"10.17487\/rfc3526"},{"issue":"2","key":"238_CR108","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser S, Micali S, Rivest RL. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput. 1988;17(2):281\u2013308.","journal-title":"SIAM J Comput"},{"key":"238_CR109","doi-asserted-by":"publisher","DOI":"10.1201\/9781420034981","volume-title":"Handbook of elliptic and hyperelliptic curve cryptography","author":"H Cohen","year":"2005","unstructured":"Cohen H, Frey G, Avanzi R, Doche C, Lange T, Nguyen K, et al. Handbook of elliptic and hyperelliptic curve cryptography. Boca Raton: CRC Press; 2005."},{"key":"238_CR110","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ecdsa). Int J Inf Secur. 2001;1:36\u201363.","journal-title":"Int J Inf Secur"},{"key":"238_CR111","doi-asserted-by":"crossref","unstructured":"N. Farrugia, D. Bonanno, N. Frendo, and A. Xuereb, \u201cPqc and qkd are both required to enable a quantum-safe future,\u201d in Toward a Quantum-Safe Communication Infrastructure. IOS Press, 2024, pp. 24\u201336.","DOI":"10.3233\/NICSP240004"},{"issue":"3","key":"238_CR112","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1007\/s11227-023-05616-2","volume":"80","author":"S Cherbal","year":"2024","unstructured":"Cherbal S, Zier A, Hebal S, Louail L, Annane B. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. J Supercomput. 2024;80(3):3738\u2013816.","journal-title":"J Supercomput"},{"key":"238_CR113","unstructured":"Alnahawi N, Wiesmaier A, Grasmeyer T, Gei\u00dfler J, Zeier A, Bauspie\u00df A, Heinemann A. On the state of post-quantum cryptography migration. 2021."},{"issue":"1","key":"238_CR114","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1109\/TNSM.2024.3487265","volume":"22","author":"MA Khan","year":"2025","unstructured":"Khan MA, Kumar N, Alsamhi SH, Barb G, Zywio\u0142ek J, Ullah I, et al. Security and privacy issues and solutions for UAVs in B5G networks: a review. IEEE Trans Netw Serv Manag. 2025;22(1):892\u2013912.","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"238_CR115","doi-asserted-by":"crossref","unstructured":"Joshi A, Bairwa AK, Pljonkin AP, Garg P, Agrawal K. From pre-quantum to post-quantum rsa. In: Proceedings of the 6th international conference on networking, intelligent systems & security. 2023; p. 1\u20138.","DOI":"10.1145\/3607720.3607721"},{"key":"238_CR116","doi-asserted-by":"crossref","unstructured":"Overbeck R, Sendrier N. Code-based cryptography. In: Post-quantum cryptography. Springer, 2009; p. 95\u2013145.","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"238_CR117","doi-asserted-by":"crossref","unstructured":"Buchmann J, Dahmen E, Szydlo M. Hash-based digital signature schemes. In: Post-quantum cryptography. Springer, 2009; p. 35\u201393.","DOI":"10.1007\/978-3-540-88702-7_3"},{"key":"238_CR118","unstructured":"Wolf C. Multivariate quadratic polynomials in public key cryptography. Cryptology ePrint Archive. 2005."},{"key":"238_CR119","doi-asserted-by":"crossref","unstructured":"Costello C, Longa P, Naehrig M. Efficient algorithms for supersingular isogeny Diffie\u2013Hellman. In: Advances in cryptology\u2014CRYPTO 2016: 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part I 36. Springer, 2016; p. 572\u2013601.","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"238_CR120","doi-asserted-by":"publisher","DOI":"10.1090\/surv\/177","volume-title":"Non-commutative cryptography and complexity of group-theoretic problems","author":"AG Myasnikov","year":"2011","unstructured":"Myasnikov AG, Shpilrain V, Ushakov A. Non-commutative cryptography and complexity of group-theoretic problems. New York: American Mathematical Society; 2011."},{"key":"238_CR121","doi-asserted-by":"crossref","unstructured":"Micciancio D, Regev O. Lattice-based cryptography. In: Post-quantum cryptography. Springer, 2009, p. 147\u2013191.","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"238_CR122","unstructured":"Ding J, Lindner R. Identifying ideal lattices. Cryptology ePrint Archive. 2007."},{"key":"238_CR123","unstructured":"Chi DP, Choi JW, San Kim J, Kim T. Lattice based cryptography for beginners. Cryptology ePrint Archive, 2015."},{"key":"238_CR124","doi-asserted-by":"crossref","unstructured":"Nguyen PQ, Stern J. Lattice reduction in cryptology: an update. In: International algorithmic number theory symposium. Springer, 2000; p. 85\u2013112.","DOI":"10.1007\/10722028_4"},{"key":"238_CR125","unstructured":"Li Y, Ng KS, Purcell M. A tutorial introduction to lattice-based cryptography and homomorphic encryption, arXiv preprint arXiv:2208.08125, 2022."},{"issue":"9","key":"238_CR126","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1093\/nsr\/nwab154","volume":"8","author":"Y Yu","year":"2021","unstructured":"Yu Y. Preface to special topic on lattice-based cryptography. Natl Sci Rev. 2021;8(9):154.","journal-title":"Natl Sci Rev"},{"issue":"4","key":"238_CR127","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/cryptography6040056","volume":"6","author":"H Bandara","year":"2022","unstructured":"Bandara H, Herath Y, Weerasundara T, Alawatugoda J. On advances of lattice-based cryptographic schemes and their implementations. Cryptography. 