{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:49:53Z","timestamp":1772905793210,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT)","award":["RS-2023-00225201, IITP-2024-RS-2024-00423071, RS-2024-00341722"],"award-info":[{"award-number":["RS-2023-00225201, IITP-2024-RS-2024-00423071, RS-2024-00341722"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714944","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:47:11Z","timestamp":1745362031000},"page":"2969-2980","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["E\n            <scp>xpress<\/scp>\n            PQD\n            <scp>elivery<\/scp>\n            : Toward Efficient and Immediately Deployable Post-Quantum Key Delivery for Web-of-Things"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7635-8653","authenticated-orcid":false,"given":"Jane","family":"Kim","sequence":"first","affiliation":[{"name":"Hanyang University, Ansan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3075-9440","authenticated-orcid":false,"given":"Jung-Hun","family":"Kang","sequence":"additional","affiliation":[{"name":"Hanyang University, Ansan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7490-9936","authenticated-orcid":false,"given":"Hyunwoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Korean Institute of Energy Technology (KENTECH), Naju, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1150-7080","authenticated-orcid":false,"given":"Seung-Hyun","family":"Seo","sequence":"additional","affiliation":[{"name":"Hanyang University ERICA, Ansan, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Joe Abley. 2012. Ten Million DNS Resolvers on the Internet. https:\/\/www.icann.org\/en\/blogs\/details\/ten-million-dns-resolvers-on-the-internet-22--3--2012-en."},{"key":"e_1_3_2_1_2_1","volume-title":"TurboTLS: TLS connection establishment with 1 less round trip. arXiv preprint arXiv:2302.05311","author":"Aguilar-Melchor Carlos","year":"2023","unstructured":"Carlos Aguilar-Melchor, Thomas Bailleux, Jason Goertzen, David Joseph, and Douglas Stebila. 2023. TurboTLS: TLS connection establishment with 1 less round trip. arXiv preprint arXiv:2302.05311 (2023)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.10.001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3096916"},{"key":"e_1_3_2_1_5_1","volume-title":"Energy consumption of candidate algorithms for NIST PQC standards","author":"Banerjee Tanushree","year":"2018","unstructured":"Tanushree Banerjee and M Anwar Hasan. 2018. Energy consumption of candidate algorithms for NIST PQC standards. University of Waterloo Centre for Applied Cryptographic Research, Tech. Rep (2018)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"e_1_3_2_1_7_1","volume-title":"LPWAN technologies for IoT and M2M applications","author":"Borkar Suresh R","unstructured":"Suresh R Borkar. 2020. Long-term evolution for machines (LTE-M). In LPWAN technologies for IoT and M2M applications. Elsevier, 145--166."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_2_1_9_1","unstructured":"Deirdre Connolly. 2024. ML-KEM Post-Quantum Key Agreement for TLS 1.3. Internet-Draft draft-connolly-tls-mlkem-key-agreement-01. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-connolly-tls-mlkem-key-agreement\/01\/ Work in Progress."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2016.7763264"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"John Dickinson Sara Dickinson Ray Bellis Allison Mankin and Duane Wessels. 2016. RFC 7766: DNS transport over TCP-implementation requirements.","DOI":"10.17487\/RFC7766"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Tim Dierks and Eric Rescorla. 2008. RFC 5246: The transport layer security (TLS) protocol version 1.2.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_15_1","volume-title":"Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Ducas L\u00e9o","year":"2018","unstructured":"L\u00e9o Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2018. Crystals-dilithium: A lattice-based digital signature scheme. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 238--268."},{"key":"e_1_3_2_1_16_1","unstructured":"W\u00fcrth Elektronik. 2024. Adrastea-I. https:\/\/www.we-online.com\/en\/components\/products\/ADRASTEA-I Retrieved 14--10--2024."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40003-2_20"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49187-0_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3447nolinkurl10.17487"},{"key":"e_1_3_2_1_21_1","unstructured":"JOSEPH R. BIDEN JR. 2022. National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems. https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/05\/04\/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-systems\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505223"},{"key":"e_1_3_2_1_23_1","volume-title":"The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. Cryptology ePrint Archive","author":"Kampanakis Panos","year":"2024","unstructured":"Panos Kampanakis and Will Childs-Klein. 2024. The impact of data-heavy, post-quantum TLS 1.3 on the Time-To-Last-Byte of real-world connections. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07689-3_25"},{"key":"e_1_3_2_1_25_1","unstructured":"Matthias J Kannwischer Joost Rijneveld Peter Schwabe and Ko Stoffelen. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. (2019)."},{"key":"e_1_3_2_1_26_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Lee Hyeonmin","year":"2022","unstructured":"Hyeonmin Lee, Md Ishtiaq Ashiq, Moritz M\u00fcller, Roland van Rijswijk-Deij, Taejoong Chung, et al. 2022. Under the hood of {DANE} mismanagement in {SMTP}. In 31st USENIX Security Symposium (USENIX Security 22). 1--16."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Web Conference","author":"Lee Hyunwoo","year":"2021","unstructured":"Hyunwoo Lee, Doowon Kim, and Yonghwi Kwon. 2021. TLS 1.3 in practice: How TLS 1.3 contributes to the internet. In Proceedings of the Web Conference 2021. 