{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:05Z","timestamp":1755882605903,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of the Interior of the Czech Republic","award":["VJ03030014"],"award-info":[{"award-number":["VJ03030014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670463","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum-Resistant and Secure MQTT Communication"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7208-2514","authenticated-orcid":false,"given":"Lukas","family":"Malina","sequence":"first","affiliation":[{"name":"Department of Telecommunications, Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7321-7003","authenticated-orcid":false,"given":"Patrik","family":"Dobias","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4366-3950","authenticated-orcid":false,"given":"Petr","family":"Dzurenda","sequence":"additional","affiliation":[{"name":"Department of Telecommunications, Brno University of Technology, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT49546.2020.9239560"},{"key":"e_1_3_2_1_2_1","unstructured":"Nicolas Aragon Paulo\u00a0SLM Barreto Slim Bettaieb Loic Bidoux Olivier Blazy Jean-Christophe Deneuville Philippe Gaborit Shay Gueron Tim Guneysu Carlos\u00a0Aguilar Melchor 2017. BIKE: bit flipping key encapsulation. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5220\/0010903000003120"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"e_1_3_2_1_5_1","volume-title":"CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). 353\u2013367","author":"Bos Joppe","year":"2018","unstructured":"Joppe Bos, Leo Ducas, Eike Kiltz, T Lepoint, Vadim Lyubashevsky, John\u00a0M. Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehle. 2018. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). 353\u2013367."},{"key":"e_1_3_2_1_6_1","volume-title":"Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices. In 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC). IEEE, 230\u2013235","author":"Bozhko Jessica","year":"2023","unstructured":"Jessica Bozhko, Yacoub Hanna, Ricardo Harrilal-Parchment, Samet Tonyali, and Kemal Akkaya. 2023. Performance Evaluation of Quantum-Resistant TLS for Consumer IoT Devices. In 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC). IEEE, 230\u2013235."},{"key":"e_1_3_2_1_7_1","volume-title":"Classic McEliece: conservative code-based cryptography","author":"Chou Tung","year":"2020","unstructured":"Tung Chou, Carlos Cid, S UiB, J Gilcher, T Lange, V Maram, R Misoczki, R Niederhagen, KG Paterson, and E Persichetti. 2020. Classic McEliece: conservative code-based cryptography, 10 October 2020."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498361.3538766"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445969.3450423"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"e_1_3_2_1_11_1","volume-title":"Introducing CIRCL: An Advanced Cryptographic Library. Cloudflare.","author":"Faz-Hern\u00e1ndez Armando","year":"2023","unstructured":"Armando Faz-Hern\u00e1ndez and Kris Kwiatkowski. 2019. Introducing CIRCL: An Advanced Cryptographic Library. Cloudflare. Available at https:\/\/github.com\/cloudflare\/circl. v1.3.3 Accessed May, 2023."},{"key":"e_1_3_2_1_12_1","unstructured":"Federal\u00a0Office for Information Security\u00a0(BSI). 2021. Quantum-safe cryptography \u2013 fundamentals current developments and recommendations."},{"key":"e_1_3_2_1_13_1","volume-title":"Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST\u2019s post-quantum cryptography standardization process 36, 5","author":"Fouque Pierre-Alain","year":"2018","unstructured":"Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Prest, Thomas Ricosset, Gregor Seiler, William Whyte, Zhenfei Zhang, 2018. Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST\u2019s post-quantum cryptography standardization process 36, 5 (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3221857"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340503"},{"key":"e_1_3_2_1_16_1","first-page":"13","article-title":"Hamming quasi-cyclic (HQC)","volume":"2","author":"Melchor Carlos\u00a0Aguilar","year":"2018","unstructured":"Carlos\u00a0Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Lo\u0131c Bidoux, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Edoardo Persichetti, Gilles Z\u00e9mor, and IC Bourges. 2018. Hamming quasi-cyclic (HQC). NIST PQC Round 2, 4 (2018), 13.","journal-title":"NIST PQC Round"},{"key":"e_1_3_2_1_17_1","volume-title":"Assessment of the Impact of Hybrid Post-Quantum Cryptography on the Performance of the MQTT Communication Protocol. In 2023 Symposium on Internet of Things (SIoT). IEEE, 1\u20135.","author":"Jos\u00e9\u00a0Aguiar Rampazzo Felipe","year":"2023","unstructured":"Felipe Jos\u00e9\u00a0Aguiar Rampazzo and Marco Aur\u00e9lio\u00a0Amaral Henriques. 2023. Assessment of the Impact of Hybrid Post-Quantum Cryptography on the Performance of the MQTT Communication Protocol. In 2023 Symposium on Internet of Things (SIoT). IEEE, 1\u20135."},{"key":"e_1_3_2_1_18_1","unstructured":"M\u00e9lissa Rossi. 2023. PQC TRANSITION IN FRANCE ANSSI VIEWS. In Real World Post-Quantum Crypto."},{"key":"e_1_3_2_1_19_1","first-page":"2608","article-title":"A survey on post-quantum cryptography for constrained devices","volume":"14","author":"Roy Kumar\u00a0Sekhar","year":"2019","unstructured":"Kumar\u00a0Sekhar Roy and Hemanta\u00a0Kumar Kalita. 2019. A survey on post-quantum cryptography for constrained devices. International Journal of Applied Engineering Research 14, 11 (2019), 2608\u20132615.","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_3_2_1_20_1","volume-title":"Analysis of Post-Quantum Cryptography for Internet of Things. In 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 387\u2013394","author":"Sajimon PC","year":"2022","unstructured":"PC Sajimon, Kurunandan Jain, and Prabhakar Krishnan. 2022. Analysis of Post-Quantum Cryptography for Internet of Things. In 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 387\u2013394."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3003998"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453528"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:50:58Z","timestamp":1755881458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":22,"alternative-id":["10.1145\/3664476.3670463","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670463","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}