{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T18:32:28Z","timestamp":1775932348013,"version":"3.50.1"},"reference-count":77,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union, through the European Regional Development Fund","award":["KK.01.2.1.02.0294"],"award-info":[{"award-number":["KK.01.2.1.02.0294"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>The continuous development of quantum computing necessitates the development of quantum-resistant cryptographic algorithms. In response to this demand, the National Institute of Standards and Technology selected standardized algorithms including Crystals-Dilithium, Falcon, and Sphincs+ for digital signatures. This paper provides a comparative evaluation of these algorithms across key metrics. The results indicate varying strengths and weaknesses for each algorithm, underscoring the importance of context-specific deployments. Our findings indicate that Dilithium offers advantages in low-power scenarios, Falcon excels in signature verification speed, and Sphincs+ provides robust security at the cost of computational efficiency. These results underscore the importance of context-specific deployments in specific and resource-constrained technological applications, like IoT, smart cards, blockchain, and vehicle-to-vehicle communication.<\/jats:p>","DOI":"10.3390\/a16110518","type":"journal-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T08:35:52Z","timestamp":1699864552000},"page":"518","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments"],"prefix":"10.3390","volume":"16","author":[{"given":"Marin","family":"Vidakovi\u0107","sequence":"first","affiliation":[{"name":"Sedmi Odjel Ltd., 10000 Zagreb, Croatia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8896-5071","authenticated-orcid":false,"given":"Kruno","family":"Mili\u010devi\u0107","sequence":"additional","affiliation":[{"name":"Random Red Ltd., 31000 Osijek, Croatia"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cutugno, M., Giani, A., Alsing, P.M., Wessing, L., and Schnore, A. (2022). Quantum Computing Approaches for Mission Covering Optimization. Algorithms, 15.","DOI":"10.3390\/a15070224"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Hadfield, S., Wang, Z., O\u2019gorman, B., Rieffel, E.G., Venturelli, D., and Biswas, R. (2019). From the Quantum Approximate Optimization Algorithm to a Quantum Alternating Operator Ansatz. Algorithms, 12.","DOI":"10.3390\/a12020034"},{"key":"ref_3","unstructured":"NIST (2023, September 17). Post-Quantum Cryptography, Available online: https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography."},{"key":"ref_4","unstructured":"NIST (2023, September 17). Announcing Request for Nominations for Public-Key Post-Quantum Cryptographic Algorithms, Available online: https:\/\/csrc.nist.gov\/news\/2016\/public-key-post-quantum-cryptographic-algorithms."},{"key":"ref_5","unstructured":"NIST (2023, September 17). Post-Quantum Cryptography\u2014Call for Proposals, Available online: https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/Call-for-Proposals."},{"key":"ref_6","unstructured":"NIST (2023, September 17). Post-Quantum Cryptography\u2014Round 1 Submissions, Available online: https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/Round-1-Submissions."},{"key":"ref_7","unstructured":"NIST (2023, September 17). Post-Quantum Cryptography\u2014Round 2 Submissions, Available online: https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-2-submissions."},{"key":"ref_8","unstructured":"NIST (2023, September 17). Post-Quantum Cryptography\u2014Round 3 Submissions, Available online: https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/round-3-submissions."},{"key":"ref_9","unstructured":"Pornin, T. (2023, November 06). New Efficient, Constant-Time Implementations of Falcon. Cryptology ePrint Archive 2019, Paper 2019\/893. Available online: https:\/\/eprint.iacr.org\/2019\/893."},{"key":"ref_10","unstructured":"NIST (2022, May 08). SP 800-56C Rev. 2\u2014Recommendation for Key-Derivation Methods in Key-Establishment Schemes, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-56c\/rev-2\/final."},{"key":"ref_11","unstructured":"NIST (2023, September 17). Module-Lattice-Based Digital Signature Standard, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/204\/ipd."