{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T06:35:49Z","timestamp":1767249349300,"version":"3.48.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/wincom65874.2025.11313444","type":"proceedings-article","created":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T18:42:18Z","timestamp":1767206538000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Falcon-Based Post-Quantum Blockchain Performance Through Compression Integration"],"prefix":"10.1109","author":[{"given":"Dahhak","family":"Hajar","sequence":"first","affiliation":[{"name":"Hassan2 University,C3S Laboratory EST, CED ENSEM,Casablanca,Morocco"}]},{"given":"Afifi","family":"Nadia","sequence":"additional","affiliation":[{"name":"Hassan2 University,C3S Laboratory EST,Casablanca,Morocco"}]},{"given":"Hilal","family":"Imane","sequence":"additional","affiliation":[{"name":"Itqan Team, ESI,Rabat,Morocco"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-29860-8_20","article-title":"Blockchain Security Attacks: A Review Study. In: Motahhir, S., Bossoufi, B. (eds) Digital Technologies and Applications","volume":"669","author":"Hajar","year":"2023","journal-title":"ICDTA 2023. Lecture Notes in Networks and Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1994.365700"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-47331-1"},{"key":"ref5","article-title":"Efficient Lattice-Based Cryptography for Secure Blockchain Systems","author":"Boneh","year":"2023","journal-title":"Cryptology ePrint Archive, Report 2023\/456"},{"issue":"2","key":"ref6","first-page":"103","article-title":"NTRUEncrypt and NTRUSign: Secure Algorithms for Post-Quantum Blockchains","volume":"18","author":"Hoffstein","year":"2022","journal-title":"Journal of Blockchain Research"},{"issue":"3","key":"ref7","first-page":"567","article-title":"A Survey on Post-Quantum Cryptography: A Blockchain Perspective","volume":"12","author":"Chen","year":"2023","journal-title":"Journal of Cryptography"},{"issue":"4","key":"ref8","first-page":"45","article-title":"Trade-offs in Post-Quantum Cryptography for Blockchain: Performance vs. Security","volume":"26","author":"Peng","year":"2023","journal-title":"ACM Transactions on Privacy and Security"},{"key":"ref9","article-title":"Optimizing Post-quantum Blockchain Performance Through Adaptive Block Segmentation: A Comparative Study","volume":"1353","author":"Hajar","year":"2025","journal-title":"Intersection of Artificial Intelligence, Data Science, and Cutting-Edge Technologies: From Concepts to Applications in Smart Environment. ICAISE 2024. Lecture Notes in Networks and Systems"},{"issue":"2","key":"ref10","first-page":"100","article-title":"Post-Quantum Cryptography in Blockchain: A Comprehensive Review","volume":"4","author":"Kim","year":"2022","journal-title":"Blockchain: Research and Applications"},{"issue":"3","key":"ref11","first-page":"367","article-title":"Parallel Blockchain Segmentation: Enhancing Throughput and Efficiency","volume":"5","author":"Liu","year":"2023","journal-title":"IEEE Transactions on Blockchain"},{"issue":"3","key":"ref12","first-page":"367","article-title":"Federated Learning with Blockchain Segmentation: A New Paradigm","volume":"2","author":"Wang","year":"2023","journal-title":"IEEE Transactions on Artificial Intelligence"},{"issue":"5","key":"ref13","first-page":"1021","article-title":"Deep Learning for Decentralized Fairness in Blockchain Systems","volume":"45","author":"Zuo","year":"2023","journal-title":"Neural Computing & Applications"},{"issue":"1","key":"ref14","first-page":"10","article-title":"Post-Quantum Cryptography for Blockchain: Challenges and Opportunities","volume":"24","author":"Kamat","year":"2022","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref15","first-page":"65023","article-title":"Segmentation in Federated Learning Blockchains: A Survey","volume":"10","author":"Zhang","year":"2022","journal-title":"IEEE Access"},{"issue":"1","key":"ref16","first-page":"50","article-title":"Segmented Blockchain for Scalable and Efficient