{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:38:35Z","timestamp":1775666315575,"version":"3.50.1"},"reference-count":120,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3486649","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T17:45:16Z","timestamp":1730137516000},"page":"6849-6871","source":"Crossref","is-referenced-by-count":50,"title":["Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad Asghar","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Prince Mohammad bin Fahd University, Al Khobar, Saudi Arabia"}]},{"given":"Shumaila","family":"Javaid","sequence":"additional","affiliation":[{"name":"Department of Control Science, Engineering, College of Electronics, Information Engineering, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5810-4983","authenticated-orcid":false,"given":"Syed Agha Hassnain","family":"Mohsan","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Eastern Institute for Advanced Studies, Ningbo, China"}]},{"given":"Muhammad","family":"Tanveer","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Management and Technology, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7095-3831","authenticated-orcid":false,"given":"Insaf","family":"Ullah","sequence":"additional","affiliation":[{"name":"Institute for Analytics and Data Science, University of Essex, Colchester, U.K"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3213370"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800161"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800155"},{"key":"ref4","article-title":"A survey on security and privacy issues of UAVs","author":"Mekdad","year":"2021","journal-title":"arXiv:2109.14442v2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/drones6020041"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10683-0_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11401-023-0053-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"ref12","article-title":"A survey on code-based cryptography","author":"Weger","year":"2022","journal-title":"arXiv:2201.07119"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-021-00155-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151328"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2019.2943136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-016-2723-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1985.0070"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040038"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.086"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MobiSecServ50855.2022.9727214"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN56518.2023.10048976"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2166261"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2023.105112"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7030040"},{"key":"ref26","first-page":"460","article-title":"A survey on post-quantum cryptosystems: Concept, attacks, and challenges in IoT devices","volume-title":"Proc. 10th Int. Conf. Comput. Sustain. Global Dev. (INDIACom)","author":"Iqbal"},{"key":"ref27","article-title":"Post-quantum cryptography for Internet of Things: A survey on performance and optimization","author":"Liu","year":"2024","journal-title":"arXiv:2401.17538"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3355222"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072030"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/drones6100264"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934998"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/mi13101702"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104963"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159698"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2962207"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2018.160145"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3215975"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISC246665.2019.9071765"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/maes.2023.3318226"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/1548512916628335"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MILTECHS.2017.7988845"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icuas.2015.7152425"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2013.6712578"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/9781119964049"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2514\/6.2012-2438"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEA50009.2020.00063"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3281731"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3089847"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-6684-6697-1.ch016"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/nature07128"},{"key":"ref52","first-page":"1","article-title":"Introduction to quantum computing","volume-title":"Quantum Computing and Communications","author":"Marella","year":"2020"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM19574.2021.9720538"},{"key":"ref54","first-page":"19","article-title":"Comparing RSA ECC and post quantum cryptography","volume":"10","author":"Seo","year":"2018","journal-title":"J. Math. Anal. Appl."},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISS1.2017.8389231"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-10110-8"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/app13116734"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944676"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3233\/NICSP240004"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3309051"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05616-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3325761"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3410702"},{"key":"ref64","article-title":"Identifying ideal lattices","author":"Ding","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05167-2"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2019.8819706"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_23"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"issue":"30","key":"ref71","first-page":"30","article-title":"The learning with errors problem","volume":"7","author":"Regev","year":"2010","journal-title":"Invited Surv. CCC"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2017-0030"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151345"},{"key":"ref75","article-title":"A survey on code-based cryptography","author":"Weger","year":"2022","journal-title":"arXiv:2201.07119"},{"key":"ref76","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"McEliece","year":"1978"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCC.2018.8390461"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.23919\/AEIT.2017.8240549"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151334"},{"key":"ref80","article-title":"Benchmarking the quantum cryptanalysis of symmetric, public-key and hash-based cryptographic schemes","author":"Gheorghiu","year":"2019","journal-title":"arXiv:1902.02332"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref83","first-page":"428","article-title":"One way hash functions and DES","volume-title":"Proc. Conf. Theory Appl. Cryptol.","author":"Merkle"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_39"},{"key":"ref85","first-page":"369","article-title":"A digital signature based on a conventional encryption function","volume-title":"Proc. Conf. Theory Appl. Cryptogr. Tech.","author":"Merkle"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"ref87","volume-title":"Large provably fast and secure digital signature schemes based on secure hash functions","author":"Leighton","year":"1995"},{"key":"ref88","article-title":"Status report on the first round of the NIST postquantum cryptography standardization process","author":"Alagic","year":"8240"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616579"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_20"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E101.A.553"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0015"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_21"},{"key":"ref94","article-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"Alagic","year":"8413"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.4310\/mrl.1999.v6.n3.a3"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/360\/06566"},{"key":"ref97","first-page":"374","article-title":"Cryptanalysis of the algebraic eraser and short expressions of permutations as products","volume-title":"Proc. Adv. Cryptol. CRYPTO","author":"Kalka"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52153-4_1"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31368-4_1"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2014.7011934"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3264153"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1063\/5.0011441"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-3824-7.ch006"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1002\/9781394216147.ch11"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1080\/23742917.2024.2312671"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00010"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103607"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-6401-7_8-1"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983020"},{"issue":"6","key":"ref110","first-page":"1739","article-title":"Lattice-based cryptography for lightweight IoT devices","volume":"64","author":"P\u00f6ppelmann","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref111","first-page":"1419","article-title":"Hybrid post-quantum cryptographic schemes","volume-title":"Proc. ACM Conf. Comput. Commun. Secur. (CCS)","author":"Bindel"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.18280\/ria.370314"},{"issue":"4","key":"ref113","first-page":"44","article-title":"Post-quantum key exchange for the TLS protocol","volume":"13","author":"Bos","year":"2015","journal-title":"IEEE Security Privacy"},{"key":"ref114","first-page":"146","article-title":"NewHope: Algorithmic details of the PQC scheme","volume-title":"Proc. Post-Quantum Cryptogr. Conf. (PQCrypto)","author":"Alkim"},{"issue":"1","key":"ref115","first-page":"45","article-title":"Efficient implementations of post-quantum cryptography: A survey","volume":"68","author":"Albrecht","year":"2019","journal-title":"IEEE Trans. Comput."},{"key":"ref116","first-page":"1735","article-title":"Testing and benchmarking PQC algorithms for UAV applications","volume":"12","author":"Chen","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/drones8080359"},{"issue":"4","key":"ref118","first-page":"25","article-title":"Post-quantum TLS: Transitioning to quantum-resistant cryptography","volume":"17","author":"Whyte","year":"2019","journal-title":"IEEE Security Privacy"},{"issue":"6","key":"ref119","first-page":"22","article-title":"Post-quantum cryptography for secure communications","volume":"58","author":"McGrew","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924143"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10362961\/10737027.pdf?arnumber=10737027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:11:25Z","timestamp":1732677085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10737027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":120,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3486649","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}