{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T20:05:17Z","timestamp":1776197117464,"version":"3.50.1"},"reference-count":63,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Post-quantum cryptography (PQC) is, and should be, currently dominating the field of cybersecurity, with many works designing and evaluating the transition of communications security to quantum-safe solutions. As the security level and implementations of post-quantum algorithms become more mature, the research on their application to realistic conditions changes accordingly, especially their application to widely adopted network architectures and corresponding protocols such as the Public Key Infrastructure (PKI). In this survey, we identified articles presenting ways of integrating PQC algorithms to PKI and classified related work according to the employed methods and benchmarking choices. The main results from many evaluations converge to similar conclusions on the performance of the most popular PC digital signature algorithms; however, modeling choices concerning architecture variants, hardware and measurement metrics vary. The diversity of the results and experimental setups makes comparison difficult and arrival at an objective conclusion regarding PKI requirements almost impossible. Ultimately, this review reveals a fragmented landscape of benchmarking practices for post-quantum PKI systems. The absence of standardized evaluation frameworks and common test environments limits the comparability and reproducibility of the findings. We aim to provide reference implementations, which are essential to guide the transition of PKI infrastructures toward robust, scalable, and quantum-resistant deployments.<\/jats:p>","DOI":"10.3390\/cryptography10010011","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:28:11Z","timestamp":1770910091000},"page":"11","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Post-Quantum PKI: A Survey of Applications and Benchmarking Practices"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-2231-2111","authenticated-orcid":false,"given":"Maya","family":"Thabet","sequence":"first","affiliation":[{"name":"Department of Informatics and Telecommunications, Panepistimioupolis, Ilisia, 16122 Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6959-5338","authenticated-orcid":false,"given":"Antonia","family":"Tsili","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunications, Panepistimioupolis, Ilisia, 16122 Athens, Greece"},{"name":"Eulambia Advanced Technologies, Agiou Ioannou 24, Building Complex C, Ag. Paraskevi, 15342 Athens, Greece"}]},{"given":"Konstantinos","family":"Krilakis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunications, Panepistimioupolis, Ilisia, 16122 Athens, Greece"},{"name":"Eulambia Advanced Technologies, Agiou Ioannou 24, Building Complex C, Ag. Paraskevi, 15342 Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8026-576X","authenticated-orcid":false,"given":"Dimitris","family":"Syvridis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunications, Panepistimioupolis, Ilisia, 16122 Athens, Greece"},{"name":"Eulambia Advanced Technologies, Agiou Ioannou 24, Building Complex C, Ag. Paraskevi, 15342 Athens, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"ref_2","unstructured":"Priem, J., Piwowar, H., and Orr, R. (2022). OpenAlex: A fully-open index of scholarly works, authors, venues, institutions, and concepts. arXiv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"n71","DOI":"10.1136\/bmj.n71","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume":"372","author":"Page","year":"2021","journal-title":"BMJ"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Moody, D., Perlner, R., Regenscheid, A., Robinson, A., and Cooper, D. (2024). Transition to Post-Quantum Cryptography Standards.","DOI":"10.6028\/NIST.IR.8547.ipd"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Alagic, G., Barker, E., Chen, L., Moody, D., Robinson, A., Silberg, H., and Waller, N. (2025). Recommendations for Key-Encapsulation Mechanisms.","DOI":"10.6028\/NIST.SP.800-227"},{"key":"ref_6","unstructured":"National Institute of Standards and Technology (US) (2024). Module-Lattice-Based Key-Encapsulation Mechanism Standard."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"937","DOI":"10.1007\/s10207-022-00587-6","article-title":"Challenges of post-quantum digital signing in real-world applications: A survey","volume":"21","author":"Tan","year":"2022","journal-title":"Int. J. Inf. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1007\/978-3-319-59879-6_22","article-title":"Transitioning to a Quantum-Resistant Public Key Infrastructure","volume":"Volume 10346","author":"Lange","year":"2017","journal-title":"Post-Quantum Cryptography"},{"key":"ref_9","unstructured":"International Telecommunication Union (2019). X.509: Information Technology\u2014Open Systems Interconnection\u2014The Directory: Public-Key and Attribute Certificate Frameworks, ITU-T. Technical Report Recommendation X.509."