{"id":"https://openalex.org/W4410228054","doi":"https://doi.org/10.1109/wcnc61545.2025.10978792","title":"Evaluation of Post-Quantum Key Encapsulation Methods in 5G Core Network","display_name":"Evaluation of Post-Quantum Key Encapsulation Methods in 5G Core Network","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4410228054","doi":"https://doi.org/10.1109/wcnc61545.2025.10978792"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc61545.2025.10978792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077643618","display_name":"Andrea Corsi","orcid":"https://orcid.org/0000-0003-3954-303X"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Alessandro Corsi","raw_affiliation_strings":["University of Padova,Department of Mathematics,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padova,Department of Mathematics,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117490453","display_name":"Savas G\u00fcr","orcid":null},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Savas G\u00fcr","raw_affiliation_strings":["University of Padova,Department of Mathematics,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padova,Department of Mathematics,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070886054","display_name":"Alessandro Brighente","orcid":"https://orcid.org/0000-0001-6138-2995"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandro Brighente","raw_affiliation_strings":["University of Padova,Department of Mathematics,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padova,Department of Mathematics,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063847107","display_name":"Mauro Conti","orcid":"https://orcid.org/0000-0002-3612-1934"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mauro Conti","raw_affiliation_strings":["University of Padova,Department of Mathematics,Padua,Italy"],"affiliations":[{"raw_affiliation_string":"University of Padova,Department of Mathematics,Padua,Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077643618"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":null,"apc_paid":null,"fwci":1.4549,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.82269155,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10767","display_name":"Advanced Photonic Communication Systems","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10767","display_name":"Advanced Photonic Communication Systems","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10187","display_name":"Radio Frequency Integrated Circuit Design","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.9697999954223633,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encapsulation","display_name":"Encapsulation (networking)","score":0.7301373481750488},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5971872210502625},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5049434304237366},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4316461980342865},{"id":"https://openalex.org/keywords/core-network","display_name":"Core network","score":0.41989952325820923},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4192889332771301},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.2591041922569275},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22457635402679443},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14330241084098816}],"concepts":[{"id":"https://openalex.org/C81147070","wikidata":"https://www.wikidata.org/wiki/Q1172449","display_name":"Encapsulation (networking)","level":2,"score":0.7301373481750488},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5971872210502625},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5049434304237366},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4316461980342865},{"id":"https://openalex.org/C5038329","wikidata":"https://www.wikidata.org/wiki/Q1142907","display_name":"Core network","level":2,"score":0.41989952325820923},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4192889332771301},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2591041922569275},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22457635402679443},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14330241084098816},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc61545.2025.10978792","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978792","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W258537497","https://openalex.org/W1595771334","https://openalex.org/W2767399671","https://openalex.org/W2915352631","https://openalex.org/W3086365365","https://openalex.org/W3195796154","https://openalex.org/W4206195543","https://openalex.org/W4250498021","https://openalex.org/W4313144651","https://openalex.org/W4365934498","https://openalex.org/W4381734393","https://openalex.org/W4385805359","https://openalex.org/W4387016444","https://openalex.org/W4388998407","https://openalex.org/W4398131524","https://openalex.org/W4398233521"],"related_works":["https://openalex.org/W2216891170","https://openalex.org/W4401719154","https://openalex.org/W4401459825","https://openalex.org/W3020242443","https://openalex.org/W2913147969","https://openalex.org/W4240532262","https://openalex.org/W2806458879","https://openalex.org/W4408861025","https://openalex.org/W3094714434","https://openalex.org/W2025411550"],"abstract_inverted_index":{"The":[0],"fifth":[1],"generation":[2],"of":[3,36,82,135,138,160,207,224],"mobile":[4],"networks":[5],"(5G)":[6],"is":[7,40],"among":[8,163],"the":[9,34,42,59,75,79,86,97,103,120,132,136,147,158,167,198,221,225],"critical":[10],"infrastructures":[11],"whose":[12],"security":[13,222],"and":[14,53,72,156,186,211],"privacy":[15],"requirements":[16],"are":[17,92],"paramount.":[18],"Compared":[19],"to":[20,68,175,203,219],"previous":[21],"generations,":[22],"5G":[23,121,148,181,226],"leverages":[24],"a":[25,179,216],"service-based":[26],"architecture":[27],"where":[28],"many":[29],"Network":[30],"Functions":[31],"(NF),":[32],"i.e.,":[33],"set":[35],"microservices":[37],"on":[38],"which":[39],"based":[41],"architecture,":[43],"need":[44],"secure":[45,141],"communication":[46],"means.":[47],"NFs":[48],"can":[49,62],"communicate":[50],"using":[51,139],"HTTP2,":[52],"despite":[54],"not":[55],"being":[56,215],"required":[57],"by":[58],"standard,":[60],"they":[61],"use":[63],"Transport":[64],"Layer":[65],"Protocol":[66],"(TLS)":[67],"ensure":[69],"data":[70],"integrity":[71],"authentication":[73],"across":[74],"network.":[76,150],"However,":[77,109],"with":[78],"expected":[80],"arrival":[81],"quantum":[83],"computers":[84],"in":[85,119,178,205],"near":[87],"future,":[88],"traditional":[89],"cryptographic":[90],"algorithms":[91,115,162,174],"under":[93],"significant":[94,124],"threat.":[95],"With":[96],"recent":[98],"run":[99],"for":[100,146],"post-quantum":[101,140],"standardization,":[102],"NIST":[104,168],"selected":[105,165],"possible":[106],"candidate":[107,217],"algorithms.":[108],"no":[110],"study":[111],"evaluates":[112],"whether":[113],"such":[114],"would":[116],"be":[117],"applicable":[118],"core":[122,149,182],"without":[123],"performance":[125,189,202],"degradation.":[126],"In":[127],"this":[128,152],"paper,":[129],"we":[130,154],"perform":[131],"first":[133],"assessment":[134],"feasibility":[137],"Key":[142],"Encapsulation":[143],"Mechanism":[144],"(KEM)":[145],"To":[151],"aim,":[153],"implemented":[155,183],"compared":[157],"performances":[159],"five":[161],"those":[164,173],"during":[166],"standardization":[169],"process.":[170],"We":[171],"adapted":[172],"implement":[176],"them":[177],"standalone":[180],"via":[184],"Open5GS,":[185],"tested":[187],"their":[188],"when":[190],"performing":[191],"user":[192],"registration.":[193],"Our":[194],"results":[195],"show":[196],"that":[197],"KY-BER768":[199],"achieves":[200],"comparable":[201],"TLS":[204],"terms":[206],"UE":[208],"registration":[209],"time":[210],"CPU":[212],"utilization,":[213],"thus":[214],"solution":[218],"improve":[220],"posture":[223],"core.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
