{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T07:35:35Z","timestamp":1774424135683,"version":"3.50.1"},"reference-count":178,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:00:00Z","timestamp":1770681600000},"content-version":"vor","delay-in-days":14,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00275-6","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:28:23Z","timestamp":1769509703000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Systematic review on securing IoT systems with post quantum cryptography emerging threats, countermeasures, and future research needs"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6079-9369","authenticated-orcid":false,"given":"Ketema","family":"Adere","sequence":"first","affiliation":[]},{"given":"Seble","family":"Hailu","sequence":"additional","affiliation":[]},{"given":"Alemybrah","family":"Tseghai","sequence":"additional","affiliation":[]},{"given":"Gizachew","family":"Haile","sequence":"additional","affiliation":[]},{"given":"Bereket","family":"Tamirat","sequence":"additional","affiliation":[]},{"given":"Wudu","family":"Bitew","sequence":"additional","affiliation":[]},{"given":"Mesfin","family":"Abebe","sequence":"additional","affiliation":[]},{"given":"Ararso","family":"Kemal","sequence":"additional","affiliation":[]},{"given":"Semere W.","family":"Silassie","sequence":"additional","affiliation":[]},{"given":"Dereje","family":"Regassa","sequence":"additional","affiliation":[]},{"given":"Zelalem","family":"Gizachew","sequence":"additional","affiliation":[]},{"given":"Wengelawit","family":"Alemu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"key":"275_CR1","first-page":"9","volume":"12","author":"GB Satrya","year":"2023","unstructured":"Satrya GB, Agus YM, Mnaouer AB. A comparative study of post-quantum cryptographic algorithm implementations for secure and efficient energy systems monitoring. Electron (Switzerland). 2023;12:9.","journal-title":"Electron (Switzerland)"},{"key":"275_CR2","doi-asserted-by":"crossref","unstructured":"Fernandez-Carames TM. 7, From pre-quantum to post-quantum Iot security: A survey on quantum-resistant cryptosystems for the internet of things, pp. 6457\u201380, 2020.","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"275_CR3","first-page":"10","volume":"27","author":"O Popoola","year":"2024","unstructured":"Popoola O, Rodrigues MA, Marchang J, Shenfield A, Ikpehai A, Popoola J. An optimized hybrid encryption framework for smart home healthcare: ensuring data confidentiality and security. Internet Things (Netherlands). 2024;27:10.","journal-title":"Internet Things (Netherlands)"},{"key":"275_CR4","doi-asserted-by":"publisher","first-page":"9851","DOI":"10.1109\/ACCESS.2023.3240304","volume":"11","author":"X Tao","year":"2023","unstructured":"Tao X, Qiang Y, Wang P, Wang Y. Lmibe: Lattice-based matchmaking identity-based encryption for internet of things. IEEE Access. 2023;11:9851\u20138.","journal-title":"IEEE Access"},{"key":"275_CR5","doi-asserted-by":"crossref","unstructured":"Javeed D, Saeed MS, Ahmad I, Adil M, Kumar P, Islam AN. Quantum-empowered federated learning and 6\u00a0g wireless networks for iot security: Concept, challenges and future directions. Future Generation Comput Syst, 2024.","DOI":"10.36227\/techrxiv.170259169.96559894\/v1"},{"key":"275_CR6","doi-asserted-by":"crossref","unstructured":"Eckel M, Gutsche T, Lauer H, Rein A. A generic iot quantum-safe watchdog timer protocol, in Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, pp. 1\u201310.","DOI":"10.1145\/3600160.3605169"},{"key":"275_CR7","doi-asserted-by":"crossref","unstructured":"Samiullah F, Gan M-L, Akleylek S, Aun Y. Quantum resistance saber-based group key exchange protocol for iot, IEEE Open Journal of the Communications Society, vol. 6, pp. 378\u2013398, 2025. [Online]. Available: https:\/\/ieeexplore.ieee.org\/document\/10793121\/","DOI":"10.1109\/OJCOMS.2024.3516005"},{"key":"275_CR8","doi-asserted-by":"crossref","unstructured":"Mangala N, B ER, Venugopal KR. Lightweight ring learning with errors cryptographic scheme for secure cloud-iot systems, in 2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/ICCCNT56998.2023.10306355"},{"key":"275_CR9","doi-asserted-by":"crossref","unstructured":"Ma C, Colon L, Dera J, Rashidi B, Garg V. Caraf: Crypto agility risk assessment framework, Journal of Cybersecurity, vol. 7, 2021.","DOI":"10.1093\/cybsec\/tyab013"},{"key":"275_CR10","doi-asserted-by":"crossref","unstructured":"Kollannur AS, Manoj BS. A novel homomorphic computing approach of edge internet of things, in 2023 IEEE 4th Annual Flagship India Council International Subsections Conference: Computational Intelligence and Learning Systems, INDISCON 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/INDISCON58499.2023.10270401"},{"key":"275_CR11","doi-asserted-by":"crossref","unstructured":"Xu D, Wang X, Hao Y, Zhang Z, Hao Q, Zhou Z. A more accurate and robust binary ring-lwe decryption scheme and its hardware implementation for Iot devices. IEEE Trans Very Large Scale Integr VLSI Syst. 8 2022;30:1007\u201319.","DOI":"10.1109\/TVLSI.2022.3174205"},{"key":"275_CR12","doi-asserted-by":"crossref","unstructured":"Ebrahimi S, Bayat-Sarmadi S. Lightweight and fault-resilient implementations of binary ring-lwe for Iot devices. IEEE Internet Things J. 8 2020;7:6970\u20138.","DOI":"10.1109\/JIOT.2020.2979318"},{"key":"275_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.micpro.2021.104280","volume":"84","author":"K Shahbazi","year":"2021","unstructured":"Shahbazi K, Ko SB. Area and power efficient post-quantum cryptosystem for Iot resource-constrained devices. Microprocess Microsyst. 2021;84:7.","journal-title":"Microprocess Microsyst"},{"key":"275_CR14","first-page":"771","volume":"24","author":"ZA Abdulkader","year":"2021","unstructured":"Abdulkader ZA. A secure Iot system using quantum cryptography with block cipher. J Appl Sci Eng. 2021;24:771\u20136.","journal-title":"J Appl Sci Eng"},{"key":"275_CR15","first-page":"5","volume":"58","author":"K Seyhan","year":"2021","unstructured":"Seyhan K, Nguyen TN, Akleylek S, Cengiz K, Islam SK. Bi-gisis ke: modified key exchange protocol with reusable keys for Iot security. J Inform Secur Appl. 2021;58:5.","journal-title":"J Inform Secur Appl"},{"key":"275_CR16","doi-asserted-by":"crossref","unstructured":"Wang P, Chen B, Xiang T, Wang Z. Lattice-based public key searchable encryption with fine-grained access control for edge computing. Future Generation Comput Syst. 2 2022;127:373\u201383.","DOI":"10.1016\/j.future.2021.09.012"},{"key":"275_CR17","doi-asserted-by":"crossref","unstructured":"Ageed ZS, Zeebaree SR, Saeed RH. Influence of quantum computing on iot using modern algorithms, in ICOASE 2022\u20134th International Conference on Advanced Science and Engineering. Institute of Electrical and Electronics Engineers Inc., 2022, pp. 194\u2013199.","DOI":"10.1109\/ICOASE56293.2022.10075583"},{"key":"275_CR18","doi-asserted-by":"crossref","unstructured":"Poorani S, Anitha R. A cognitive distortion based bb84 protocol for data transmission in intelligent system, in 6th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., pp. 680\u2013685, 2022.","DOI":"10.1109\/ICECA55336.2022.10009227"},{"key":"275_CR19","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1016\/j.procs.2023.01.195","volume":"218","author":"D Chawla","year":"2023","unstructured":"Chawla D, Mehra PS. A survey on quantum computing for internet of things security. Procedia Comput Sci. 2023;218:2191\u2013200.","journal-title":"Procedia Comput Sci"},{"issue":"2","key":"275_CR20","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1049\/qtc2.12079","volume":"5","author":"MS Peelam","year":"2024","unstructured":"Peelam MS, Rout AA, Chamola V. Quantum computing applications for internet of things. IET Quantum Communication. 