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Diffie, W., and Hellman, M.E. (2022). New Directions in Cryptography. Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, Association for Computing Machinery. [1st ed.].","DOI":"10.1145\/3549993.3550007"},{"key":"ref_11","unstructured":"Souppaya, M., Polk, T., Barker, W., and Kent, J. (2025). Addressing Visibility Challenges with TLS 1.3 Within the Enterprise."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2018). CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme, IACR Transactions on Cryptographic Hardware and Embedded Systems.","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref_13","unstructured":"National Institute of Standards and Technology (US) (2024). Module-Lattice-Based Digital Signature Standard."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehle, D. (2018, January 24\u201326). CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref_15","unstructured":"Fouque, P.A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., and Zhang, Z. (2018). Falcon: Fast-Fourier lattice-Based Compact Signatures over NTRU, IBM. Post-Quantum Cryptography Standard."},{"key":"ref_16","unstructured":"Gaborit, P., Z\u00e9mor, G., Bos, J., Dion, A., Lacan, J., Robert, J.M., V\u00e9ron, P., Barreto, P.L., Ghosh, S., and Gueron, S. (2026, February 08). Hamming Quasi-Cyclic (HQC)\u2014Specifications (Version 2025-08-22); Technical Report, Team HQC\/PQC-HQC. Available online: https:\/\/pqc-hqc.org\/doc\/hqc_specifications_2025_08_22.pdf."},{"key":"ref_17","unstructured":"National Institute of Standards and Technology (2025). NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption, Technical Report."},{"key":"ref_18","unstructured":"(2026, February 08). A. N. iCROSS Security Details. iCROSS Security Details: Deliverable\/Report Type, Version 2.1. iCROSS Consortium. Available online: https:\/\/www.cross-crypto.com\/CROSS_SecurityDetails_v2.0.pdf."},{"key":"ref_19","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., and Schwabe, P. (2019, January 11\u201315). The SPHINCS+ Signature Framework. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, New York, NY, USA."},{"key":"ref_20","unstructured":"National Institute of Standards and Technology (US) (2024). Stateless Hash-Based Digital Signature Standard."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ding, J., and Schmidt, D. (2005, January 7\u201310). Rainbow, a New Multivariable Polynomial Signature Scheme. Proceedings of the Applied Cryptography and Network Security (ACNS 2005), New York, NY, USA.","DOI":"10.1007\/11496137_12"},{"key":"ref_22","unstructured":"Beullens, W., Campos, F., Celi, S., Hess, B., Kannwischer, M.J., and PQMayo (2026, February 08). MAYO: A Multivariate Quadratic Signature Scheme. Online Resource. Available online: https:\/\/pqmayo.org\/."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Shikata, J., and Kuzuno, H. (2023). A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. Proceedings of the Advances in Information and Computer Security, Springer Nature.","DOI":"10.1007\/978-3-031-41326-1"},{"key":"ref_24","first-page":"1","article-title":"Post-quantum key exchange for the Internet and the Open Quantum Safe project","volume":"Volume 10532","author":"Avanzi","year":"2017","journal-title":"Proceedings of the Selected Areas in Cryptography (SAC) 2016"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography.","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/978-3-030-66504-3_4","article-title":"Post-quantum Certificates for Electronic Travel Documents","volume":"Volume 12580","author":"Boureanu","year":"2020","journal-title":"Computer Security"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"213968","DOI":"10.1109\/ACCESS.2020.3040324","article-title":"Performance of New Hope and CRYSTALS-Dilithium Postquantum Schemes in the Transport Layer Security Protocol","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"B\u00fcrstinghaus-Steinbach, K., Krau\u00df, C., Niederhagen, R., and Schneider, M. (2020). Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS \u201920, Taipei, Taiwan, 5\u20139 October 2020, ACM.","DOI":"10.1145\/3320269.3384725"},{"key":"ref_29","unstructured":"Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2017). CRYSTALS\u2013Dilithium: Digital Signatures from Module Lattices, IACR. Cryptology ePrint Archive 2017\/633."