{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:40:14Z","timestamp":1775068814309,"version":"3.50.1"},"reference-count":251,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010801","name":"Xunta de Galicia","doi-asserted-by":"publisher","award":["ED431G2019\/01"],"award-info":[{"award-number":["ED431G2019\/01"]}],"id":[{"id":"10.13039\/501100010801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["TEC2016-75067-C4-1-R"],"award-info":[{"award-number":["TEC2016-75067-C4-1-R"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci\u00f3n","doi-asserted-by":"publisher","award":["RED2018-102668-T"],"award-info":[{"award-number":["RED2018-102668-T"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2968985","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:16:00Z","timestamp":1579814160000},"page":"21091-21116","source":"Crossref","is-referenced-by-count":489,"title":["Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2179-5917","authenticated-orcid":false,"given":"Tiago M.","family":"Fernandez-Carames","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4991-6808","authenticated-orcid":false,"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"ref172","first-page":"199","article-title":"Blind signatures for untraceable payments","author":"chaum","year":"1982","journal-title":"Proc Crypto"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2833103"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886554"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2019.06279"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_27"},{"key":"ref175","first-page":"530","article-title":"Practical lattice-based cryptography: A signature scheme for embedded systems","author":"g\u00fcneysu","year":"2012","journal-title":"Proc CHES"},{"key":"ref178","year":"2019","journal-title":"Dilithium"},{"key":"ref177","first-page":"1","article-title":"QChain: Quantum-resistant and decentralized PKI using blockchain","author":"an","year":"2018","journal-title":"Proc SCIS"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"ref169","first-page":"1843","article-title":"To BLISS-B or not to be&#x2014;Attacking strong Swan&#x2019;s implementation of post-quantum signatures","author":"pessl","year":"2017","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref39","first-page":"387","article-title":"Parametric hash function resistant to attack by quantum computer","author":"krendelev","year":"2018","journal-title":"Proc Federated Conf Comput Sci Inf Syst"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796300933"},{"key":"ref33","first-page":"317","article-title":"Shor&#x2019;s discrete logarithm quantum algorithm for elliptic curves","volume":"3","author":"proos","year":"2003","journal-title":"Quantum Inf Comput"},{"key":"ref32","year":"2016","journal-title":"National Institute of Standards and Technology (NIST)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57pt1r4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.120"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/2058-7058\/27\/02\/10"},{"key":"ref34","year":"2015","journal-title":"CNSS Advisory Memorandum Information Assurance 02-15 Use of Public Standards for the Secure Sharing of Information among National Security Systems"},{"key":"ref181","year":"2019","journal-title":"GEMS"},{"key":"ref180","year":"2019","journal-title":"FALCON NIST Call Specification"},{"key":"ref185","year":"2019","journal-title":"MQDSS"},{"key":"ref184","year":"2019","journal-title":"LUOV Official GitHub Repository"},{"key":"ref183","year":"2019","journal-title":"LUOV"},{"key":"ref182","year":"2019","journal-title":"GeMSS NIST Call Specification"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_12"},{"key":"ref188","year":"2019","journal-title":"qTESLA"},{"key":"ref187","year":"2019","journal-title":"PICNIC"},{"key":"ref186","year":"2019","journal-title":"MQDSS NIST Call Specification"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCON.2017.7998367"},{"key":"ref179","year":"2019","journal-title":"FalconTrak"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946983"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896108"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2017.8011213"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2816299"},{"key":"ref50","year":"2019","journal-title":"Leighton-Micali Hash-Based Signatures"},{"key":"ref51","year":"2019","journal-title":"ISO\/IEC JTC 1\/SC 27 (Working Group on IT Security Techniques)"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_10"},{"key":"ref153","first-page":"159","article-title":"Knapsack-type cryptosystems and algebraic coding theory","volume":"15","author":"niederreiter","year":"1986","journal-title":"Problems Control Inf Theory"},{"key":"ref156","first-page":"122","article-title":"Code-based identification and signature schemes in software","author":"alaoui","year":"2013","journal-title":"Proc 2nd Int Conf Availability Rel Security"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_28"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89339-6_16"},{"key":"ref152","year":"2019","journal-title":"Google Blog Google&#x2019;s Experiments With a Hybrid Cryptosystem"},{"key":"ref151","year":"2019","journal-title":"Official