2022;6(4):56.","journal-title":"Cryptography"},{"key":"238_CR128","doi-asserted-by":"publisher","first-page":"24 184","DOI":"10.1109\/ACCESS.2017.2748179","volume":"5","author":"A Mariano","year":"2017","unstructured":"Mariano A, Laarhoven T, Correia F, Rodrigues M, Falcao G. A practical view of the state-of-the-art of lattice-based cryptanalysis. IEEE Access. 2017;5:24 184-24 202.","journal-title":"IEEE Access"},{"key":"238_CR129","doi-asserted-by":"crossref","unstructured":"Brijwani GN, Ajmire PE, Thawani PV. Future of quantum computing in cyber security. In: Handbook of research on quantum computing for smart environments. IGI Global, 2023; p. 267\u2013298.","DOI":"10.4018\/978-1-6684-6697-1.ch016"},{"issue":"4","key":"238_CR130","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MSP.2017.3151345","volume":"15","author":"N Sendrier","year":"2017","unstructured":"Sendrier N. Code-based cryptography: state of the art and perspectives. IEEE Secur Priv. 2017;15(4):44\u201350.","journal-title":"IEEE Secur Priv"},{"issue":"4","key":"238_CR131","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MSP.2017.3151334","volume":"15","author":"D Butin","year":"2017","unstructured":"Butin D. Hash-based signatures: state of play. IEEE Secur Priv. 2017;15(4):37\u201343.","journal-title":"IEEE Secur Priv"},{"key":"238_CR132","unstructured":"Gheorghiu V, Mosca M. Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes, arXiv preprint arXiv:1902.02332, 2019."},{"key":"238_CR133","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. Boca Raton: CRC Press; 2018."},{"key":"238_CR134","doi-asserted-by":"crossref","unstructured":"Merkle RC. A certified digital signature. In: Conference on the theory and application of cryptology. Springer, 1989; p. 218\u2013238.","DOI":"10.1007\/0-387-34805-0_21"},{"key":"238_CR135","doi-asserted-by":"crossref","unstructured":"Merkle RC. One way hash functions and des. In: Conference on the theory and application of cryptology. Springer, 1989; p. 428\u2013446.","DOI":"10.1007\/0-387-34805-0_40"},{"key":"238_CR136","doi-asserted-by":"crossref","unstructured":"Damga\u02dard IB, A design principle for hash functions. In: Conference on the theory and application of cryptology. Springer, 1989, p. 416\u2013427.","DOI":"10.1007\/0-387-34805-0_39"},{"key":"238_CR137","doi-asserted-by":"crossref","unstructured":"Merkle RC. A digital signature based on a conventional encryption function. In: Conference on the theory and application of cryptographic techniques. Springer, 1987; p. 369\u2013378.","DOI":"10.1007\/3-540-48184-2_32"},{"key":"238_CR138","doi-asserted-by":"crossref","unstructured":"Greconici DO, Kannwischer MJ, Sprenkels A. Compact dilithium implementations on cortex-m3 and cortex-m4. IACR transactions on cryptographic hardware and embedded systems, 2021; p. 1\u201324.","DOI":"10.46586\/tches.v2021.i1.1-24"},{"key":"238_CR139","unstructured":"Amazon Web Services. How to tune tls for hybrid post-quantum cryptography with kyber, https:\/\/aws.amazon.com\/blogs\/security\/how-to-tune-tls-for-hybrid-post-quantum-cryptography-with-kyber\/, 2023. Accessed: 2025-06-19."},{"issue":"2","key":"238_CR140","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/cryptography9020032","volume":"9","author":"M Abbasi","year":"2025","unstructured":"Abbasi M, Cardoso F, V\u00e1z P, Silva J, Martins P. A practical performance benchmark of post-quantum cryptography across heterogeneous computing environments. Cryptography. 2025;9(2):32.","journal-title":"Cryptography"},{"key":"238_CR141","unstructured":"Commey D, Appiah B, Klogo GS, Bagyl-Bac W, Gadze JD. Performance analysis and deployment considerations of post-quantum cryptography for consumer electronics, arXiv preprint arXiv:2505.02239, May 2025, available at: https:\/\/arxiv.org\/abs\/2505.02239."},{"issue":"3","key":"238_CR142","doi-asserted-by":"publisher","first-page":"99","DOI":"10.46586\/tches.v2024.i3.99-135","volume":"2024","author":"T Wang","year":"2024","unstructured":"Wang T, Zhang C, Zhang X, Gu D, Cao P. Optimized hardware\u2013software co-design for kyber and dilithium on risc-v soc fpga. IACR Trans Cryptogr Hardw Embed Syst. 2024;2024(3):99\u2013135.","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"issue":"no. 15","key":"238_CR143","first-page":"2969","volume":"14","author":"T Wang","year":"2024","unstructured":"Wang T, Zhang C, Zhang X, Gu D, Cao P. High-throughput ASIC implementation of kyber post-quantum key encapsulation mechanism. Electronics. 2024;14(15):2969.","journal-title":"Electronics"},{"key":"238_CR144","unstructured":"NIST PQC Standardization Project. Post-quantum cryptography security levels, https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization, 2024."}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00238-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00238-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00238-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T19:03:33Z","timestamp":1763665413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00238-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,20]]},"references-count":144,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["238"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00238-x","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,20]]},"assertion":[{"value":"12 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"139"}}