{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:53:27Z","timestamp":1775822007080,"version":"3.50.1"},"reference-count":30,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T00:00:00Z","timestamp":1775779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Post-quantum cryptography represents one of the most promising areas of modern cryptography. The development in this discipline significantly accelerated after it became of interest to the National Institute of Standards and Technology (NIST). One of the important research directions in this area is the practical deployment of post-quantum cryptographic algorithms on resource-constrained devices. In this article, we investigate the possibility of deploying post-quantum cryptography on small processors with limited random access memory (RAM) capacity. These processors are commonly used in Internet of Things (IoT) devices, where the practical deployment of post-quantum algorithms remains challenging due to computational and memory constraints. We select a suitable algorithm and perform several implementation modifications that enable its execution on microcontrollers with limited memory resources.<\/jats:p>","DOI":"10.3390\/cryptography10020024","type":"journal-article","created":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:20:16Z","timestamp":1775816416000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adapting the BIKE Key Encapsulation Mechanism to Memory-Constrained IoT Devices"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4270-5513","authenticated-orcid":false,"given":"Du\u0161an","family":"\u010catloch","sequence":"first","affiliation":[{"name":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3587-9169","authenticated-orcid":false,"given":"Peter","family":"Pekar\u010d\u00edk","sequence":"additional","affiliation":[{"name":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice, Slovakia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8016-0837","authenticated-orcid":false,"given":"Eva","family":"Chovancov\u00e1","sequence":"additional","affiliation":[{"name":"Department of Computers and Informatics, Faculty of Electrical Engineering and Informatics, Technical University of Ko\u0161ice, 042 00 Ko\u0161ice, Slovakia"}]}],"member":"1968","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.56155\/978-81-955020-3-5-07","article-title":"A Literature Review on RSA, DES and AES Encryption Algorithms","volume":"10","author":"Sood","year":"2023","journal-title":"Emerg. Trends Eng. Manag."},{"key":"ref_2","first-page":"90","article-title":"Elliptic Curve Implementation and its Applications: A Review","volume":"2","author":"Abdulnabi","year":"2023","journal-title":"Iraqi J. Intell. Comput. Inform."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Buchmann, J., and Dahmen, E. (2009). Introduction to Post-Quantum Cryptography. Post-Quantum Cryptography, Springer.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref_4","unstructured":"National Institute of Standards and Technology (NIST) (2013). FIPS 186-4: Digital Signature Standard (DSS), Technical Report, FIPS PUB 186-4."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Barked, E., Chen, L., Roginsky, A., Vassilev, A., and Davis, R. (2018). Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, NIST Special Publication, 800-56A Rev. 3.","DOI":"10.6028\/NIST.SP.800-56Ar3"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Barked, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R., and Simon, S. (2019). Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography, Special Publication, 800-56B Rev. 2.","DOI":"10.6028\/NIST.SP.800-56Br2"},{"key":"ref_7","unstructured":"National Institute of Standards and Technology (2025). Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process, Technical Report, NIST IR 8545."},{"key":"ref_8","unstructured":"Commey, D., Appiah, B., Klogo, G., Bagyl-Bac, W., and Gadze, J.D. (2025). Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics. arXiv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography, NIST Internal Report 8105.","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref_10","unstructured":"Liu, T., Ramachandran, G., and Jurdak, R. (2024). Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization. arXiv."},{"key":"ref_11","unstructured":"National Institute of Standards and Technology (NIST) (2026, April 01). Post-Quantum Cryptography Project, Available online: https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography."},{"key":"ref_12","unstructured":"Aragon, N., Barreto, P., Bettaieb, S., Bidoux, L., Deneuville, J.-C., Gaborit, P., G\u00e9rard, B., Ghosh, S., Gueron, S., and Misoczki, R. (2018). BIKE: Bit Flipping Key Encapsulation, NIST Post-Quantum Cryptography Standardization Submission."