Source Forge Repository Three Bears"},{"key":"ref146","article-title":"NTRU prime: Reducing attack surface at low cost","author":"bernstein","year":"2017","journal-title":"Proc SAC"},{"key":"ref147","year":"2019","journal-title":"Round5"},{"key":"ref148","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref149","year":"2019","journal-title":"Saber"},{"key":"ref59","year":"2019","journal-title":"PROMETHEUS Publications"},{"key":"ref58","year":"2019","journal-title":"SAFECrypto Contributions"},{"key":"ref57","year":"2019","journal-title":"PQCrypto Contributions"},{"key":"ref56","year":"2019","journal-title":"NIST&#x2019;s Announcement of the First Post-Quantum Cryptography Standardization Conference"},{"key":"ref55","year":"2019","journal-title":"Workshop on Cybersecurity in a Post-Quantum World"},{"key":"ref54","year":"2019","journal-title":"ETSI\/IQC 2018 Quantum Safe Workshop"},{"key":"ref53","year":"2017"},{"key":"ref52","volume":"921","year":"0"},{"key":"ref40","year":"2019","journal-title":"IOTA&#x2019;s"},{"key":"ref167","first-page":"40","article-title":"Lattice signatures and bimodal Gaussians","author":"ducas","year":"2013","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref166","article-title":"Post-quantum algorithms for digital signing in public key infrastructures","author":"sj\u00f6berg","year":"2017"},{"key":"ref165","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"ajtai","year":"1996","journal-title":"Proc 28th Annu ACM Symp Theory Comput"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_15"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_17"},{"key":"ref162","first-page":"1","article-title":"Tame transformation signatures with topsy-turvy hashes","author":"chen","year":"2002","journal-title":"Proc IWAP"},{"key":"ref161","first-page":"1","article-title":"On multivariate signature-only public key cryptosystems","author":"curtois","year":"2001","journal-title":"Proc IACR Cryptol ePrint Arch"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/su9122214"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s19153319"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937917"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2898013"},{"key":"ref49","year":"2019","journal-title":"XMSS eXtended Merkle Signature Scheme"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_25"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s19102394"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_3"},{"key":"ref46","year":"2019","journal-title":"ETSI Technical Committee Cyber Working Group on Quantum-Safe Cryptography"},{"key":"ref45","year":"2019","journal-title":"Prometheus"},{"key":"ref48","year":"2016","journal-title":"Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1 2"},{"key":"ref47","year":"2019","journal-title":"Crypto Forum Research Group"},{"key":"ref42","year":"2019","journal-title":"PQCRYPTO Project"},{"key":"ref41","first-page":"163","article-title":"Quantum cryptanalysis of hash and claw-free functions","author":"brassard","year":"2006","journal-title":"Proc 1st Latin Amer Symp Theoretical Informatics"},{"key":"ref44","year":"2019","journal-title":"CryptoMathCREST Project"},{"key":"ref43","year":"2019","journal-title":"SafeCer project"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/electronics7120405"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3390\/rs11182144"},{"key":"ref71","year":"2019","journal-title":"Corda&#x2019;s Supported Security Suites"},{"key":"ref70","year":"2019","journal-title":"Abelian"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s19153287"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/s18072198"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/s18010057"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.3390\/s17091978"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903082"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/s17010028"},{"key":"ref60","article-title":"Quantum proofing the blockchain","author":"gheorghiu","year":"2017"},{"key":"ref62","year":"2019","journal-title":"Quantum-Safe Cryptography (QSC) Limits to Quantum Computing Applied to Symmetric Key Sizes"},{"key":"ref61","author":"lucamarini","year":"2018","journal-title":"Implementation Security of Quantum Cryptography Introduction Challenges Solutions"},{"key":"ref63","year":"2019","journal-title":"Quantum-Safe Cryptography Quantum-Safe Threat Assessment"},{"key":"ref64","year":"2019","journal-title":"IETF Internet-Draft on the Transition From Classical to Post-Quantum Cryptography"},{"key":"ref65","year":"2019"},{"key":"ref66","year":"2019","journal-title":"Announcement of the NIST&#x2019;s Call for Proposals for Public-Key Post-Quantum Cryptography Algorithms"},{"key":"ref67","year":"2019","journal-title":"NIST&#x2019;s Second Round Announcement Call for Proposals Post-Quantum cryptosystems"},{"key":"ref68","year":"2019","journal-title":"Bitcoin Post-Quantum"},{"key":"ref69","year":"2019","journal-title":"Ethereum&#x2019;s Official Roadmap"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/2898420.2898421"},{"key":"ref198","article-title":"Constructing digital signatures from a one-way