2024;5(2):103\u201312.","journal-title":"IET Quantum Communication"},{"key":"275_CR21","doi-asserted-by":"publisher","first-page":"100950","DOI":"10.1016\/j.iot.2023.100950","volume":"24","author":"D Chawla","year":"2023","unstructured":"Chawla D, Mehra PS. A roadmap from classicalcryptography to post-quantum resistant cryptography for 5G-enabled IoT: challenges,opportunities and solutions. Internet Things. 2023;24:100950. https:\/\/doi.org\/10.1016\/j.iot.2023.100950","journal-title":"Internet Things"},{"key":"275_CR22","unstructured":"Saarinen M-JO. Mobile energy requirements of the upcoming nist post-quantum cryptography standards, 12 2019. [Online]. Available: http:\/\/arxiv.org\/abs\/1912.00916"},{"key":"275_CR23","doi-asserted-by":"crossref","unstructured":"Fitzgibbon G, Ottaviani C. Constrained device performance benchmarking with the implementation of post-quantum cryptography. Cryptography, 8, 2024.","DOI":"10.3390\/cryptography8020021"},{"key":"275_CR24","doi-asserted-by":"crossref","unstructured":"Liu G, Han J, Zhou Y, Liu T, Chen J. Qslt: A quantum-based lightweight transmission mechanism against eavesdropping for iot networks, Wireless Communications and Mobile Computing, vol. 2022, 2022.","DOI":"10.1155\/2022\/4809210"},{"key":"275_CR25","doi-asserted-by":"crossref","unstructured":"Takalkar A, Shiragapur B. Quantum cryptography: Mathematical modelling and security analysis, in 2023 3rd Asian Conference on Innovation in Technology, ASIANCON 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/ASIANCON58793.2023.10270593"},{"key":"275_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1038\/s41598-024-82256-3","volume":"14","author":"A Shafique","year":"2024","unstructured":"Shafique A, Naqvi SAA, Raza A, Ghalaii M, Papanastasiou P, McCann J, Abbasi QH, Imran MA. A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in iot-based telemedicine networks. Sci Rep. 2024;14:12.","journal-title":"Sci Rep"},{"key":"275_CR27","doi-asserted-by":"crossref","unstructured":"Jasoliya H, Shah K. An exploration to the quantum cryptography technology, in 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2022, pp. 506\u2013510.","DOI":"10.23919\/INDIACom54597.2022.9763109"},{"key":"275_CR28","doi-asserted-by":"crossref","unstructured":"Al-Mohammed HA, Yaacoub E. On the use of quantum communications for securing iot devices in the 6\u00a0g era, in 2021 IEEE International Conference on Communications Workshops, ICC Workshops 2021 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 6 2021.","DOI":"10.1109\/ICCWorkshops50388.2021.9473793"},{"key":"275_CR29","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/ACCESS.2020.2995801","volume":"8","author":"I Mustafa","year":"2020","unstructured":"Mustafa I, Khan IU, Aslam S, Sajid A, Mohsin SM, Awais M, Qureshi MB. A lightweight post-quantum lattice-based Rsa for secure communications. IEEE Access. 2020;8:273\u201399285.","journal-title":"IEEE Access"},{"key":"275_CR30","doi-asserted-by":"crossref","unstructured":"Shi Y, Qiu S, Liu J, Ma T. Novel efficient lattice-based Ibe schemes with Cpk for fog computing. Math Biosci Eng. 11 2020;17:8105\u201322.","DOI":"10.3934\/mbe.2020411"},{"key":"275_CR31","unstructured":"B MNER. and V. K. R., Light weight circular error learning algorithm (cela) for secure data communication protocol in iot-cloud systems, International Journal of Advanced Computer Science and Applications, 2023. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:260462154"},{"key":"275_CR32","doi-asserted-by":"crossref","unstructured":"Lu J, Zhang J, Luo Z, Li A, Huang T, Liu D, Cheng C. An efficient and configurable hardware architecture of polynomial modular operation for crystals-kyber and dilithium, in Midwest Symposium on Circuits and Systems. Institute of Electrical and Electronics Engineers Inc., 2024, pp. 29\u201332.","DOI":"10.1109\/MWSCAS60917.2024.10658892"},{"key":"275_CR33","doi-asserted-by":"crossref","unstructured":"Chen LQ, Zhu WX, Tu TY, Wang Z. Lattice-based daa cross-domain authentication protocol for internet of things, in 2023 9th International Conference on Computer and Communications, ICCC 2023. Institute of Electrical and Electronics Engineers Inc., 2023, pp. 1315\u20131321.","DOI":"10.1109\/ICCC59590.2023.10507475"},{"key":"275_CR34","doi-asserted-by":"crossref","unstructured":"Tang Y, Ba Y, Li L, Wang X, Yan X. Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for Iiot. Cluster Comput. 8 2022;25:2305\u201316.","DOI":"10.1007\/s10586-021-03488-w"},{"key":"275_CR35","doi-asserted-by":"crossref","unstructured":"Fan Q, He D, Chen J, Peng C, Wang L. Isoga: An isogeny-based quantum-resist searchable encryption scheme against keyword guessing attacks, IEEE Systems Journal, vol. 17, pp. 2101\u20132112, 6 2023.","DOI":"10.1109\/JSYST.2022.3182788"},{"key":"275_CR36","unstructured":"Murti NCGSYMAMA, Kurniawan F. An efficient implementation of Ntru encryption in post-quantum internet of things. IEEE, 2020."},{"key":"275_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2024.110885","volume":"256","author":"W Xiong","year":"2025","unstructured":"Xiong W, Wang Y, Wei Y. Ntru-cls: efficient quantum-resistant Ntru lattice-based certificateless signature scheme for Vanets. Comput Netw. 2025;256:1.","journal-title":"Comput Netw"},{"key":"275_CR38","doi-asserted-by":"crossref","unstructured":"Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P, Seiler G, Stehle D. Crystals - kyber: A cca-secure module-lattice-based kem, in Proceedings \u2013\u20093rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. Institute of Electrical and Electronics Engineers Inc., 7 2018, pp. 353\u2013367.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"275_CR39","doi-asserted-by":"crossref","unstructured":"Ye Z, Song R, Zhang H, Chen D, Cheung RCC, Huang K. A highly-efficient lattice-based post-quantum cryptography processor for iot applications, IACR Transactions on Cryptographic Hardware and Embedded Systems, vol. 2024, pp. 130\u2013153, 3 2024.","DOI":"10.46586\/tches.v2024.i2.130-153"},{"key":"275_CR40","doi-asserted-by":"crossref","unstructured":"Pankov KN, Glukhov MM. Estimation of the power of algebraic geometric codes designed to construct a post-quantum algorithm for ensuring information security of on-board systems, in 2023 Systems of Signals Generating and Processing in the Field of on Board Communications, SOSG 2023 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/IEEECONF56737.2023.10092118"},{"issue":"381","key":"275_CR41","first-page":"356","volume":"8","author":"OS Althobaiti","year":"2020","unstructured":"Althobaiti OS, Dohler M. Cybersecurity challenges associated with the internet of things in a post-quantum world. IEEE Access. 