%0 Conference Proceedings %T Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices %+ Laboratory of Pure and Applied Mathematics (LPAM) %+ Département d'informatique [M'sila] %A Chikouche, Noureddine %A Ghadbane, Abderrahmen %< avec comité de lecture %( Lecture Notes in Computer Science %B 17th Conference on e-Business, e-Services and e-Society (I3E) %C Kuwait City, Kuwait %Y Salah A. Al-Sharhan %Y Antonis C. Simintiras %Y Yogesh K. Dwivedi %Y Marijn Janssen %Y Matti Mäntymäki %Y Luay Tahat %Y Issam Moughrabi %Y Taher M. Ali %Y Nripendra P. Rana %I Springer International Publishing %3 Challenges and Opportunities in the Digital Era %V LNCS-11195 %P 67-80 %8 2018-10-30 %D 2018 %R 10.1007/978-3-030-02131-3_9 %K Post-quantum cryptography %K Public-key encryption %K Public key signature %K Performance %K Mobile devices %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X The classical public-key schemes are based on number theory, such as integer factorization and discrete logarithm. In 1994, P.W. Shor proposed an algorithm to solve these problems in polynomial time using quantum computers. Recent advancements in quantum computing open the door to the possibility of developing quantum computers sophisticated enough to solve these problems. Post-quantum cryptography (PQC) is resistant against quantum attacks. The aim of this paper is to evaluate the performance of different post-quantum public-key schemes for constrained-resources smart mobile devices; and to give a comparison between the studied post-quantum schemes in terms of computational time, required memory, and power consumption. %G English %Z TC 6 %Z WG 6.11 %2 https://inria.hal.science/hal-02274171/document %2 https://inria.hal.science/hal-02274171/file/474698_1_En_9_Chapter.pdf %L hal-02274171 %U https://inria.hal.science/hal-02274171 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC6 %~ IFIP-WG6-11 %~ IFIP-I3E %~ IFIP-LNCS-11195