function","author":"lamport","year":"1979"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.70"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_9"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_24"},{"key":"ref95","year":"2019","journal-title":"BIKE Suite"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73420-8_8"},{"key":"ref190","year":"2019","journal-title":"SPHINCS+"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_20"},{"key":"ref191","year":"2019","journal-title":"SPHINCS+ NIST Call Specification"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.31585\/jbba-2-1-(4)2019"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_5"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12929-2_16"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_11"},{"key":"ref96","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71045-7_11"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700330"},{"key":"ref81","article-title":"A methodology for evaluating security in commercial RFID systems","author":"fern\u00e1ndez-caram\u00e9s","year":"2016","journal-title":"Radio Frequency Identification"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s19010015"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3390\/s18113868"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2017.7945583"},{"key":"ref89","year":"2017","journal-title":"Quantum-Safe Cryptography (QSC) Quantum-Safe Algorithmic Framework"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref86","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055873"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1268"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref101","first-page":"18","article-title":"Ouroboros: A simple, secure and efficient key exchange protocol based on coding theory","author":"deneuville","year":"2017","journal-title":"Proc PQCrypto"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_9"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622246"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73011"},{"key":"ref201","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Proc EUROCRYPT"},{"key":"ref202","article-title":"Post-quantum blockchain using one-time signature chains","author":"van der linde","year":"2018"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876212"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.7296338"},{"key":"ref205","year":"2019","journal-title":"Passmark cpu Benchmark"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240549"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31277-0_19"},{"key":"ref210","first-page":"419","article-title":"Application and implementation of multivariate public key cryptosystem in blockchain","author":"shen","year":"2019","journal-title":"Proc CollaborateCom"},{"key":"ref212","article-title":"Sharper ring-LWE signatures","author":"barreto","year":"2016"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788411"},{"key":"ref216","author":"popov","year":"2018","journal-title":"The tangle version 1 4 3"},{"key":"ref217","year":"2019","journal-title":"The QRL QRL&#x2014;The Quantum Resistant Ledger"},{"key":"ref218","article-title":"Long-term public blockchain: Resilience against compromise of underlying cryptography","author":"sato","year":"2017","journal-title":"Proc Int Conf Comput Commun Netw"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02744-5_1"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.180410"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.3390\/quantum1010002"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.003"},{"key":"ref229","article-title":"Aggregation of Gamma-signatures and applications to bitcoin","author":"zhao","year":"2018"},{"key":"ref228","article-title":"From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things","author":"fern\u00e1ndez-caram\u00e9s","year":"0","journal-title":"IEEE Internet of Things Journal"},{"key":"ref227","article-title":"Smart contracts meet quantum cryptography","author":"coladangelo","year":"2019","journal-title":"arXiv 1902 05214"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1134\/S1995080218070028"},{"key":"ref225","first-page":"763","article-title":"qBitcoin: A peer-to-peer quantum cash system","author":"ikeda","year":"2018","journal-title":"Proc Adv Intell Syst Comput"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751473"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.3390\/e21090887"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0015"},{"key":"ref126","first-page":"428","volume":"8885","author":"biasse","year":"2014","journal-title":"A quantum algorithm for computing isogenies between supersingular elliptic curves"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0016"},{"key":"ref124","article-title":"Public-key cryptosystem based on isogenies","author":"rostovtsev","year":"2006"},{"key":"ref129","year":"2019","journal-title":"SIKE"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"ref130","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9938-4"},{"key":"ref131","year":"2019","journal-title":"Kyber"},{"key":"ref132","year":"2019","journal-title":"Kyber Documentation for the Second Round of the NIST Call"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_25"},{"key":"ref233","first-page":"558","article-title":"Post-Quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1.0)","author":"torres","year":"2018","journal-title":"Proc