2020;8(381):356\u2013157.","journal-title":"IEEE Access"},{"key":"275_CR42","doi-asserted-by":"crossref","unstructured":"Gao Y, Feng W, He L, Dong M. Novel and efficient rainbow signature scheme based on circulant and Toeplitz matrices for intelligent Iot. IEEE Internet Things J, 2024.","DOI":"10.1109\/JIOT.2024.3496732"},{"key":"275_CR43","doi-asserted-by":"crossref","unstructured":"Magyari A, Chen Y. Post-quantum securesensor networks: Combining ascon and sphincs+, in 2024 IEEE 4th International Conference on Electronic Communications, Internet of Things and Big Data, ICEIB 2024. Institute of Electrical and Electronics Engineers Inc., 2024, pp. 139\u2013144.","DOI":"10.1109\/ICEIB61477.2024.10602653"},{"key":"275_CR44","doi-asserted-by":"crossref","unstructured":"Berthet Q, Upegui A, Gantel L, Duc A, Traverso G. An area-efficient sphincs\u2009+\u2009post-quantum signature coprocessor, in 2021 IEEE International Parallel and Distributed Processing Symposium Workshops, IPDPSW 2021 - In conjunction with IEEE IPDPS 2021. Institute of Electrical and Electronics Engineers Inc., 6 2021, pp. 180\u2013187.","DOI":"10.1109\/IPDPSW52791.2021.00034"},{"key":"275_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s22020489","volume":"22","author":"JA Septien-Hernandez","year":"2022","unstructured":"Septien-Hernandez JA, Arellano-Vazquez M, Contreras-Cruz MA, Ramirez-Paredes JP. A comparative study of post-quantum cryptosystems for internet-of-things applications. Sensors. 2022;22:1.","journal-title":"Sensors"},{"key":"275_CR46","doi-asserted-by":"publisher","unstructured":"Nouma SE, Yavuz AA. Lightweight digital signatures for Internet of Things: current and post-quantum trendsand visions. In:, Computing S. (DSC). IEEE; 2023. pp. 1\u20137. https:\/\/doi.org\/10.1109\/DSC61021.2023.10354177.","DOI":"10.1109\/DSC61021.2023.10354177"},{"key":"275_CR47","doi-asserted-by":"crossref","unstructured":"Borhan R, Hossain MD, Taenaka Y, Kadobayashi Y, Iosha - an enhanced hash function for secure and efficient key generation in crystals-dilithium for iot, in Proceedings \u2013\u20092024 International Conference on Quantum Communications, Networking, and, Computing QCNC. 2024. Institute of Electrical and Electronics Engineers Inc., 2024, pp. 244\u2013252.","DOI":"10.1109\/QCNC62729.2024.00046"},{"key":"275_CR48","doi-asserted-by":"crossref","unstructured":"Hadayeghparast S, Bayat-Sarmadi S, Ebrahimi S. High-speed post-quantum cryptoprocessor based on risc-v architecture for Iot. IEEE Internet Things J, 9, pp. 15 839\u201315 846, 9 2022.","DOI":"10.1109\/JIOT.2022.3152850"},{"key":"275_CR49","doi-asserted-by":"crossref","unstructured":"Ahmad A, Jagatheswari S. Quantum safe multi-factor user authentication protocol for cloud assisted medical Iot. IEEE Access, 2024.","DOI":"10.1109\/ACCESS.2024.3523530"},{"key":"275_CR50","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/sym14112351","volume":"14","author":"OS Althobaiti","year":"2022","unstructured":"Althobaiti OS, Mahmoodi T, Dohler M. Intelligent bio-latticed cryptography: A quantum-proof efficient proposal. Symmetry. 2022;14:11.","journal-title":"Symmetry"},{"key":"275_CR51","first-page":"8","volume":"76","author":"S Shaw","year":"2023","unstructured":"Shaw S, Dutta R. A quantum resistant multi-user signcryption scheme featuring key invisibility for internet of things. J Inform Secur Appl. 2023;76:8.","journal-title":"J Inform Secur Appl"},{"issue":"384","key":"275_CR52","first-page":"370","volume":"11","author":"Y Hou","year":"2024","unstructured":"Hou Y, Yao W, Li X, Xia Y, Wang M. Lattice-based semantic-aware searchable encryption for internet of things. IEEE Internet Things J. 2024;11(384):370\u201328.","journal-title":"IEEE Internet Things J"},{"key":"275_CR53","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.future.2024.107634","volume":"166","author":"A Braeken","year":"2025","unstructured":"Braeken A. Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using Ecc and Kem. Future Generation Comput Syst. 2025;166:5.","journal-title":"Future Generation Comput Syst"},{"key":"275_CR54","unstructured":"NNAN. I Upasana, NTRU and RSA cryptosystems for data security in IoT environment. IEEE, 2020."},{"key":"275_CR55","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/s23229111","volume":"23","author":"X Hua","year":"2023","unstructured":"Hua X, Li D, Fu Y, Zhu Y, Jiang Y, Zhou J, Yang X, Tan Y. Hierarchical controlled hybrid quantum communication based on six-qubit entangled States in Iot. Sensors. 2023;23:11.","journal-title":"Sensors"},{"key":"275_CR56","doi-asserted-by":"crossref","unstructured":"Kumar A, Ottaviani C, Gill SS, Buyya R. Securing the future internet of things with post-quantum cryptography, Security and Privacy, vol. 5, 2021. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:245085183","DOI":"10.1002\/spy2.200"},{"key":"275_CR57","doi-asserted-by":"crossref","unstructured":"Shim KA. A survey on post-quantum public-key signature schemes for secure vehicular communications. IEEE Trans Intell Transp Syst. 9 2022;23(042):025\u201314.","DOI":"10.1109\/TITS.2021.3131668"},{"key":"275_CR58","doi-asserted-by":"crossref","unstructured":"Singh H, Shailendra, Hasabnis AR. Securing iot in quantum world, in 2023 3rd International Conference on Intelligent Technologies, CONIT 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/CONIT59222.2023.10205538"},{"key":"275_CR59","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.comnet.2022.109327","volume":"217","author":"S Kumari","year":"2022","unstructured":"Kumari S, Singh M, Singh R, Tewari H. A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for Iot devices. Comput Netw. 2022;217:11.","journal-title":"Comput Netw"},{"key":"275_CR60","doi-asserted-by":"crossref","unstructured":"Page MJ, McKenzie JE, Bossuyt PMM, Boutron I, Hoffmann TC, Mulrow CD, Shamseer L, Tetzlaff JM, Akl EA, Brennan SE, Chou R, Glanville JM, Grimshaw JM, Hro\u02dcbjartsson A, Lalu MM, Li T, Loder EW, Mayo-Wilson E, McDonald S, McGuinness LA, Stewart LA, Thomas J, Tricco AC, Welch VA, Whiting PF, Moher D. The prisma 2020 statement: an updated guideline for reporting systematic reviews, Systematic Reviews, vol. 10, 2020. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:232387120.","DOI":"10.31222\/osf.io\/v7gm2_v1"},{"key":"275_CR61","doi-asserted-by":"crossref","unstructured":"An S, Seo SC. Efficient parallel implementations of lwe-based post-quantum cryptosystems on graphics processing units. Mathematics. 10 2020;8:1\u201321.","DOI":"10.3390\/math8101781"},{"key":"275_CR62","doi-asserted-by":"crossref","unstructured":"Alagic G, Apon D, Cooper D, Dang Q, Dang T, Kelsey J, Lichtinger J, Liu Y-K, Miller C, Moody D, Peralta R, Perlner R, Robinson A, Smith-Tone D. Status report on the third round of the NIST post-quantum cryptography standardization process, National Institute of Standards and Technology, Tech. Rep., 9 2022. Available: https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8413-upd1.pdf","DOI":"10.6028\/NIST.IR.8413"},{"key":"275_CR63","doi-asserted-by":"crossref","unstructured":"Chung CC, Pai CC, Ching FS, Wang C, Chen LJ. When post-quantum cryptography meets the internet of things: An empirical study, in MobiSys 2022 - Proceedings of the 2022 20th Annual International Conference on Mobile Systems, Applications and Services. Association for Computing Machinery, Inc, 6 2022, pp. 525\u2013526.","DOI":"10.1145\/3498361.3538766"},{"key":"275_CR64","doi-asserted-by":"crossref","unstructured":"Allu SN, Tentu AN, Kancharla GR. An efficient quantum cryptanalysis of lightweight hash function - photon-beetle, in 2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 2023, pp. 1604\u20131610.","DOI":"10.1109\/ICACRS58579.2023.10404523"},{"key":"275_CR65","doi-asserted-by":"crossref","unstructured":"Roy KS, Deb S, Kalita HK. A novel hybrid authentication protocol utilizing lattice-based cryptography for Iot devices in fog networks. Digit Commun Networks. 8 2024;10:989\u20131000.","DOI":"10.1016\/j.dcan.2022.12.003"},{"key":"275_CR66","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/s22218151","volume":"22","author":"S Shamshad","year":"2022","unstructured":"Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S. An enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy \u2020. Sensors. 