2022
DOI: 10.1007/978-3-031-21280-2_24
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Prior works on PQC in embedded systems and wireless networks are more closely related to our work on V2V. However, many existing works on embedded systems (e.g., [23], [24], [25], [26], [27]) do not consider the above constraints; for wireless systems, PQC has mostly been considered only for key exchange or encryption (in contrast to our focus on authentication) as in [19] (PQ key establishment protocols to encrypt 5G identifiers) and [73] (encryption for video streaming systems). In the vehicular domain, PQC is scantly represented.…”
Section: Related Workmentioning
confidence: 90%
See 3 more Smart Citations
“…Prior works on PQC in embedded systems and wireless networks are more closely related to our work on V2V. However, many existing works on embedded systems (e.g., [23], [24], [25], [26], [27]) do not consider the above constraints; for wireless systems, PQC has mostly been considered only for key exchange or encryption (in contrast to our focus on authentication) as in [19] (PQ key establishment protocols to encrypt 5G identifiers) and [73] (encryption for video streaming systems). In the vehicular domain, PQC is scantly represented.…”
Section: Related Workmentioning
confidence: 90%
“…We denote the i-th message by BSM i and its signature by sig i , packed into spdu i . The first stage (lines 3-11) and last stage (lines [25][26][27][28][29][30][31] are the same as for the ECDSA-based design conditioned on the Boolean value b c . This value is 1 if the entire hybrid certificate has been received and verified by the receiver within the five minutes that the pseudonym certificate has been used, (i.e., b c is set to 1 in line 18).…”
Section: Informal Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…We may already be investigating the impact of PQC on real-world performance, whereas NIST takes performance, security, and other factors into account when selecting algorithms for standardization. Therefore, the performance of the TLS handshake is of great importance [ 12 , 13 ].…”
Section: Introductionmentioning
confidence: 99%