{"id":"https://openalex.org/W4398233521","doi":"https://doi.org/10.3390/cryptography8020021","title":"Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography","display_name":"Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography","publication_year":2024,"publication_date":"2024-05-23","ids":{"openalex":"https://openalex.org/W4398233521","doi":"https://doi.org/10.3390/cryptography8020021"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020021","pdf_url":"https://www.mdpi.com/2410-387X/8/2/21/pdf?version=1716462542","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/2/21/pdf?version=1716462542","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098769894","display_name":"Gregory Fitzgibbon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gregory Fitzgibbon","raw_affiliation_strings":["Quantum and AI Research, Tession Ltd., Cheadle, Cheshire SK8 1PY, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Quantum and AI Research, Tession Ltd., Cheadle, Cheshire SK8 1PY, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102879737","display_name":"Carlo Ottaviani","orcid":"https://orcid.org/0000-0002-0032-3999"},"institutions":[{"id":"https://openalex.org/I52099693","display_name":"University of York","ror":"https://ror.org/04m01e293","country_code":"GB","type":"education","lineage":["https://openalex.org/I52099693"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Carlo Ottaviani","raw_affiliation_strings":["Department of Computer Science & York Centre for Quantum Technologies, University of York, York YO10 5GH, UK"],"raw_orcid":"https://orcid.org/0000-0002-0032-3999","affiliations":[{"raw_affiliation_string":"Department of Computer Science & York Centre for Quantum Technologies, University of York, York YO10 5GH, UK","institution_ids":["https://openalex.org/I52099693"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102879737"],"corresponding_institution_ids":["https://openalex.org/I52099693"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":10.2652,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.98542723,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":"2","first_page":"21","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.807631254196167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6107430458068848},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.5952504277229309},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5677309036254883},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4586697816848755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3510594367980957},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3509977459907532},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.32032614946365356},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26745039224624634},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22809991240501404},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1465369164943695},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.13262629508972168},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1307787299156189},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.06914088129997253}],"concepts":[{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.807631254196167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6107430458068848},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.5952504277229309},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5677309036254883},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4586697816848755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3510594367980957},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3509977459907532},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.32032614946365356},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26745039224624634},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22809991240501404},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1465369164943695},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.13262629508972168},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1307787299156189},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.06914088129997253},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography8020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020021","pdf_url":"https://www.mdpi.com/2410-387X/8/2/21/pdf?version=1716462542","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:214922","is_oa":true,"landing_page_url":"https://orcid.org/0000-0002-0032-3999>","pdf_url":"https://eprints.whiterose.ac.uk/id/eprint/214922/1/cryptography-08-00021.pdf","source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:d1aaa6897be04a6dbe79c1841ab136a8","is_oa":true,"landing_page_url":"https://doaj.org/article/d1aaa6897be04a6dbe79c1841ab136a8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 2, p 21 