2022;22:11.","journal-title":"Sensors"},{"key":"275_CR67","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/app14104215","volume":"14","author":"J Choi","year":"2024","unstructured":"Choi J, Lee J. Secure and scalable internet of things model using post-quantum macsecsecure. Appl Sci (Switzerland). 2024;14:5. https:\/\/doi.org\/10.3390\/app14104215","journal-title":"Appl Sci (Switzerland)"},{"key":"275_CR68","doi-asserted-by":"crossref","unstructured":"Paul S, Schick F, Seedorf J. Tpm-based post-quantum cryptography: A case study on quantum-resistant and mutually authenticated tls for iot environments, in ACM International Conference Proceeding Series. Association for Computing Machinery, 8 2021.","DOI":"10.1145\/3465481.3465747"},{"key":"275_CR69","doi-asserted-by":"crossref","unstructured":"Sarkar P, Nag A. Lattice-based device-to-device authentication and key exchange protocol for Iot system. Int J Inform Technol (Singapore), 10 2024.","DOI":"10.1007\/s41870-024-02049-9"},{"key":"275_CR70","doi-asserted-by":"crossref","unstructured":"Nouma SE, Yavuz AA. Post-quantum forward-secure signatures with hardware-support for internet of things, in IEEE International Conference on Communications, vol. 2023-May. Institute of Electrical and Electronics Engineers Inc., 2023, pp. 4540\u20134545.","DOI":"10.1109\/ICC45041.2023.10279236"},{"key":"275_CR71","doi-asserted-by":"crossref","unstructured":"Ati M. Implementation of quantum cryptography for securing iot devices, in 4th International Conference on Electrical, Communication and Computer Engineering, ICECCE 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/ICECCE61019.2023.10442918"},{"key":"275_CR72","doi-asserted-by":"crossref","unstructured":"Zhang J, Huang J, Liu Z, Member S, Roy SS. Time-memory trade-offs for saber\u2009+\u2009on memory-constrained risc-v, Tech. Rep., 2022. [Online]. Available: https:\/\/github.com\/pq-crystals\/kyber\/","DOI":"10.1109\/TC.2022.3143441"},{"key":"275_CR73","doi-asserted-by":"crossref","unstructured":"Asif R. 3, Post-quantum cryptosystems for internet-of-things: A survey on lattice-based algorithms, pp. 71\u201391, 2021.","DOI":"10.3390\/iot2010005"},{"issue":"23","key":"275_CR74","doi-asserted-by":"publisher","first-page":"24122","DOI":"10.1109\/JIOT.2022.3189210","volume":"9","author":"D Xu","year":"2022","unstructured":"Xu D, Wang X, Hao Y, Zhang Z, Hao Q, Jia H, Dong H, Zhang L. Ring-ExpLWE: ahigh-performance and lightweight post-quantum encryption scheme for resource-constrained IoT devices. IEEE Internet Things J. 2022;9(23):24122\u201334. https:\/\/doi.org\/10.1109\/JIOT.2022.3189210","journal-title":"IEEE Internet Things J"},{"key":"275_CR75","doi-asserted-by":"publisher","unstructured":"Khademhamedani B, Izadi M, Izadi N, Najari A. Implementation of public key code system basedon polar codes on a minicomputer. In: 7th International Conference on Internet of Things and Applications (IoT); 2023; [Location unknown]. IEEE; 2023. https:\/\/doi.org\/10.1109\/IoT60973.2023.10365368","DOI":"10.1109\/IoT60973.2023.10365368"},{"key":"275_CR76","doi-asserted-by":"crossref","unstructured":"Roma\u00b4n R, Baturone I. Sealed storage for low-cost iot devices: An approach using sram pufs and post-quantum cryptography, in ACM International Conference Proceeding Series. Association for Computing Machinery, 11 2021, pp. 54\u201359.","DOI":"10.1145\/3487405.3487651"},{"key":"275_CR77","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/s22186741","volume":"22","author":"KK Singamaneni","year":"2022","unstructured":"Singamaneni KK, Dhiman G, Juneja S, Muhammad G, AlQahtani SA, Zaki J. A novel Qkd approach to enhance Iiot privacy and computational knacks. Sensors. 2022;22:9.","journal-title":"Sensors"},{"key":"275_CR78","unstructured":"J. Z. YZ, Yu XMX, Chen W. Residual-adaptive key provisioning in Quantum-Key-Distribution enhanced internet of things (Q-IoT). IEEE, 2020."},{"key":"275_CR79","first-page":"3","volume":"35","author":"D Chawla","year":"2024","unstructured":"Chawla D, Mehra PS. Qaka: A novel quantum authentication and key agreement (qaka) protocol using quantum entanglement for secure communication among Iot devices. Trans Emerg Telecommunications Technol. 2024;35:3.","journal-title":"Trans Emerg Telecommunications Technol"},{"key":"275_CR80","unstructured":"Wang K. 5, Secure authentication of identity information for quantum resistant Iot devices based on r-lwe and Qibe. J Cyber Secur Technol, pp. 1\u201318, 2024."},{"key":"275_CR81","doi-asserted-by":"crossref","unstructured":"Liu Z-Y, Tseng Y-F, Tso R, Mambo M, Chen Y-C. Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation. Tech Rep, 2021.","DOI":"10.1093\/comjnl\/bxab119"},{"key":"275_CR82","doi-asserted-by":"publisher","unstructured":"Ristov R, Koceski S. Quantum resilient public key cryptography in Internet of Things. In: 202312th Mediterranean Conference on Embedded Computing (MECO); 2023; Budva,Montenegro. IEEE; 2023. pp. 1\u20134. https:\/\/doi.org\/10.1109\/MECO58584.2023.10154994","DOI":"10.1109\/MECO58584.2023.10154994"},{"key":"275_CR83","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/3638250","volume":"20","author":"SE Nouma","year":"2024","unstructured":"Nouma SE, Yavuz AA. Trustworthy and efficient digital twins in post-quantum era with hybrid hardware-assisted signatures. ACM Trans Multimedia Comput Commun Appl. 2024;20:3.","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"275_CR84","doi-asserted-by":"crossref","unstructured":"Kornaros G, Berki G, Grammatikakis MD. Quantum-secure communication for trusted edge computing with iot devices, in IFIP International Information Security Conference, 2023. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:269604196","DOI":"10.1007\/978-3-031-56326-3_12"},{"key":"275_CR85","doi-asserted-by":"publisher","unstructured":"Minhas NN, Mansoor K. Edge computing-based scheme for post-quantum IoT security for e-health. IEEE Internet Things J. 2024. https:\/\/doi.org\/10.1109\/JIOT.2024.3418959","DOI":"10.1109\/JIOT.2024.3418959"},{"key":"275_CR86","doi-asserted-by":"crossref","unstructured":"Krishna HV, Sekhar KR. Enhancing security in Iiot applications through efficient quantum key exchange and advanced encryption standard. Soft Comput. 2 2024;28:2671\u201381.","DOI":"10.1007\/s00500-023-09585-9"},{"key":"275_CR87","doi-asserted-by":"publisher","unstructured":"Cyprys P, Dolev S, Margalit O. Post-quantum lightweight OWF candidates: based on theoretically secureprimitives: xors, error detection codes, permutations, polynomials, interaction, and nesting(short version). Cyber Security, Cryptology, and Machine Learning. CSCML 2024. Cham: Springer; 2024. pp. 322\u201334. https:\/\/doi.org\/10.1007\/978-3-031-76934-4_23","DOI":"10.1007\/978-3-031-76934-4_23"},{"key":"275_CR88","unstructured":"pp. 3532\u20133545, 2025. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:275161600"},{"key":"275_CR89","doi-asserted-by":"crossref","unstructured":"Khalimov G, Kotukh YV, Khalimova S. Improved encryption scheme based on the automorphism group of the ree function field, 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), pp. 1\u20137, 2021. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:234500066","DOI":"10.1109\/IEMTRONICS52119.2021.9422514"},{"key":"275_CR90","doi-asserted-by":"publisher","unstructured":"Khan MAMA, Puri D. Challenges and opportunities in implementing quantum-safe key distribution in IoT devices. In: 2024 3rd International Conference for Innovation inTechnology (INOCON); 2024; [Location unknown]. IEEE; 2024. https:\/\/doi.org\/10.1109\/INOCON60754.2024.10511390","DOI":"10.1109\/INOCON60754.2024.10511390"},{"key":"275_CR91","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1038\/s41598-024-84427-8","volume":"15","author":"J Xiong","year":"2025","unstructured":"Xiong J, Shen L, Liu Y, Fang X. Enhancing IoT security in smart grids with quantum-resistant hybrid encryption. Sci Rep. 2025;15:3. https:\/\/doi.org\/10.1038\/s41598-024-84427-8","journal-title":"Sci Rep"},{"key":"275_CR92","first-page":"12","volume":"24","author":"D Chawla","year":"2023","unstructured":"Chawla D, Mehra PS. Qsmah: A novel quantum-based secure cryptosystem using mutual authentication for healthcare in the internet of things. Internet Things (Netherlands). 2023;24:12.","journal-title":"Internet Things (Netherlands)"},{"key":"275_CR93","doi-asserted-by":"crossref","unstructured":"Prajapat S, Kumar P, Kumar S, Das AK, Shetty S, Hossain MS. Designing high-performance identity-based quantum signature protocol with strong security. IEEE Access, 12, p. 14 647\u201314 658, 2024.","DOI":"10.1109\/ACCESS.2024.3355196"},{"issue":"10","key":"275_CR94","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1002\/spe.3121","volume":"52","author":"S Kumari","year":"2022","unstructured":"Kumari S, Singh M, Singh R, Tewari H. Post-quantumcryptography techniques for secure communication in resource-constrained Internet of Thingsdevices: a comprehensive survey. Softw Pract Exp. 2022;52(10):2047\u201376. https:\/\/doi.org\/10.1002\/spe.3121","journal-title":"Softw Pract Exp"},{"key":"275_CR95","doi-asserted-by":"publisher","unstructured":"Liu, B., Zhang, X., Shi,R., Zhang, M. and Zhang, G. SEPSI: a secure and efficient privacy-preserving set intersection withidentity authentication in IoT. Mathematics. 2022;10(12):22120 https:\/\/doi.org\/10.3390\/math10122120","DOI":"10.3390\/math10122120"},{"key":"275_CR96","doi-asserted-by":"crossref","unstructured":"Mohanty T, Srivastava V, Debnath SK, Das AK, Sikdar BK. Quantum secure threshold private set intersection protocol for iot-enabled privacy-preserving ride-sharing application, IEEE Internet of Things Journal, vol. 11, pp. 1761\u20131772, 2024. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:259709010","DOI":"10.1109\/JIOT.2023.3291132"},{"issue":"203","key":"275_CR97","first-page":"185","volume":"9","author":"OS Althobaiti","year":"2021","unstructured":"Althobaiti OS, Dohler M. Quantum-resistant cryptography for the internet of things based on location-based lattices. IEEE Access. 2021;9(203):185\u2013133.","journal-title":"IEEE Access"},{"key":"275_CR98","unstructured":"Banegas G, Zandberg K, Herrmann A, Baccelli E, Smith B. Quantum-resistant security for software updates on low-power networked embedded devices, 6 2021. [Online]. Available: http:\/\/arxiv.org\/abs\/2106.05577"},{"key":"275_CR99","doi-asserted-by":"crossref","unstructured":"Lee WK, Hwang SO. High throughput implementation of post-quantum key encapsulation and decapsulation on Gpu for internet of things applications. IEEE Trans Serv Comput. 11 2022;15:3275\u201388.","DOI":"10.1109\/TSC.2021.3103956"},{"key":"275_CR100","doi-asserted-by":"crossref","unstructured":"Sajimon PC, Jain K, Krishnan P. Analysis of post-quantum cryptography for internet of things, in Proceedings \u2013\u20092022 6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022. Institute of Electrical and Electronics Engineers Inc., 2022, pp. 387\u2013394.","DOI":"10.1109\/ICICCS53718.2022.9787987"},{"key":"275_CR101","doi-asserted-by":"crossref","unstructured":"Khan S, Jiangbin Z, Ullah F, Akhter MP, Khan S, Awwad FA, Ismail EA. Hybrid computing framework security in dynamic offloading for iot-enabled smart home system, PeerJ Computer Science, vol. 10, p. e2211, 8 2024.","DOI":"10.7717\/peerj-cs.2211"},{"key":"275_CR102","doi-asserted-by":"crossref","unstructured":"Kaushik A, Vadlamani LSS, Hussain MM, Sahay M, Singh R, Singh AK, Indu S, Goswami P, Kousik NGV. Post quantum public and private key cryptography optimized for iot security, Wireless Personal Communications, vol. 129, pp. 893\u2013909, 3 2023.","DOI":"10.1007\/s11277-022-10162-w"},{"key":"275_CR103","doi-asserted-by":"publisher","first-page":"787","DOI":"10.13052\/jwe1540-9589.2363","volume":"23","author":"HS Han","year":"2024","unstructured":"Han HS, Choi TH, Yoon JS. Enhancing security in low-power wide-area (lpwa) Iot environments: the role of hsm, tamper-proof technology, and quantum cryptography. J Web Eng. 2024;23:787\u2013800.","journal-title":"J Web Eng"},{"key":"275_CR104","doi-asserted-by":"crossref","unstructured":"Senor J, Portilla J, Mujica G. Analysis of the Ntru post-quantum cryptographic scheme in constrained Iot edge devices. IEEE Internet Things J. 10 2022;9(790):778\u201318.","DOI":"10.1109\/JIOT.2022.3162254"},{"key":"275_CR105","doi-asserted-by":"crossref","unstructured":"Figlarz GR, Hessel FP. Applied post-quantum secure method for Iot devices: A case study for autonomous vehicles communication. in 2022 IEEE 8th world forum on internet of Things, WF-IoT 2022. Institute of Electrical and Electronics Engineers Inc.; 2022.","DOI":"10.1109\/WF-IoT54382.2022.10152075"},{"key":"275_CR106","doi-asserted-by":"crossref","unstructured":"Grassl P, Hudler M, Koschuch M. Low-performance embedded internet of things devices and the need for hardware-accelerated post- quantum cryptography, in International Conference on Internet of Things, Big Data and Security, IoTBDS - Proceedings. Science and Technology Publications, Lda, 2024, pp. 329\u2013338.","DOI":"10.5220\/0012736800003705"},{"key":"275_CR107","doi-asserted-by":"crossref","unstructured":"O\u2019Connor R, Khalid A, O\u2019Neill M, Liu W. Better security estimates for approximate, iot-friendly r-lwe cryptosystems, in APCCAS 2022\u20132022 IEEE Asia Pacific Conference on Circuits and Systems. Institute of Electrical and Electronics Engineers Inc., 2022, pp. 611\u2013615.","DOI":"10.1109\/APCCAS55924.2022.10090405"},{"key":"275_CR108","doi-asserted-by":"crossref","unstructured":"Scho\u00a8ffel M, Feldmann J, Wehn N. Code-based cryptography in iot: A hw\/sw co-design of hqc, 1 2023. [Online]. Available: http:\/\/arxiv.org\/abs\/2301.04888","DOI":"10.1109\/WF-IoT54382.2022.10152031"},{"key":"275_CR109","first-page":"7","volume":"15","author":"B Kieu-Do-Nguyen","year":"2024","unstructured":"Kieu-Do-Nguyen B, Binh NT, Pham-Quoc C, Nghi HP, Tran NT, Hoang TT, Pham CK. Compact and low-latency fpga-based number theoretic transform architecture for crystals Kyber postquantum cryptography scheme. Inform (Switzerland). 2024;15:7.","journal-title":"Inform (Switzerland)"},{"key":"275_CR110","doi-asserted-by":"crossref","unstructured":"Bozhko J, Hanna Y, Harrilal-Parchment R, Tonyali S, Akkaya K. Performance evaluation of quantum-resistant Tls for consumer Iot devices. Tech Rep, 2023.","DOI":"10.1109\/CCNC51644.2023.10060762"},{"key":"275_CR111","doi-asserted-by":"crossref","unstructured":"Kim BJ, Mun HG, Lee KJ, Woo JM, Kang K, Son H, Sim JY. A 243 kops\/w crypto-processor supporting homomorphic encryption and post-quantum cryptography for iot devices, in European Solid-State Circuits Conference. IEEE Computer Society, 2024, pp. 468\u2013471.","DOI":"10.1109\/ESSERC62670.2024.10719565"},{"key":"275_CR112","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-024-00932-x","volume":"24","author":"D Mishra","year":"2025","unstructured":"Mishra D, Pursharthi K, Singh M, Mishra A. Construction of post quantum secure authenticated key agreement protocol for dew-assisted Iot systems. Int J Inf Secur. 