70--79."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583516"},{"key":"e_1_3_2_1_29_1","volume-title":"Assessing Support for DNS-over-TCP in the Wild. In International Conference on Passive and Active Network Measurement. Springer, 487--517","author":"Mao Jiarun","year":"2022","unstructured":"Jiarun Mao, Michael Rabinovich, and Kyle Schomp. 2022. Assessing Support for DNS-over-TCP in the Wild. In International Conference on Passive and Active Network Measurement. Springer, 487--517."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008302122286"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Paul V Mockapetris. 1987. RFC1034: Domain names-concepts and facilities.","DOI":"10.17487\/rfc1034"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431832.3431838nolinkurl10.1145"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497755"},{"key":"e_1_3_2_1_35_1","volume-title":"Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/selected-algorithms-2022.","author":"Prest Thomas","year":"2022","unstructured":"Thomas Prest, Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang. 2022. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/selected-algorithms-2022."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. hrefhttps:\/\/doi.org\/10.17487\/RFC8446doi:nolinkurl10.17487\/RFC8446","DOI":"10.17487\/RFC8446nolinkurl10.17487"},{"key":"e_1_3_2_1_37_1","volume-title":"Wood","author":"Rescorla Eric","year":"2022","unstructured":"Eric Rescorla, Kazuho Oku, Nick Sullivan, and Christopher A. Wood. 2022a. TLS Encrypted Client Hello. Internet-Draft draft-ietf-tls-esni-14. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-esni-14 Work in Progress."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"E Rescorla H Tschofenig and N Modadugu. 2022b. RFC 9147: The Datagram Transport Layer Security (DTLS) Protocol Version 1.3.","DOI":"10.17487\/RFC9147"},{"key":"e_1_3_2_1_39_1","unstructured":"Marcus Ringstr\u00f6m and Anton Olivestam. 2022. Analysis of Longitudinal Changes of Certificate Chains."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00012"},{"key":"e_1_3_2_1_41_1","unstructured":"Open Quantum Safe. 2024. oqs-provider. https:\/\/github.com\/open-quantum-safe\/oqs-provider Retrieved 8--10--2024."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"e_1_3_2_1_43_1","volume-title":"On the suitability of post-quantum signature schemes for internet of things","author":"Shim Kyung-Ah","year":"2023","unstructured":"Kyung-Ah Shim. 2023. On the suitability of post-quantum signature schemes for internet of things. IEEE Internet of Things Journal (2023)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569127"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431305"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3624354.3630585"},{"key":"e_1_3_2_1_48_1","volume-title":"11st","year":"2024","unstructured":"STMicroelectronics. 2024a. STM32 Nucleo-144 development board with STM32F439ZI MCU, supports Arduino, ST Zio and morpho connectivity. https:\/\/www.st.com\/en\/evaluation-tools\/nucleo-f439zi.html#overview July, 11st, 2024."},{"key":"e_1_3_2_1_49_1","unstructured":"STMicroelectronics. 2024b. STM32CubeIDE. https:\/\/www.st.com\/content\/st_com\/en\/stm32cubeide.html We exported the board list from the board selector section in STM32CubeIDE.."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587135.3592821"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21280-2_24"},{"key":"e_1_3_2_1_52_1","unstructured":"Chengdu Ebyte Electronic Technology. 2024. E77--900M22S. https:\/\/www.cdebyte.com\/products\/E77--900M22S\/2 Retrieved 14--10--2024."},{"key":"e_1_3_2_1_53_1","volume-title":"Marc Stevens Ward van der Schoot, and AIVD Cryptologists & Security Advisors.","author":"Duarte Thomas Attenma Joao Diogo","year":"2023","unstructured":"Joao Diogo Duarte Thomas Attenma, Matthieu Lequesne Vincert Dnning, Marc Stevens Ward van der Schoot, and AIVD Cryptologists & Security Advisors. 2023. The PQC Migration Handbook."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Geoff Twardokus Nina Bindel Hanif Rahbari and Sarah McCarthy. 2024. When Cryptography Needs a Hand: Practical Post-Quantum Authentication for V2V Communications.. In NDSS.","DOI":"10.14722\/ndss.2024.24267"},{"key":"e_1_3_2_1_55_1","unstructured":"W3C. 2024. Web of Things (WoT) Architecture 1.1. https:\/\/w3c.github.io\/wot-architecture\/ Retrieved 14--10--2024."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662363"},{"key":"e_1_3_2_1_57_1","article-title":"Analysis of DNS cache effects on query distribution","volume":"2013","author":"Zheng Wang","year":"2013","unstructured":"Zheng Wang et al. 2013. Analysis of DNS cache effects on query distribution. The Scientific World Journal, Vol. 2013 (2013).","journal-title":"The Scientific World Journal"},{"key":"e_1_3_2_1_58_1","unstructured":"LoRa Alliance Technical Committee Regional Parameters Workgroup. 2018. LoRaWAN\u2122 1.0.3 Regional Parameters. https:\/\/lora-alliance.org\/wp-content\/uploads\/2020\/11\/lorawan_regional_parameters_v1.0.3reva_0.pdf Retrieved 14--10--2024."},{"key":"e_1_3_2_1_59_1","unstructured":"The ETSI Quantum-Safe Cryptography working group. 2020. Migration strategies and recommendations to Quantum Safe schemes."}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714944","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:54Z","timestamp":1750295934000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714944"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":57,"alternative-id":["10.1145\/3696410.3714944","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714944","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}