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8020021","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8020021","pdf_url":"https://www.mdpi.com/2410-387X/8/2/21/pdf?version=1716462542","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6499999761581421,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4398233521.pdf"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1536826708","https://openalex.org/W1595771334","https://openalex.org/W1843670779","https://openalex.org/W2007466965","https://openalex.org/W2101571537","https://openalex.org/W2142048307","https://openalex.org/W2155589547","https://openalex.org/W2168676717","https://openalex.org/W2466179827","https://openalex.org/W2487822210","https://openalex.org/W2506013821","https://openalex.org/W2514893051","https://openalex.org/W2521084334","https://openalex.org/W2553682957","https://openalex.org/W2604813584","https://openalex.org/W2791664942","https://openalex.org/W2793486882","https://openalex.org/W2866028610","https://openalex.org/W2867344892","https://openalex.org/W2897070223","https://openalex.org/W2913851998","https://openalex.org/W2914654142","https://openalex.org/W2971031965","https://openalex.org/W2986959318","https://openalex.org/W2995935153","https://openalex.org/W3002482178","https://openalex.org/W3007841246","https://openalex.org/W3157250574","https://openalex.org/W3216842157","https://openalex.org/W4200100773","https://openalex.org/W4205765479","https://openalex.org/W4206114297","https://openalex.org/W4213374331","https://openalex.org/W4214660968","https://openalex.org/W4220905627","https://openalex.org/W4226075590","https://openalex.org/W4245530642","https://openalex.org/W4297991408","https://openalex.org/W4312438667","https://openalex.org/W4321488722","https://openalex.org/W4390865640","https://openalex.org/W6640462745","https://openalex.org/W6696525884","https://openalex.org/W6747581791","https://openalex.org/W6771594061","https://openalex.org/W6774173606","https://openalex.org/W6786915248","https://openalex.org/W6809759632"],"related_works":["https://openalex.org/W3173339789","https://openalex.org/W4385627932","https://openalex.org/W4288754535","https://openalex.org/W2548040793","https://openalex.org/W4312788318","https://openalex.org/W1561051298","https://openalex.org/W3008265109","https://openalex.org/W3194469932","https://openalex.org/W3201289751","https://openalex.org/W3099819669"],"abstract_inverted_index":{"Advances":[0],"in":[1,45,206],"quantum":[2,66],"computers":[3,111],"may":[4,36,140],"pose":[5],"a":[6,65,88,168,190],"significant":[7],"threat":[8],"to":[9,17,49,52,84,103,121,173,200],"existing":[10,144],"public-key":[11],"encryption":[12],"methods,":[13],"which":[14,138],"are":[15,100,198],"crucial":[16],"the":[18,28,42,55,78,125,135,159,202,207,217],"current":[19],"infrastructure":[20],"of":[21,71,90,127,178,192],"cyber":[22],"security.":[23],"Both":[24],"RSA":[25],"and":[26,73,86,123,134,154,181,196,210],"ECDSA,":[27],"two":[29],"most":[30,160,203],"widely":[31],"used":[32],"security":[33],"algorithms":[34,92,129],"today,":[35],"be":[37,141,201],"(in":[38],"principle)":[39],"solved":[40,105],"by":[41,106],"Shor":[43],"algorithm":[44],"polynomial":[46],"time":[47],"due":[48],"its":[50],"ability":[51],"efficiently":[53],"solve":[54],"discrete":[56],"logarithm":[57],"problem,":[58],"potentially":[59],"making":[60],"present":[61],"infrastructures":[62],"insecure":[63],"against":[64],"attack.":[67],"The":[68],"National":[69],"Institute":[70],"Standards":[72],"Technology":[74],"(NIST)":[75],"reacted":[76],"with":[77,137,185,214],"post-quantum":[79,91],"cryptography":[80],"(PQC)":[81],"standardization":[82],"process":[83],"develop":[85],"optimize":[87],"series":[89],"(PQAs)":[93],"based":[94],"on":[95,130,167,189],"difficult":[96],"mathematical":[97],"problems":[98],"that":[99],"not":[101],"susceptible":[102],"being":[104],"Shor\u2019s":[107],"algorithm.":[108],"Whilst":[109],"high-powered":[110],"can":[112],"run":[113],"these":[114,128],"PQAs":[115,163,205],"efficiently,":[116],"further":[117],"work":[118],"is":[119],"needed":[120],"investigate":[122],"benchmark":[124,153],"performance":[126,156],"lower-powered":[131],"(constrained)":[132],"devices":[133],"ease":[136],"they":[139],"integrated":[142],"into":[143],"protocols":[145],"such":[146],"as":[147],"TLS.":[148],"This":[149],"paper":[150],"provides":[151,182],"quantitative":[152,183],"handshake":[155,220],"data":[157,188],"for":[158],"recently":[161],"selected":[162],"from":[164],"NIST,":[165],"tested":[166],"Raspberry":[169],"Pi":[170],"4":[171],"device":[172],"simulate":[174],"today\u2019s":[175],"IoT":[176],"(Internet":[177],"Things)":[179],"devices,":[180],"comparisons":[184],"previous":[186],"benchmarking":[187],"range":[191],"constrained":[193],"systems.":[194],"CRYSTALS-Kyber":[195],"CRYSTALS-Dilithium":[197],"shown":[199],"efficient":[204],"key":[208],"encapsulation":[209],"signature":[211],"algorithms,":[212],"respectively,":[213],"Falcon":[215],"providing":[216],"optimal":[218],"TLS":[219],"size.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":9},{"year":2025,"cited_by_count":16},{"year":2024,"cited_by_count":6}],"updated_date":"2026-01-25T23:04:38.658462","created_date":"2025-10-10T00:00:00"}