2025;24:2.","journal-title":"Int J Inf Secur"},{"key":"275_CR113","unstructured":"Chu S-I, Ke S-A. Area-time efficient hardware implementation for binary ring-lwe based post-quantum cryptography, IEEE Transactions on Emerging Topics in Computing, 2024. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:273565659"},{"issue":"1","key":"275_CR114","doi-asserted-by":"publisher","first-page":"55","DOI":"10.5573\/JSTS.2024.24.1.55","volume":"24","author":"B Kim","year":"2024","unstructured":"Kim B, Mun HG, Kim S, Lee J, Sim JY. A 1.03 MOPS\/W lattice-based post-quantum cryptographyprocessor for IoT devices. J Semicond Technol Sci. 2024;24(1):55\u201361. https:\/\/doi.org\/10.5573\/JSTS.2024.24.1.55","journal-title":"J Semicond Technol Sci"},{"key":"275_CR115","doi-asserted-by":"crossref","unstructured":"Alam MM, Arora A, Bhatt A, Devliyal S, Aluvala S. Cryptographic algorithms for iot devices:a quantum analysis, in 2024 3rd International Conference for Innovation in Technology, INOCON 2024. Institute of Electrical and Electronics Engineers Inc., 2024.","DOI":"10.1109\/INOCON60754.2024.10511982"},{"key":"275_CR116","doi-asserted-by":"crossref","unstructured":"Dharminder D, Kumar U, Das AK, Bera B, Giri D, Jamal SS, Rodrigues JJPC. Secure cloud-based data storage scheme using postquantum integer lattices-based signcryption for iot applications, Transactions on Emerging Telecommunications Technologies, vol. 33, 2022. [Online]. Available: https:\/\/api.semanticscholar.org\/CorpusID:249170258","DOI":"10.1002\/ett.4540"},{"key":"275_CR117","doi-asserted-by":"crossref","unstructured":"Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S. A hybrid architecture for resolving cryptographic issues in internet of things (iot), employing quantum computing supremacy, in International Conference on ICT Convergence, vol. 2021-October. IEEE Computer Society, 2021, pp. 271\u2013276.","DOI":"10.1109\/ICTC52510.2021.9621208"},{"key":"275_CR118","doi-asserted-by":"publisher","unstructured":"Samiullah F, Gan ML, Akleylek S, Aun Y. Post-quantum group key management in IoTs. In: 2023 25thInternational Multitopic Conference (INMIC); 2023; Lahore, Pakistan. IEEE; 2023. pp. 1\u20136. https:\/\/doi.org\/10.1109\/INMIC60434.2023.10466001","DOI":"10.1109\/INMIC60434.2023.10466001"},{"key":"275_CR119","doi-asserted-by":"crossref","unstructured":"Fournaris AP, Tasopoulos G, Brohet M, Regazzoni F. Running longer to slim down: Post-quantum cryptography on memory-constrained devices, in 2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023. Institute of Electrical and Electronics Engineers Inc., 2023.","DOI":"10.1109\/COINS57856.2023.10189268"},{"key":"275_CR120","doi-asserted-by":"crossref","unstructured":"Cheng H, Gro\u00dfsch\u00e4\u00e4dl J, R\u00f8nne PB, Ryan PY. Lightweight post-quantum key encapsulation for 8-bit AVR microcontrollers. International Conference on Smart Card Research and AdvancedApplications. 2020.pp. 18-33. Cham: Springer International Publishing.","DOI":"10.1007\/978-3-030-68487-7_2"},{"key":"275_CR121","doi-asserted-by":"crossref","unstructured":"He K, Liu X, Liu JN, Liu W. Efficient identity-based broadcast encryption scheme on lattices for the internet of things, Security and Communication Networks, vol. 2021, 2021.","DOI":"10.1155\/2021\/2847731"},{"key":"275_CR122","doi-asserted-by":"crossref","unstructured":"Kim B, Park J, Moon S, Kang K, Sim JY. Configurable energy-efficient lattice-based post-quantum cryptography processor for iot devices, in ESSCIRC 2022 - IEEE 48th European Solid State Circuits Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., 2022, pp. 525\u2013528.","DOI":"10.1109\/ESSCIRC55480.2022.9911531"},{"key":"275_CR123","doi-asserted-by":"crossref","unstructured":"Zhang S, Du X, Liu X. A novel and quantum-resistant handover authentication protocol in Iot environment. Wireless Netw, 29.","DOI":"10.1007\/s11276-023-03342-4"},{"key":"275_CR124","doi-asserted-by":"publisher","unstructured":"Prantl T, Prantl D, Beierlieb L, Iffl\u00e4\u00e4nder L, Dmitrienko A, Kounev S, andKrupitzer C. 2021, October. Performance evaluation for a post-quantum public-keycryptosystem. In: 2021 IEEE International Performance, Computing, and CommunicationsConference (IPCCC); 2021; Austin, TX, USA. IEEE; 2021. pp. 1\u20137. https:\/\/doi.org\/10.1109\/IPCCC51483.2021.9679412","DOI":"10.1109\/IPCCC51483.2021.9679412"},{"key":"275_CR125","doi-asserted-by":"publisher","unstructured":"Se\u00f1\u00f1or J, Portilla J, Portela-Garc\u00ed\u00eda M. Performance analysis of post-quantum cryptographicschemes for securing large-scale wireless sensor networks. IEEE Trans Ind Inf. 2024;1\u201311. https:\/\/doi.org\/10.1109\/TII.2024.3423315","DOI":"10.1109\/TII.2024.3423315"},{"key":"275_CR126","doi-asserted-by":"crossref","unstructured":"Qian X, Wu W. An efficient ciphertext policy attribute-based encryption scheme from lattices and its implementation, in 2021 IEEE 6th International Conference on Computer and Communication Systems, ICCCS 2021. Institute of Electrical and Electronics Engineers Inc., 4 2021, pp. 732\u2013742.","DOI":"10.1109\/ICCCS52626.2021.9449182"},{"key":"275_CR127","doi-asserted-by":"publisher","first-page":"67","DOI":"10.32604\/cmc.2023.035337","volume":"75","author":"W Yu","year":"2023","unstructured":"Yu W, Wang S. Attribute-based authentication scheme from partial encryption for lattice with short key. Computers Mater Continua. 2023;75:67\u201380.","journal-title":"Computers Mater Continua"},{"issue":"972","key":"275_CR128","first-page":"963","volume":"10","author":"H Abulkasim","year":"2022","unstructured":"Abulkasim H, Goncalves B, Mashatan A, Ghose S. Authenticated secure quantum-based communication scheme in internet-of-drones deployment. IEEE Access. 2022;10(972):963\u201394.","journal-title":"IEEE Access"},{"key":"275_CR129","doi-asserted-by":"crossref","unstructured":"Keyaerts N, Gebremichael T, Gidlund M. Proof-of-concept of network key management using lattice-based cryptography. in 2022 international wireless communications and mobile Computing, IWCMC 2022. Institute of Electrical and Electronics Engineers Inc.; 2022. pp. 979\u201384.","DOI":"10.1109\/IWCMC55113.2022.9824629"},{"key":"275_CR130","doi-asserted-by":"crossref","unstructured":"Wu F, Li B. Light weight lattice-based signature for VANET. In: 2022 IEEE International Conference on Information Technology in Engineering (ICITE); 2022; [Location unknown]. IEEE; 2022. pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICITE56321.2022.10101468","DOI":"10.1109\/ICITE56321.2022.10101468"},{"key":"275_CR131","doi-asserted-by":"crossref","unstructured":"Winkler J, Holler A, Steger C. Optimizing picnic for limited memory resources, in Proceedings - Euromicro Conference on Digital System Design, DSD 2020. Institute of Electrical and Electronics Engineers Inc., 8 2020, pp. 200\u2013204.","DOI":"10.1109\/DSD51259.2020.00041"},{"key":"275_CR132","doi-asserted-by":"crossref","unstructured":"Blanco-Romero J, Lorenzo V, Almenares F, Sanchez DD, Campo C, Rubio CG. Integrating post-quantum cryptography into coap and mqtt-sn protocols, in Proceedings - IEEE Symposium on Computers and Communications. Institute of Electrical and Electronics Engineers Inc., 2024.","DOI":"10.1109\/ISCC61673.2024.10733716"},{"key":"275_CR133","doi-asserted-by":"crossref","unstructured":"He P, Tu Y, Xie J, Jacinto HS. Kina: Karatsuba initiated novel accelerator for ring-binary-lwe (rblwe)-based post-quantum cryptography. IEEE Trans Very Large Scale Integr VLSI Syst. 10 