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Seiler, G. (2024). Quantum Computing and the Future of Encryption. Sch. Rev. J.","DOI":"10.70121\/001c.127168"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bagirovs, E., Provodin, G., Sipola, T., and Hautam\u00e4ki, J. (2024). Applications of Post-quantum Cryptography. Proceedings of the 23rd European Conference on Cyber Warfare and Security (ECCWS 2024), Jyvaskyla, Finland, 27\u201328 June 2024, Academic Conferences International.","DOI":"10.34190\/eccws.23.1.2247"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Campbell, R., Diffie, W., and Robinson, C. (2024). Advancements in Quantum Computing and AI May Impact PQC Migration Timelines. Preprints.","DOI":"10.20944\/preprints202402.1299.v1"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MSEC.2022.3202589","article-title":"Post-Quantum Cryptography: NIST\u2019s Plan for the Future","volume":"20","author":"Moody","year":"2022","journal-title":"IEEE Secur. Priv."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Dam, D., Tran, T., Hoang, V., Pham, C., and Hoang, T. (2023). A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography, 7.","DOI":"10.3390\/cryptography7030040"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Fournaris, A.P., Tasopolus, G., Brohet, M., and Regazzoni, F. (2023, January 23\u201325). Running Longer to Slim Down: Post-Quantum Cryptography on Memory-Constrained Devices. Proceedings of the 2023 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Berlin, Germany.","DOI":"10.1109\/COINS57856.2023.10189268"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.2478\/aei-2025-0011","article-title":"Post-Quantum Encryption Algorithms","volume":"25","year":"2025","journal-title":"Acta Electrotech. Inform."},{"key":"ref_20","unstructured":"(2026, April 01). ATmega328P Datasheet: 8-Bit AVR Microcontroller with 32K Bytes In-System Programmable Flash; Technical Report, 7810D\u2013AVR\u201301\/15; Atmel Corporation: 2016. Available online: https:\/\/ww1.microchip.com\/downloads\/en\/DeviceDoc\/Atmel-7810-Automotive-Microcontrollers-ATmega328P_Datasheet.pdf."},{"key":"ref_21","unstructured":"Arduino Srl (2026, April 01). Arduino UNO Rev3\u2014A000067 Datasheet. Technical Report, A000067. Arduino Documentation. Available online: https:\/\/docs.arduino.cc\/resources\/datasheets\/A000067-datasheet.pdf."},{"key":"ref_22","unstructured":"STMicroelectronics (2020). STM32F103x8, STM32F103xB Datasheet, STMicroelectronics. Available online: https:\/\/www.st.com\/resource\/en\/datasheet\/stm32f103c8.pdf."},{"key":"ref_23","unstructured":"STMicroelectronics (2024). STM32F411xC\/xE Advanced ARM-Based 32-Bit MCUs, STMicroelectronics. Available online: https:\/\/www.st.com\/resource\/en\/datasheet\/stm32f411ce.pdf."},{"key":"ref_24","unstructured":"Realtek Semiconductor Corp (2016). RTL8710AF Datasheet\u2014Low Power Wi-Fi SoC with ARM Cortex-M3, Realtek. Available online: https:\/\/www.verical.com\/datasheet\/seeed-development-limited--rfwireless-development-tools-114991092-5051369.pdf?srsltid=AfmBOopeKWCa7iR52GZcIZI95B6XXkt3iMDxBpoY08w9-UH4kMMUNiU."},{"key":"ref_25","unstructured":"Espressif Systems (2020). ESP8266 Technical Reference, Espressif Systems. Available online: https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp8266-technical_reference_en.pdf."},{"key":"ref_26","unstructured":"Espressif Systems (2023). ESP32 Series Datasheet, Espressif Systems. Available online: https:\/\/www.espressif.com\/sites\/default\/files\/documentation\/esp32_datasheet_en.pdf."},{"key":"ref_27","unstructured":"The OpenSSL Project (2026, April 01). OpenSSL 3.2 Documentation; Technical Report; The OpenSSL Project: 2024. Available online: https:\/\/www.openssl.org\/docs\/man3.2\/."},{"key":"ref_28","unstructured":"Houp, V. (2025, June 10). NTL: A Library for Doing Number Theory. NTL Library Documentation [Online]. Version 11.5.1, Release 2021-06-23. Available online: http:\/\/www.shoup.net\/ntl\/."},{"key":"ref_29","unstructured":"Boosheri, M., Malekpour, A., and Luksch, P. (2013). An Improving Method for Loop Unrolling. arXiv."},{"key":"ref_30","unstructured":"Barr, M. (1999). Programming Embedded Systems in C and C++, O\u2019Reilly Media."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/2\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:03:17Z","timestamp":1775818997000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/2\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,10]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["cryptography10020024"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10020024","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,10]]}}}