},{"key":"ref_12","unstructured":"NIST (2023, September 17). Stateless Hash-Based Digital Signature Standard, Available online: https:\/\/csrc.nist.gov\/pubs\/fips\/205\/ipd."},{"key":"ref_13","unstructured":"NIST (2023, September 17). NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers, Available online: https:\/\/www.nist.gov\/news-events\/news\/2023\/08\/nist-standardize-encryption-algorithms-can-resist-attack-quantum-computers."},{"key":"ref_14","unstructured":"CRYSTALS Team (2023, September 17). CRYSTALS-Dilithium\u2014Cryptographic Suite for Algebraic Lattices. Available online: https:\/\/pq-crystals.org\/dilithium\/index.shtml."},{"key":"ref_15","unstructured":"Lyubashevsky, V. (2009). Advances in Cryptology\u2014ASIACRYPT 2009, Springer."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1007\/978-3-642-29011-4_43","article-title":"Lattice Signatures Without Trapdoors","volume":"Volume 7237","author":"Lyubashevsky","year":"2012","journal-title":"Advances in Cryptology\u2014EUROCRYPT 2012"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1007\/978-3-642-33027-8_31","article-title":"Practical lattice-based cryptography: A signature scheme for embedded systems","volume":"Volume 7428","author":"Guneysu","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems\u2014CHES 2012"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/978-3-319-04852-9_2","article-title":"An improved compression technique for signatures based","volume":"Volume 8366","author":"Bai","year":"2014","journal-title":"CT-RSA, Lecture Notes in Computer Science"},{"key":"ref_19","unstructured":"Bai, S., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., and Damien, S. (2023, November 06). CRYSTALS-Dilithium\u2013Algorithm Specifications and Supporting Documentation, 2020, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/post-quantum-cryptography\/documents\/round-3\/submissions\/Dilithium-Round3.zip."},{"key":"ref_20","unstructured":"Lyubashevsky, V. (2023, November 06). CRYSTALS-Dilithium Presentation at Third PQC Standardization Conference\u2014Session I Welcome\/Candidate Updates. NIST, 2021, Available online: https:\/\/csrc.nist.gov\/presentations\/2021\/crystals-dilithium-round-3-presentation."},{"key":"ref_21","first-page":"1","article-title":"Compact Dilithium Implementations on Cortex-M3 and Cortex-M4","volume":"1","author":"Greconici","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., and Vaikuntanathan, V. (2008, January 17\u201320). Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, New York, NY, USA.","DOI":"10.1145\/1374376.1374407"},{"key":"ref_23","unstructured":"Fouque, P.-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., and Zhang, Z. (2023, November 06). Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/post-quantum-cryptography\/documents\/round-3\/submissions\/Falcon-Round3.zip."},{"key":"ref_24","unstructured":"Prest, T. (2023, November 06). Falcon Presentation at Third PQC Standardization Conference\u2014Session I Welcome\/Candidate Updates, Available online: https:\/\/www.nist.gov\/video\/third-pqc-standardization-conference-session-i-welcomecandidate-updates."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., and Wilcox-O\u2019Hearn, Z. (2015, January 26\u201330). SPHINCS: Practical stateless hash-based signatures. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria.","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref_26","unstructured":"Ding, J., Chen, M.-S., Kannwischer, M., Patarin, J., Petzoldt, A., Schmidt, D., and Yang, B.-Y. (2023, November 06). Rainbow\u2014Algorithm Specification and Documentation; 2020, Available online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/post-quantum-cryptography\/documents\/round-3\/submissions\/Rainbow-Round3.zip."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Yokubov, B., and Gan, L. (2021, January 10\u201312). Comprehensive Comparison of Post-Quantum Digital Signature Schemes in Blockchain. Proceedings of the 2021 IEEE International Conference on Electronic Communications, Internet of Things and Big Data, Yilan County, Taiwan.","DOI":"10.1109\/ICEIB53692.2021.9686427"},{"key":"ref_28","unstructured":"Soni, D., Basu, K., Nabeel, M., and Karri, R. (2019, January 22\u201324). A Hardware Evaluation Study of NIST Post-Quantum Cryptographic Signature schemes. Proceedings of the 2nd NIST PQC Standardization Conference, Santa Barbara, CA, USA."