2023;31:1551\u201364.","DOI":"10.1109\/TVLSI.2023.3302289"},{"key":"275_CR134","doi-asserted-by":"crossref","unstructured":"Ma R, Cao J, Feng D, Li H. Laa: Lattice-based access authentication scheme for Iot in space information networks. IEEE Internet Things J. 4 2020;7:2791\u2013805.","DOI":"10.1109\/JIOT.2019.2962553"},{"key":"275_CR135","doi-asserted-by":"crossref","unstructured":"Akleylek S, Soysaldi M, Lee WK, Hwang SO, Wong DCK. Novel postquantum mq-based signature scheme for internet of things with parallel implementation. IEEE Internet Things J. 4 2021;8:6983\u201394.","DOI":"10.1109\/JIOT.2020.3038388"},{"key":"275_CR136","doi-asserted-by":"crossref","unstructured":"Verma N, Kumari S, Jain P. Post quantum digital signature change in iota to reduce latency in internet of vehicles (iov) environments, in 2022 International Conference on IoT and Blockchain Technology, ICIBT 2022. Institute of Electrical and Electronics Engineers Inc., 2022.","DOI":"10.1109\/ICIBT52874.2022.9807757"},{"key":"275_CR137","doi-asserted-by":"crossref","unstructured":"Parameswarath RP, Sikdar B. Quantum-safe authentication protocol using post-quantum key encapsulation mechanism for transportation systems. Tech Rep, 2024.","DOI":"10.1109\/SEFET61574.2024.10717975"},{"key":"275_CR138","doi-asserted-by":"crossref","unstructured":"Hafeez MA, Lee WK, Karmakar A, Hwang SO. Efficient tmvp-based polynomial Convolution on Gpu for post-quantum cryptography targeting Iot applications. IEEE Internet Things J, 11, pp. 23 428\u201323 443, 7 2024.","DOI":"10.1109\/JIOT.2024.3384507"},{"key":"275_CR139","doi-asserted-by":"crossref","unstructured":"Minhas NN, Mansoor K. Edge computing-based scheme for post-quantum Iot security for e-health. IEEE Internet Things J, 2024.","DOI":"10.1109\/JIOT.2024.3418959"},{"key":"275_CR140","doi-asserted-by":"crossref","unstructured":"Dharminder D, Reddy CB, Das AK, Park Y, Jamal SS. Post-quantum lattice-based secure reconciliation enabled key agreement protocol for Iot. IEEE Internet Things J. 2 2023;10:2680\u201392.","DOI":"10.1109\/JIOT.2022.3213990"},{"key":"275_CR141","doi-asserted-by":"crossref","unstructured":"Govindhan P, Kumar K. Post-quantum cryptography for multiple high-resolution millimeter wave images for enhanced security in iot networks, in Proceedings \u2013\u20092nd International Conference on Advancement in Computation and Computer Technologies, InCACCT 2024. Institute of Electrical and Electronics Engineers Inc., 2024, pp. 529\u2013533.","DOI":"10.1109\/InCACCT61598.2024.10550966"},{"key":"275_CR142","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s10586-024-04799-4","volume":"28","author":"K Mansoor","year":"2025","unstructured":"Mansoor K, Afzal M, Iqbal W, Abbas Y. Securing the future: exploring post-quantum cryptography for authentication and user privacy in Iot devices. Cluster Comput. 2025;28:4.","journal-title":"Cluster Comput"},{"key":"275_CR143","doi-asserted-by":"crossref","unstructured":"Pino A, Margaria D, Vesco A. On pq\/t hybrid verifiable credentials and presentations to build trust in iot systems, Tech. Rep., 2024.","DOI":"10.23919\/SpliTech61897.2024.10612295"},{"issue":"930","key":"275_CR144","first-page":"893","volume":"10","author":"TH Szymanski","year":"2022","unstructured":"Szymanski TH. The \u2019cyber security via determinism\u2019 paradigm for a quantum safe zero trust deterministic internet of things (iot). IEEE Access. 2022;10(930):893\u201345.","journal-title":"IEEE Access"},{"key":"275_CR145","first-page":"11","volume":"13","author":"P Scalise","year":"2024","unstructured":"Scalise P, Garcia R, Boeding M, Hempel M, Sharif H. An applied analysis of Securing 5\u00a0g\/6\u00a0g core networks with post-quantum key encapsulation methods. Electron (Switzerland). 2024;13:11.","journal-title":"Electron (Switzerland)"},{"key":"275_CR146","doi-asserted-by":"crossref","unstructured":"Hsu HY, Lin HY, Tso R, Chang TH, Hsu JC. Cryptanalysis of pilike: An impersonation attack on the lightweight identity-based authenticated key exchange protocol using bi-isis, in Proceedings \u2013\u20092024 19th Asia Joint Conference on Information Security, AsiaJCIS 2024. Institute of Electrical and Electronics Engineers Inc., 2024, pp. 9\u201316.","DOI":"10.1109\/AsiaJCIS64263.2024.00013"},{"key":"275_CR147","doi-asserted-by":"crossref","unstructured":"Gupta DS. Pilike: Post-quantum identity-based lightweight authenticated key exchange protocol for Iiot environments. IEEE Syst J. 3 2024;18:15\u201323.","DOI":"10.1109\/JSYST.2023.3335217"},{"issue":"350","key":"275_CR148","first-page":"341","volume":"11","author":"S Saha","year":"2023","unstructured":"Saha S, Hota A, Choudhury B, Nag A, Nandi S. Ntru and secret sharing based secure group communication for Iot applications. IEEE Access. 2023;11(350):341\u2013117.","journal-title":"IEEE Access"},{"key":"275_CR149","first-page":"12","volume":"28","author":"C Ma","year":"2024","unstructured":"Ma C, Shankar A, Kumari S, Chen CM. A lightweight brlwe-based post-quantum cryptosystem with side-channel resilience for Iot security. Internet Things (The Netherlands). 2024;28:12.","journal-title":"Internet Things (The Netherlands)"},{"key":"275_CR150","doi-asserted-by":"crossref","unstructured":"Ducas L, Durmus A, Lepoint T, Lyubashevsky V, leo, Ducas, Lepoint T. Lattice signatures and bimodal gaussians, Tech. Rep., 2013.","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"275_CR151","doi-asserted-by":"publisher","first-page":"8791","DOI":"10.1109\/ACCESS.2024.3350775","volume":"12","author":"B Halak","year":"2024","unstructured":"Halak B, Gibson T, Henley M, Botea CB, Heath B, Khan S. Evaluation of performance, energy, and computation costs of quantum- attack resilient encryption algorithms for embedded devices. IEEE Access. 2024;12:8791\u2013805.","journal-title":"IEEE Access"},{"key":"275_CR152","doi-asserted-by":"crossref","unstructured":"Dharminder D, Das AK, Saha S, Bera B, Vasilakos AV. Post-quantum secure identity-based encryption scheme using random integer lattices for iot-enabled ai applications, Security and Communication Networks, vol. 2022, 2022.","DOI":"10.1155\/2022\/5498058"},{"key":"275_CR153","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1177\/15501329221136978","volume":"18","author":"Y Shen","year":"2022","unstructured":"Shen Y, Tang X, Zhang X, Zhou Y, Zou H. A flexible continuous-wave quantum cryptography scheme with zero-trust security for internet of things. Int J Distrib Sens Netw. 2022;18:11.","journal-title":"Int J Distrib Sens Netw"},{"key":"275_CR154","doi-asserted-by":"crossref","unstructured":"Shim KA. On the suitability of post-quantum signature schemes for internet of things. IEEE Internet Things J. 3 2024;11(665):648\u201310.","DOI":"10.1109\/JIOT.2024.3378955"},{"issue":"077","key":"275_CR155","first-page":"038","volume":"9","author":"L Malina","year":"2021","unstructured":"Malina L, Dzurenda P, Ricci S, Hajny J, Srivastava G, Matulevicius R, Affia AAO, Laurent M, Sultan NH, Tang Q. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access. 2021;9(077):038\u201336.","journal-title":"IEEE Access"},{"key":"275_CR156","doi-asserted-by":"crossref","unstructured":"Ngouen M, Rahman MA, Prabakar N, Uluagac S, Njilla L. Q-secure: A quantum resistant security for resource-constrained iot device encryption, Tech. Rep., 2023. [Online]. Available: https:\/\/github.com\/lerice1\/IOT--Quantum-Resistant-Security","DOI":"10.1109\/IOTSMS59855.2023.10325770"},{"key":"275_CR157","first-page":"12","volume":"28","author":"R Roma\u00b4n","year":"2024","unstructured":"Roma\u00b4n R, Arjona R, Baturone I. A quantum-safe authentication scheme for Iot devices using homomorphic encryption and weak physical unclonable functions with no helper data. Internet Things (The Netherlands). 