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/978-3-662-46800-5_15","article-title":"SPHINCS: Practical Stateless Hash-Based Signatures","volume":"Volume 9056","author":"Oswald","year":"2015","journal-title":"Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2015"},{"key":"ref_31","first-page":"441","article-title":"The Lattice-Based Digital Signature Scheme qTESLA","volume":"Volume 12146","author":"Alkim","year":"2020","journal-title":"Proceedings of the Applied Cryptography and Network Security (ACNS 2020)"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-662-53890-6_5","article-title":"From 5-pass MQ-based Identification to MQ-based Signatures","volume":"Volume 10032","author":"Chen","year":"2016","journal-title":"Proceedings of the Advances in Cryptology\u2013ASIACRYPT 2016"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., and Devetsikiotis, M. (2020, January 1\u20134). Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT \u201920, Barcelona, Spain.","DOI":"10.1145\/3386367.3431305"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-031-21280-2_24","article-title":"Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems","volume":"Volume 13620","author":"Su","year":"2022","journal-title":"Information Security Practice and Experience"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"D\u00f6ring, R., and Geitz, M. (2022, January 25\u201329). Post-Quantum Cryptography in Use: Empirical Analysis of the TLS Handshake Performance. Proceedings of the NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","DOI":"10.1109\/NOMS54207.2022.9789913"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/MNET.2025.3531116","article-title":"Towards the Quantum-Safe Web: Benchmarking Post-Quantum TLS","volume":"39","author":"Rios","year":"2025","journal-title":"IEEE Netw."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Garcia, C.R., Aguilera, A.C., Olmos, J.J.V., Monroy, I.T., and Rommel, S. (2023, January 6\u20138). Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography. Proceedings of the 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK.","DOI":"10.1109\/CAMAD59638.2023.10478407"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Raavi, M., Khan, Q., Wuthier, S., Chandramouli, P., Balytskyi, Y., and Chang, S.Y. (2025). Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations. Cryptography, 9.","DOI":"10.3390\/cryptography9020038"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s10791-025-09735-7","article-title":"Integrating code-based post-quantum cryptography into SSL TLS protocols through an interoperable hybrid framework","volume":"28","author":"Zafar","year":"2025","journal-title":"Discov. Comput."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Sim, M., Song, G., Eum, S., Lee, M., Yoon, S., Baksi, A., and Seo, H. (2025). Integrating and Benchmarking KpqC in TLS\/X.509. Electronics, 14.","DOI":"10.3390\/electronics14183717"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"111355","DOI":"10.1016\/j.comnet.2025.111355","article-title":"Hybrid Quantum-Safe integration of TLS in SDN networks","volume":"267","author":"Buruaga","year":"2025","journal-title":"Comput. Netw."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Wang, C., Xue, W., and Wang, J. (2023, January 26\u201328). Integration of Quantum-Safe Algorithms into X.509v3 Certificates. Proceedings of the 2023 IEEE 3rd International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China.","DOI":"10.1109\/ICETCI57876.2023.10176713"},{"key":"ref_43","unstructured":"Ricchizzi, N., Schwinne, C., and Pelzl, J. (2025). Applied Post Quantum Cryptography: A Practical Approach for Generating Certificates in Industrial Environments. arXiv."},{"key":"ref_44","unstructured":"(2020). Information Technology\u2014Open Systems Interconnection\u2014Part 8: The Directory: Public-Key and Attribute Certificate Framework (Standard No. ISO\/IEC 9594-8:2020)."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Paul, S., Kuzovkova, Y., Lahr, N., and Niederhagen, R. (June, January 30). Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, ASIA CCS \u201922, Nagasaki, Japan.","DOI":"10.1145\/3488932.3497755"},{"key":"ref_46","unstructured":"Ounsworth, M., and Pala, M. (2026, February 08). Composite Signatures for Use in Internet PKI. Internet-Draft draft-ounsworth-pq-composite-sigs-07, Internet Engineering Task Force (IETF). Available online: https:\/\/datatracker.ietf.org\/doc\/html\/draft-ounsworth-pq-composite-sigs-07."},{"key":"ref_47","unstructured":"Ounsworth, M., Pala, M., and Klaussner, J. (2026, February 08). Composite Public and Private Keys for Use In Internet PKI. Internet-Draft draft-ounsworth-pq-composite-keys-02, Internet Engineering Task Force, 2022. Work in Progress. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/draft-ounsworth-pq-composite-keys-02."