{"id":"https://openalex.org/W7117621023","doi":"https://doi.org/10.1109/mswim67937.2025.11308970","title":"Implementing and Evaluating Post-Quantum DNSSEC in CoreDNS","display_name":"Implementing and Evaluating Post-Quantum DNSSEC in CoreDNS","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W7117621023","doi":"https://doi.org/10.1109/mswim67937.2025.11308970"},"language":null,"primary_location":{"id":"doi:10.1109/mswim67937.2025.11308970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mswim67937.2025.11308970","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119791968","display_name":"Julio Gento Suela","orcid":null},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Julio Gento Suela","raw_affiliation_strings":["University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain"],"affiliations":[{"raw_affiliation_string":"University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093725954","display_name":"Javier Blanco-Romero","orcid":"https://orcid.org/0009-0004-0635-953X"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Blanco-Romero","raw_affiliation_strings":["University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain"],"affiliations":[{"raw_affiliation_string":"University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034900252","display_name":"Florina Almen\u00e1rez","orcid":"https://orcid.org/0000-0002-5232-2031"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Florina Almenares Mendoza","raw_affiliation_strings":["University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain"],"affiliations":[{"raw_affiliation_string":"University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain","institution_ids":["https://openalex.org/I50357001"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042030511","display_name":"Daniel D\u00edaz-S\u00e1nchez","orcid":"https://orcid.org/0000-0002-3323-6453"},"institutions":[{"id":"https://openalex.org/I50357001","display_name":"Universidad Carlos III de Madrid","ror":"https://ror.org/03ths8210","country_code":"ES","type":"education","lineage":["https://openalex.org/I50357001"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Daniel D\u00edaz-S\u00e1nchez","raw_affiliation_strings":["University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain"],"affiliations":[{"raw_affiliation_string":"University Carlos III of Madrid,Telematic Engineering Department,Madrid,Spain","institution_ids":["https://openalex.org/I50357001"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5119791968"],"corresponding_institution_ids":["https://openalex.org/I50357001"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79411285,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"420","last_page":"427"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.26089999079704285,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.26089999079704285,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.25440001487731934,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.19419999420642853,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6144999861717224},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.5651000142097473},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5318999886512756},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.47609999775886536},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.47200000286102295},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.4480000138282776},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4221000075340271},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.398499995470047},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.37380000948905945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7167999744415283},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6144999861717224},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.5651000142097473},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5318999886512756},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.47609999775886536},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.47200000286102295},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.4480000138282776},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4221000075340271},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.398499995470047},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36250001192092896},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.350600004196167},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.3441999852657318},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3361999988555908},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33399999141693115},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.3280999958515167},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.3264999985694885},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3190999925136566},{"id":"https://openalex.org/C20574231","wikidata":"https://www.wikidata.org/wiki/Q844605","display_name":"Backward compatibility","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2847999930381775},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.25519999861717224}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mswim67937.2025.11308970","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mswim67937.2025.11308970","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2094988919","https://openalex.org/W2495312623","https://openalex.org/W2523466931","https://openalex.org/W3095767298","https://openalex.org/W3197834203","https://openalex.org/W3197893101","https://openalex.org/W4390590610","https://openalex.org/W4412830287"],"related_works":[],"abstract_inverted_index":{"The":[0,117],"emergence":[1],"of":[2,47],"quantum":[3,40],"computers":[4],"poses":[5],"a":[6,66],"significant":[7,111],"threat":[8],"to":[9,39,54,135],"current":[10],"secure":[11],"service,":[12],"application":[13],"and/or":[14],"protocol":[15],"implementations":[16],"that":[17,68,120],"rely":[18],"on":[19,31],"RSA":[20],"and":[21,83,106,115],"ECDSA":[22],"algorithms,":[23],"for":[24,59,73,132],"instance":[25],"DNSSEC,":[26],"because":[27],"public-key":[28],"cryptography":[29],"based":[30],"number":[32],"factorization":[33],"or":[34],"discrete":[35],"logarithm":[36],"is":[37],"vulnerable":[38],"attacks.":[41],"This":[42],"paper":[43],"presents":[44],"the":[45,60],"integration":[46],"post-quantum":[48],"cryptographic":[49],"(PQC)":[50],"algorithms":[51,123],"into":[52],"CoreDNS":[53,70],"enable":[55],"quantum-resistant":[56,99,136],"DNSSEC":[57,134],"functionality":[58],"first":[61],"time.":[62],"We":[63],"have":[64],"developed":[65],"plugin":[67],"extends":[69],"with":[71,89],"support":[72],"five":[74],"PQC":[75,122],"signature":[76],"algorithm":[77],"families:":[78],"ML-DSA,":[79],"FALCON,":[80],"SPHINCS+,":[81],"MAYO,":[82],"SNOVA.":[84],"Our":[85],"implementation":[86],"maintains":[87],"compatibility":[88],"existing":[90],"DNS":[91],"resolution":[92],"flows":[93],"while":[94,121],"providing":[95],"on-the-fly":[96],"signing":[97],"using":[98],"signatures.":[100],"A":[101],"benchmark":[102],"has":[103],"been":[104],"performed":[105],"performance":[107],"evaluation":[108],"results":[109,118],"reveal":[110],"trade-offs":[112],"between":[113],"security":[114],"efficiency.":[116],"indicate":[119],"introduce":[124],"operational":[125],"overhead,":[126],"several":[127],"candidates":[128],"offer":[129],"viable":[130],"compromises":[131],"transitioning":[133],"cryptography.":[137]},"counts_by_year":[],"updated_date":"2025-12-31T23:11:33.660297","created_date":"2025-12-30T00:00:00"}