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ortega, K.D., and Perez, L.J.D. (2021, January 1\u20134). Implementing CRYSTAL-Dilithium on FRDM-K64. Proceedings of the 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, New York, NY, USA.","DOI":"10.1109\/UEMCON53757.2021.9666622"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Nguyen, D.T., and Gaj, K. (2021, January 6\u201310). High-Performance Hardware Implementation of CRYSTALS-Dilithium. Proceedings of the 2021 International Conference on Field-Programmable Technology (ICFPT), Auckland, New Zealand.","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"ref_31","first-page":"270","article-title":"A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium","volume":"2022","author":"Zhao","year":"2022","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Becker, H., Hwang, V., Kannwischer, M.J., and Yang, B.-Y. (2022). Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1, IACR Transactions on Cryptographic Hardware and Embedded Systems.","DOI":"10.46586\/tches.v2022.i1.221-244"},{"key":"ref_33","unstructured":"Bradbury, J., and Hess, B. (2021, January 7\u20139). Fast Quantum-Safe Cryptography on IBM Z. Proceedings of the 3rd NIST PQC Standardization Conference, Virtual."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"44446","DOI":"10.1109\/ACCESS.2022.3169784","article-title":"Accelerating Falcon on ARMv8","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Amiet, D., Leuenberger, L., Curiger, A., and Zbinden, P. (2020, January 26\u201328). FPGA-based SPHINCS+ Implementations: Mind the Glitch. Proceedings of the 2020 23rd Euromicro Conference on Digital System Design (DSD), Kranj, Slovenia.","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"ref_36","unstructured":"H\u00fclsing, A., Rijneveld, J., and Schwabe, P. (2016). PKC 2016, Springer."},{"key":"ref_37","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., and Stoffelen, K. (2021, January 7\u20139). pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. Proceedings of the NIST 3rd PQC Standardization Conference, Virtual."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"71295","DOI":"10.1109\/ACCESS.2021.3077843","article-title":"Energy Efficiency Analysis of Post-Quantum Cryptographic Algorithms","volume":"9","author":"Roma","year":"2021","journal-title":"IEEE Access"},{"key":"ref_39","unstructured":"Dimopoulos, C., Fournaris, A.P., Zhao, R.K., Sakzad, A., and Steinfeld, R. (2023, January 9\u201311). Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. Proceedings of the 20th ACM International Conference on Computing Frontiers, Bologna, Italy."},{"key":"ref_40","first-page":"1","article-title":"A High Speed Post-Quantum Crypto-Processor for Crystals-Dilithium","volume":"1","author":"Li","year":"2023","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/TC.2022.3215064","article-title":"A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange","volume":"72","author":"Aikata","year":"2022","journal-title":"IEEE Trans. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Campbell, D., Rafferty, C., Khalid, A., and O\u2019Neill, M. (September, January 29). Acceleration of Post Quantum Digital Signature Scheme CRYSTALS-Dilithium on Reconfigurable Hardware. Proceedings of the 2022 32nd International Conference on Field-Programmable Logic and Applications (FPL), Belfast, UK.","DOI":"10.1109\/FPL57034.2022.00079"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCSI.2023.3316393","article-title":"An Efficient Unified Polynomial Arithmetic Unit for CRYSTALS-Dilithium","volume":"1","author":"Pham","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1109\/TVLSI.2022.3179459","article-title":"Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform","volume":"30","author":"Wang","year":"2022","journal-title":"IEEE Trans. Very Large Scale Integr. (vlsi) Syst."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Pratiwi, N., Firmansyah, M.R., and Ezerman, M.F. (2023, January 22\u201324). Implementing CRYSTALS Kyber and Dilithium in Intel SGX Secure Enclaves. Proceedings of the 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), Bogor, Indonesia.","DOI":"10.1109\/ICoCICs58778.2023.10277539"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Kuang, H., Sun, Y., Yang, Z., Chen, C., Meng, J., and Han, J. (2023, January 19\u201321). Enhancing RISC-V Vector Extension for Efficient Application of Post-Quantum Cryptography. Proceedings of the 2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP), Porto, Portugal.","DOI":"10.1109\/ASAP57973.2023.00014"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TCSI.2022.3219555","article-title":"KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium. IEEE Trans","volume":"70","author":"Aikata","year":"2022","journal-title":"Circuits Syst. I Regul. Pap."