},{"key":"ref_48","unstructured":"Bonnell, C., Gray, J., Hook, D., Okubo, T., and Ounsworth, M. (2026, February 08). A Mechanism for Encoding Differences in Paired Certificates. Internet-Draft draft-bonnell-lamps-chameleon-certs-05, Internet Engineering Task Force, 2024. Work in Progress. Available online: https:\/\/datatracker.ietf.org\/doc\/draft-bonnell-lamps-chameleon-certs\/05\/."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Raavi, M., Chandramouli, P., Wuthier, S., Zhou, X., and Chang, S.Y. (2021, January 19\u201322). Performance Characterization of Post-Quantum Digital Certificates. Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece.","DOI":"10.1109\/ICCCN52240.2021.9522179"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"108062","DOI":"10.1016\/j.future.2025.108062","article-title":"A performance evaluation framework for post-quantum TLS","volume":"175","author":"Montenegro","year":"2026","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Kuang, R., Perepechaenko, M., Toth, R., and Barbeau, M. (2022, January 18\u201323). Benchmark Performance of a New Quantum-Safe Multivariate Polynomial Digital Signature Algorithm. Proceedings of the 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), Broomfield, CO, USA.","DOI":"10.1109\/QCE53715.2022.00067"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Opi\u0142ka, F., Niemiec, M., Gagliardi, M., and Kourtis, M.A. (2024). Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature. Appl. Sci., 14.","DOI":"10.3390\/app14124994"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"101228","DOI":"10.1016\/j.iot.2024.101228","article-title":"PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems","volume":"27","author":"Mansoor","year":"2024","journal-title":"Internet Things"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-031-54773-7_1","article-title":"Automated Issuance of Post-Quantum Certificates: A New Challenge","volume":"Volume 14584","author":"Batina","year":"2024","journal-title":"Applied Cryptography and Network Security"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Tsili, A., Kordolaimis, K., Krilakis, K., and Syvridis, D. (2025, January 1\u20133). A Scalable Framework for Post-Quantum Authentication in Public Key Infrastructures. Proceedings of the 2025 International Conference on Quantum Communications, Networking, and Computing (QCNC), Tokyo, Japan.","DOI":"10.1109\/QCNC64685.2025.00052"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Seo, Y., and Kim, Y.S. (2025, January 8\u201311). Post-Quantum Cryptography Migration on V2X Certificate using KpqC Algorithms*. Proceedings of the 2025 Sixteenth International Conference on Ubiquitous and Future Networks (ICUFN), Lisbon, Portugal.","DOI":"10.1109\/ICUFN65838.2025.11170005"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Fitzgibbon, G., and Ottaviani, C. (2024). Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography. Cryptography, 8.","DOI":"10.3390\/cryptography8020021"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Al-Dabbagh, R., Alkhatib, M., and Albalawi, T. (2025). Efficient Post-Quantum Cryptography Algorithms for Auto-Enrollment in Public Key Infrastructure. Electronics, 14.","DOI":"10.3390\/electronics14101980"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Spalas, K., and Kolokotronis, N. (2025, January 14\u201316). Post-Quantum Security Evaluation of Aeronautical Communications. Proceedings of the 2025 IEEE International Conference on Cyber Security and Resilience (CSR), Chania, Greece.","DOI":"10.1109\/CSR64739.2025.11130013"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Abbasi, M., Cardoso, F., V\u00e1z, P., Silva, J., and Martins, P. (2025). A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. Cryptography, 9.","DOI":"10.3390\/cryptography9020032"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MM.2020.2974843","article-title":"MLPerf: An industry standard benchmark suite for machine learning performance","volume":"40","author":"Mattson","year":"2020","journal-title":"IEEE Micro"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Khan, Q., Purification, S., and Chang, S.Y. (2025). Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber). Information, 16.","DOI":"10.3390\/info16070617"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Khan, Q., Purification, S., Cheruiyot, R., Kim, J., Kim, J., and Chang, S.Y. (2024, January 18\u201320). Toward Post-Quantum Digital Certificate for eSIM. Proceedings of the 2024 Silicon Valley Cybersecurity Conference (SVCC), Seoul, Republic of Korea.","DOI":"10.1109\/SVCC61185.2024.10637354"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/11\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T05:13:39Z","timestamp":1771132419000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":63,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["cryptography10010011"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10010011","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]}}}