Consensus","volume":"9","author":"Chen","year":"2023","journal-title":"Journal of Distributed Ledger Technology"},{"issue":"2","key":"ref17","first-page":"189","article-title":"Challenges in Segmentation of Post-Quantum Blockchain","volume":"4","author":"Lyu","year":"2023","journal-title":"Journal of Cryptology and Blockchain Security"},{"issue":"1","key":"ref18","first-page":"780","article-title":"Lattice-Based Privacy-Preserving Schemes for Blockchain Segmentation","volume":"18","author":"Peng","year":"2023","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"ref19","first-page":"120","article-title":"Lightweight Compression Algorithms for Scalable Blockchain Applications","volume":"14","author":"Green","year":"2023","journal-title":"Journal of Blockchain and Cryptography"},{"issue":"3","key":"ref20","first-page":"123","article-title":"Towards Scalable and Secure Post-Quantum Blockchain Systems","volume":"14","author":"Chen","year":"2023","journal-title":"Journal of Blockchain Research"},{"issue":"3","key":"ref21","first-page":"567","article-title":"Optimized Block Validation with LatticeBased Cryptography","volume":"10","author":"Hoffstein","year":"2022","journal-title":"Journal of Cryptographic Applications"},{"issue":"4","key":"ref22","first-page":"345","article-title":"Adaptive Compression Techniques for High-Efficiency Blockchain Networks","volume":"7","author":"Nakamura","year":"2023","journal-title":"Journal of Blockchain Science and Technology"},{"issue":"1","key":"ref23","first-page":"45","article-title":"Blockchain Optimization for High-Performance Post-Quantum Systems","volume":"15","author":"Wang","year":"2023","journal-title":"Journal of Distributed Systems"},{"issue":"2","key":"ref24","first-page":"134","article-title":"Evaluating Compression Strategies for PostQuantum Blockchain Performance","volume":"6","author":"Liu","year":"2023","journal-title":"Journal of Blockchain Advances"},{"issue":"2","key":"ref25","first-page":"89","article-title":"Advanced Segmentation in Post-Quantum Blockchain Frameworks","volume":"19","author":"Green","year":"2023","journal-title":"IEEE Transactions on Advanced Computing"},{"issue":"1","key":"ref26","first-page":"23","article-title":"Comparative Studies of Post-Quantum and Classical Blockchains","volume":"8","author":"Li","year":"2023","journal-title":"Journal of Cryptographic Studies"},{"issue":"2","key":"ref27","first-page":"190209","article-title":"Secure Blockchain Architectures with PostQuantum Compression","volume":"14","author":"Peng","year":"2023","journal-title":"Journal of Blockchain Technologies"},{"issue":"3","key":"ref28","first-page":"210","article-title":"Impact of Segmentation on Blockchain Scalability","volume":"7","author":"Liu","year":"2023","journal-title":"Journal of Advanced Blockchain Solutions"},{"issue":"4","key":"ref29","first-page":"278","article-title":"Exploring Scalability in Post-Quantum Blockchains","volume":"11","author":"Kamat","year":"2023","journal-title":"Journal of Distributed Ledger Research"},{"issue":"3","key":"ref30","first-page":"145","article-title":"Post-Quantum Blockchain Resilience under HighLoad Scenarios","volume":"12","author":"Zuo","year":"2023","journal-title":"Journal of Blockchain Performance"},{"issue":"4","key":"ref31","first-page":"345","article-title":"Hybrid Techniques for Efficient PostQuantum Blockchain Systems","volume":"6","author":"Nakamoto","year":"2023","journal-title":"Journal of Blockchain Studies"}],"event":{"name":"2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)","start":{"date-parts":[[2025,11,25]]},"location":"Riyadh, Saudi Arabia","end":{"date-parts":[[2025,11,27]]}},"container-title":["2025 12th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11313234\/11313346\/11313444.pdf?arnumber=11313444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T06:31:02Z","timestamp":1767249062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11313444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wincom65874.2025.11313444","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}