2024;28:12.","journal-title":"Internet Things (The Netherlands)"},{"key":"275_CR158","doi-asserted-by":"crossref","unstructured":"Adeli M, Bagheri N, Maimani HR, Kumari S, Rodrigues JJ. A post-quantum compliant authentication scheme for Iot healthcare systems. IEEE Internet Things J. 2 2024;11:6111\u20138.","DOI":"10.1109\/JIOT.2023.3309931"},{"key":"275_CR159","doi-asserted-by":"crossref","unstructured":"Scho\u00a8ffel M, Lauer F, Rheinla\u00a8nder CC, Wehn N. Secure Iot in the era of quantum computers\u2014where are the bottlenecks? Sensors, 22, 4 2022.","DOI":"10.3390\/s22072484"},{"key":"275_CR160","doi-asserted-by":"crossref","unstructured":"Liu T, Ramachandran G, Jurdak R. Towards quantum resilient iot: A backward-compatible approach to secure ble key exchange against quantum threats. Tech Rep, 2024.","DOI":"10.1109\/IoTDI61053.2024.00019"},{"key":"275_CR161","doi-asserted-by":"crossref","unstructured":"Pankov KN, Glukhov MM. Using error-correcting codes to ensure information security of unmanned vehicles and iot systems, in 2022 Systems of Signal Synchronization, Generating and Processing in Telecommunications, SYNCHROINFO 2022 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2022.","DOI":"10.1109\/SYNCHROINFO55067.2022.9840949"},{"key":"275_CR162","doi-asserted-by":"crossref","unstructured":"Rajpoot S, Singh P, Singh P, Bahadur PS, Dhama A. Fortifying iot against quantum threats: Strategies for securing connected devices in the quantum era, in Proceedings of International Conference on Contemporary Computing and Informatics, IC3I 2023. Institute of Electrical and Electronics Engineers Inc., 2023, pp. 222\u2013227.","DOI":"10.1109\/IC3I59117.2023.10397666"},{"key":"275_CR163","first-page":"10","volume":"27","author":"K Mansoor","year":"2024","unstructured":"Mansoor K, Afzal M, Iqbal W, Abbas Y, Mussiraliyeva S, Chehri A. Pqcaie: post quantum cryptographic authentication scheme for iot-based e-health systems. Internet Things (Netherlands). 2024;27:10.","journal-title":"Internet Things (Netherlands)"},{"key":"275_CR164","doi-asserted-by":"crossref","unstructured":"Bera B, Das AK, Member S, Sikdar B. Securing next-generation quantum Iot applications using quantum key distribution. IEEE Internet Things Magazine Tech Rep, 2024.","DOI":"10.1109\/IOTM.001.2400059"},{"key":"275_CR165","doi-asserted-by":"crossref","unstructured":"Li D, Huang X, Huang W, Gao F, Yan S. Espquery: an enhanced secure scheme for privacy-preserving query based on untrusted devices in the internet of things. IEEE Internet Things J. 5 2021;8:7229\u201340.","DOI":"10.1109\/JIOT.2020.3038928"},{"key":"275_CR166","doi-asserted-by":"crossref","unstructured":"Biswas S, Goswami RS, Reddy KHK, Mohanty SN, Ahmed MA. Exploring the fusion of lattice-based quantum key distribution for secure internet of things communications. IET Quantum Communication, 12 2024.","DOI":"10.1049\/qtc2.12105"},{"key":"275_CR167","doi-asserted-by":"publisher","unstructured":"Castryck W, Decru T. An Efficient Key Recovery Attack on SIDH, Annual international conference on the theory and applications of cryptographic techniques. Cham: Springer Nature Switzerland, pp. 423\u2013447, 2023. https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"275_CR168","doi-asserted-by":"publisher","unstructured":"Beullens W. Breaking Rainbow Takes a Weekend on a Laptop, Annual International Cryptology Conference, pp. 464\u2013479. Cham: Springer Nature Switzerland, pp. 464\u2013479, 2023. https:\/\/doi.org\/10.1007\/978-3-031-15979-4_16","DOI":"10.1007\/978-3-031-15979-4_16"},{"issue":"1","key":"275_CR169","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s42452-024-05633-7","volume":"6","author":"AS Mulu","year":"2024","unstructured":"Mulu AS, Gemeda KA, Janaki P. Prediction and classification of IoT sensor faults using hybrid deep learning model. Discover Appl Sci. 2024;6(1):9.","journal-title":"Discover Appl Sci"},{"issue":"4","key":"275_CR170","doi-asserted-by":"publisher","first-page":"4899","DOI":"10.14419\/ijet.v7i4.23147","volume":"7","author":"RF Olanrewaju","year":"2019","unstructured":"Olanrewaju RF, Khan BUI, Anwar F, Mir RN. Internet of things security vulnerabilities and recommended solutions. Int J Eng Technol. 2019;7(4):4899\u2013904.","journal-title":"Int J Eng Technol"},{"key":"275_CR171","unstructured":"Zinabu NG, Adere K. Enhanced image cipher and Decipher speed of advanced encryption standard algorithms for embedded devices. Available SSRN 4765737, 2022."},{"key":"275_CR172","doi-asserted-by":"publisher","first-page":"129240","DOI":"10.1109\/ACCESS.2021.3110310","volume":"9","author":"RF Olanrewaju","year":"2021","unstructured":"Olanrewaju RF, Khan BUI, Morshidi MA, Anwar F, Kiah ML. B. M. A frictionless and secure user authentication in web-based premium applications. IEEE Access. 2021;9:129240\u201355.","journal-title":"IEEE Access"},{"issue":"10","key":"275_CR173","doi-asserted-by":"publisher","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","volume":"35","author":"A Nazir","year":"2023","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ma X, Ullah F, Xiangjun M, Pathan MS. Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT Botnets. J King Saud University-Computer Inform Sci. 2023;35(10):101820.","journal-title":"J King Saud University-Computer Inform Sci"},{"key":"275_CR174","doi-asserted-by":"publisher","unstructured":"Alemayew WB, Gemeda KA. Federated hybrid deep learning for multi-attack detection and classification in RPL-based 6LoWPAN networks. Discovery Comput. 2025;28(1). https:\/\/doi.org\/10.1007\/s10791-025-09852-3.","DOI":"10.1007\/s10791-025-09852-3"},{"issue":"6","key":"275_CR175","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s11227-025-07255-1","volume":"81","author":"A Nazir","year":"2025","unstructured":"Nazir A, He J, Zhu N, Wajahat A, Ullah F, Qureshi S, Pathan MS. Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets. J Supercomputing. 2025;81(6):775.","journal-title":"J Supercomputing"},{"issue":"6","key":"275_CR176","doi-asserted-by":"publisher","first-page":"8367","DOI":"10.1007\/s10586-024-04436-0","volume":"27","author":"A Nazir","year":"2024","unstructured":"Nazir A, He J, Zhu N, Anwar MS, Pathan MS. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Cluster Comput. 2024;27(6):8367\u201392.","journal-title":"Cluster Comput"},{"key":"275_CR177","doi-asserted-by":"publisher","unstructured":"NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation mechanism standard. 2024. https:\/\/doi.org\/10.6028\/NIST.FIPS.203","DOI":"10.6028\/NIST.FIPS.203"},{"key":"275_CR178","doi-asserted-by":"publisher","unstructured":"NIST. FIPS 204: Module-Lattice-Based Digital Signature Standard. 2024. https:\/\/doi.org\/10.6028\/NIST.FIPS.204","DOI":"10.6028\/NIST.FIPS.204"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00275-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00275-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00275-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:04:59Z","timestamp":1770739499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00275-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":178,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["275"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00275-6","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"1 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participati"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"14"}}