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Mandev, R., and Kavun, E.B. (2023, January 23\u201325). Performance Comparison of Post-Quantum Signature Algorithms Through An Android Email Application Plug-in. Proceedings of the 2023 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Berlin, Germany.","DOI":"10.1109\/COINS57856.2023.10189254"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Dai, Y., Song, Y., Tian, J., and Wang, Z. (2023, January 5\u20137). High-Throughput Hardware Implementation for Haraka in SPHINCS+. Proceedings of the 24th International Symposium on Quality Electronic Design (ISQED), San Francisco, CA, USA.","DOI":"10.1109\/ISQED57927.2023.10129310"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Sim, M., Eum, S., Song, G., Yang, Y., Kim, W., and Seo, H. (2023). K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms. Sensors, 23.","DOI":"10.3390\/s23177558"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Kudinov, M., Ronen, E., and Yogev, E. (2023, January 21\u201325). SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost. Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46215.2023.10179381"},{"key":"ref_52","unstructured":"NIST (2023, November 03). Lightweight Cryptography. 5 September 2023, Available online: https:\/\/csrc.nist.gov\/Projects\/lightweight-cryptography."},{"key":"ref_53","unstructured":"NIST (2023, November 03). Lightweight Cryptography Standardization Process: NIST Selects Ascon. NIST, Available online: https:\/\/csrc.nist.gov\/news\/2023\/lightweight-cryptography-nist-selects-ascon."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Hern\u00e1ndez-\u00c1lvarez, L., P\u00e9rez, J.B., Batista, F., and Queiruga-Dios, A. (2022). Security Threats and Cryptographic Protocols for Medical Wearables. Mathematics, 10.","DOI":"10.3390\/math10060886"},{"key":"ref_55","unstructured":"Atkins, D. (2021, January 7\u20139). Requirements for Post-Quantum Cryptography on Embedded Devices for the IoT. Proceedings of the 3rd NIST PQC Standardization Conference, Virtual."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Gonzales, R., Hulsing, A., Kannwischer, M.J., Kramer, J., Lange, T., Stottinger, M., Waitz, E., Wiggers, T., and Yang, B.-Y. (2021, January 7\u20139). Verifying Post-Quantum Signatures in 8 kB of RAM. Proceedings of the 3rd NIST PQC Standardization Conference, Virtual.","DOI":"10.1007\/978-3-030-81293-5_12"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1016\/j.future.2022.11.034","article-title":"A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things","volume":"141","author":"Liu","year":"2023","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_58","unstructured":"Land, G., Sasdrich, P., and G\u00fcneysu, T. (2021). International Conference on Smart Card Research and Advanced Applications, Springer International Publishing."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Berthet, Q., Upegui, A., Gantel, L., Duc, A., and Traverso, G. (2021, January 17\u201321). An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor. Proceedings of the 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, OR, USA.","DOI":"10.1109\/IPDPSW52791.2021.00034"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MDAT.2023.3305156","article-title":"Hardware Accelerators for Digital Signature Algorithms Dilithium and FALCON","volume":"1","author":"Beckwith","year":"2023","journal-title":"IEEE Des. Test"},{"key":"ref_61","unstructured":"Greuet, A. (2021, January 7\u20139). Smartcard and Post-Quantum Crypto. Proceedings of the 3rd NIST PQC Standardization Conference, Virtual."},{"key":"ref_62","unstructured":"Migliore, V., Gerard, B., Tibouchi, M., and Fouque, P.-A. (2023, November 06). Masking Dilithium: Efficient Implementation. Cryptology ePrint Archive 2019, Paper 2019\/394. Available online: https:\/\/eprint.iacr.org\/2019\/394."},{"key":"ref_63","unstructured":"Flaherty, N. (2023, September 17). NXP, IBM Look to Post Quantum Algorithms for Smart Cards. Available online: https:\/\/www.eenewseurope.com\/en\/nxp-ibm-look-to-post-quantum-algorithms-for-smart-cards\/."