{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T05:11:59Z","timestamp":1779167519824,"version":"3.51.4"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"crossref","award":["528745080-FIP 68"],"award-info":[{"award-number":["528745080-FIP 68"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Access Publishing Fund of the University of T\u00fcbingen"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/ojcoms.2026.3687929","type":"journal-article","created":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T19:52:26Z","timestamp":1777319546000},"page":"4559-4573","source":"Crossref","is-referenced-by-count":0,"title":["Assessing the Performance Impact of Post-Quantum Cryptography on WPA-Enterprise Networks"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3620-2336","authenticated-orcid":false,"given":"Lukas","family":"K\u00f6der","sequence":"first","affiliation":[{"name":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1301-4002","authenticated-orcid":false,"given":"Nils","family":"Lohmiller","sequence":"additional","affiliation":[{"name":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7196-2791","authenticated-orcid":false,"given":"Phil","family":"Schmieder","sequence":"additional","affiliation":[{"name":"University of Wuppertal, Wuppertal, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9681-727X","authenticated-orcid":false,"given":"Bastian","family":"Buck","sequence":"additional","affiliation":[{"name":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3216-1015","authenticated-orcid":false,"given":"Michael","family":"Menth","sequence":"additional","affiliation":[{"name":"University of T&#x00FC;bingen, T&#x00FC;bingen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3119-252X","authenticated-orcid":false,"given":"Tobias","family":"Heer","sequence":"additional","affiliation":[{"name":"Institute for Secure Networked Systems, Esslingen University of Applied Sciences, Neckar, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"The EAP-TLS Authentication Protocol","author":"Simon","year":"5216"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5281","volume-title":"Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0)","author":"Funk","year":"2008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref4","volume-title":"Status of Quantum Computer Development","year":"2025"},{"key":"ref5","volume-title":"Post-Quantum Cryptography: Call for Proposals"},{"key":"ref6","volume-title":"Post-Quantum Signatures Zoo: NIST Round 2","year":"2024"},{"key":"ref7","volume-title":"SPHINCS+","author":"H\u00fclsing et al","year":"2020"},{"key":"ref8","volume-title":"Call for Additional Digital Signature Schemes for the Post-Quantum Cryptography Standardization Process"},{"key":"ref9","volume-title":"CRYSTALS-KYBER","author":"Schwabe et al","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.203"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.204"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.205"},{"key":"ref13","volume-title":"Basic Lattice Cryptography: The Concepts Behind Kyber (ML-KEM) and Dilithium (ML-DSA)","author":"Lyubashevsky","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413-upd1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref16","volume-title":"A Look At the Latest Post-Quantum Signature Standardization Candidates","author":"Westerbaan","year":"2022"},{"key":"ref17","volume-title":"EAP-TLS 1.3: Using the Extensible Authentication Protocol With TLS 1.3","author":"Mattsson","year":"9190"},{"key":"ref18","volume-title":"The Transport Layer Security (TLS) Protocol Version 1.3","author":"Rescorla","year":"8446"},{"key":"ref19","volume-title":"Re: [CFRG] Proposed PAKE Selection Process","author":"Thomas","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3704522.3704523"},{"key":"ref22","volume-title":"Post-Quantum Cryptography: Additional Digital Signature Schemes"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060762"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2025.101650"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384725"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_24"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK55850.2022.9919545"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3624354.3630585"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431305"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.108062"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.20517\/jsss.2022.15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497755"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49187-0_14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography9040073"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-032-08124-7_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1016"},{"key":"ref38","journal-title":"IEEE Standard for Information Technology\u2014Telecommunications and Information Exchange Between Systems\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications\u2014Amendment: Enhancements for Post-Quantum Cryptography"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/11343983\/11495174.pdf?arnumber=11495174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T04:38:21Z","timestamp":1779165501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11495174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2026.3687929","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}