ACISP"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_35"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2018.8503089"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref235","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Crypto"},{"key":"ref234","year":"2019","journal-title":"CryptoNote&#x2019;s"},{"key":"ref237","first-page":"319","article-title":"Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things","author":"g\u00fcneysu","year":"2017","journal-title":"Proc Int Symp Quality Electronic Design"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref136","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref135","year":"2019","journal-title":"FrodoKEM"},{"key":"ref138","year":"2019","journal-title":"LAC&#x2019;s NIST Submission Package"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978425"},{"key":"ref139","year":"2019","journal-title":"New Hope"},{"key":"ref140","year":"2019","journal-title":"New Hope&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref141","article-title":"NewHope without reconciliation","author":"alkim","year":"2016"},{"key":"ref142","year":"2019","journal-title":"Ntru"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_1"},{"key":"ref2","author":"swan","year":"2015","journal-title":"Blockchain Blueprint for a New Economy"},{"key":"ref144","year":"2019","journal-title":"NTRU Prime"},{"key":"ref1","author":"nakamoto","year":"2019","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref145","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2016.7479039"},{"key":"ref242","author":"fran\u00e7a","year":"2015","journal-title":"The mini-blockchain scheme"},{"key":"ref243","author":"lukianov","year":"2015","journal-title":"Compact Confidential Transactions for Bitcoin"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2847632"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36033-7_1"},{"key":"ref247","author":"ben-sasson","year":"1845","journal-title":"Scalable transparent and post-quantum secure computational integrity"},{"key":"ref246","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von Neumann architecture","author":"ben-sasson","year":"2014","journal-title":"Proc Usenix Secur Symp"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"key":"ref249","author":"zyskind","year":"2015","journal-title":"Enigma Decentralized computation platform with guaranteed privacy"},{"key":"ref109","year":"2019","journal-title":"LEADCrypt"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2804444"},{"key":"ref107","year":"2019","journal-title":"HQC Documentation for the Second Round of the NIST Call"},{"key":"ref106","year":"2019","journal-title":"HQC"},{"key":"ref105","first-page":"187","article-title":"Cryptanalysis of the original McEliece cryptosystem","author":"canteaut","year":"1998","journal-title":"Proc ASIACRYPT"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_3"},{"key":"ref103","year":"2019","journal-title":"Classical McEliece Documentation for the Second Round of the NIST Call"},{"key":"ref102","year":"2019","journal-title":"Classic McEliece"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25510-7_13"},{"key":"ref112","year":"2019","journal-title":"NTS-KEM"},{"key":"ref110","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref250","year":"2019","journal-title":"Byteball&#x2019;s"},{"key":"ref251","author":"baird","year":"2016","journal-title":"Overview of Swirlds Hashgraph"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935895"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908780"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895302"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Use of elliptic curves in cryptography","volume":"218","author":"miller","year":"1985","journal-title":"Proc Adv Cryptol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref118","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"NTRU: A ring-based public key cryptosystem","author":"hoffstein","year":"1998","journal-title":"Proc 3rd Int Symp Algorithmic Number Theory"},{"key":"ref17","year":"2000"},{"key":"ref117","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref119","first-page":"327","article-title":"Post-quantum key exchange&#x2014;A new hope","author":"alkim","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref114","year":"2019","journal-title":"Roll-On"},{"key":"ref113","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref116","year":"2019","journal-title":"RQC"},{"key":"ref115","year":"2019","journal-title":"BIKE&#x2019;s Documentation for the Second Round of the NIST Call"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_4"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2866917"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_3"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08967098.pdf?arnumber=8967098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:10Z","timestamp":1639770670000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8967098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":251,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2968985","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}