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Vakarjuk, J., Snetkov, N., and Willemson, J. (2021). DiLizium: A Two-Party Lattice-Based Signature Scheme. Entropy, 23.","DOI":"10.3390\/e23080989"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"14025","DOI":"10.1109\/TITS.2021.3131668","article-title":"A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications","volume":"23","author":"Shim","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_66","unstructured":"Bindel, N., McCarthy, S., Rahbari, H., and Twardokus, G. (2021, January 7\u20139). Suitability of 3rd Round Signature Candidates for Vehicle-to-Vehicle Communication. Proceedings of the 3rd NIST PQC Standardization Conference, Virtual."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Manna, M.L., Perazzo, P., Treccozzi, L., and Dini, G. (2021, January 7\u20139). Assessing the Cost of Quantum Security for Automotive Over\u2014The-Air Updates. Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), Athens, Greece.","DOI":"10.1109\/ISCC53001.2021.9631426"},{"key":"ref_68","unstructured":"Winkler, D., Sep\u00falveda, D., Cupelli, M., Olexa, R., and Sep\u00falveda, J. (2021, January 10\u201311). Quantum secure high performance automotive systems. Proceedings of the 19th Escar Europe: The World\u2019s Leading Automotive Cyber Security Conference, Frankfurt, Germany."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Sep\u00falveda, J., and Winkler, D. (2022, January 23\u201327). Super Acceleration of Dilithium in MPSoCs Critical Environments. Proceedings of the 2022 IEEE European Test Symposium (ETS), Barcelona, Spain.","DOI":"10.1109\/ETS54262.2022.9810468"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Kim, Y., and Seo, S.C. (2023). Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards. Appl. Sci., 13.","DOI":"10.3390\/app13105874"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Sharma, L., and Mihra, A. (2021, January 21\u201323). Analysis of Crystals-Dilithium for BlockChain Security. Proceedings of the Second International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India.","DOI":"10.1109\/ICSCCC51823.2021.9478087"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Raavi, M., Chandramouli, P., Wuthier, S., Zhou, X., and Chang, S.-Y. (2021, January 19\u201322). Performance Characterization of Post-Quantum Digital Certificates. Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece.","DOI":"10.1109\/ICCCN52240.2021.9522179"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Cozzo, D., and Smart, N.P. (2019, January 22\u201324). Sharing the LUOV: Threshold Post-Quantum Signatures. Proceedings of the 2nd NIST PQC Standardization Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-030-35199-1_7"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Mirtskhulava, L., Iavich, M., Razmadze, M., and Gulua, N. (December, January 29). Securing Medical Data in 5G and 6G via Multichain Blockchain Technology using Post-Quantum Signatures. Proceedings of the 2021 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), Kyiv, Ukraine.","DOI":"10.1109\/UkrMiCo52950.2021.9716595"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Thanalakshmi, P., Rishikhesh, A., Marceline, J.M., Joshi, G.P., and Cho, W. (2023). A Quantum-Resistant Blockchain System: A Comparative Analysis. Mathematics, 11.","DOI":"10.3390\/math11183947"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-023-32701-6","article-title":"Quantum-resistance in blockchain networks","volume":"13","author":"Allende","year":"2023","journal-title":"Sci. Rep."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Verma, N., Kumari, S., and Jain, P. (2022, January 6\u20138). Post Quantum Digital Signature Change in IOTA to Reduce Latency in Internet of Vehicles (IoV) Environments. Proceedings of the 2022 International Conference on IoT and Blockchain Technology (ICIBT), Ranchi, India.","DOI":"10.1109\/ICIBT52874.2022.9807757"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/11\/518\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:22:12Z","timestamp":1760131332000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/11\/518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,13]]},"references-count":77,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["a16110518"],"URL":"https:\/\/doi.org\/10.3390\/a16110518","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,13]]}}}