<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Hardware encryptors and cryptographic libraries for optimizing security in IoT ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Inna Rozlomii</string-name>
          <email>inna-roz@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Yarmilko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Naumenko</string-name>
          <email>naumenko.serhii1122@vu.cdu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Mykhailovskyi</string-name>
          <email>mykhailovskyi.pavlo1123@vu.cdu.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bohdan Khmelnytsky National University of Cherkasy</institution>
          ,
          <addr-line>81 Shevchenko Blvd., Cherkasy, 18031</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Cherkasy State Technological University</institution>
          ,
          <addr-line>460 Shevchenko Blvd., Cherkasy, 18006</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This article presents a detailed analysis of hardware encryptors and cryptographic libraries for ensuring security in IoT systems. The Internet of Things (IoT) is currently one of the most dynamic fields, where data security is becoming critically important. The study examines how various microcontrollers use hardware and software encryption methods to protect data and provides a comparative analysis of the effectiveness of these methods. Microcontrollers, which form the backbone of many IoT devices, perform tasks ranging from sensor reading to controlling various devices. To ensure the security of data transmitted through IoT systems, it is essential to use reliable encryption methods. Hardware encryptors embedded in microcontrollers provide high performance and energy efficiency. Software cryptographic libraries, such as mbed TLS, AESLib, TinyAES, and others, offer flexibility and can be used on various platforms. The article examines encryption methods, both hardware and software, using popular microcontrollers such as the STM32F407VG and ESP32-WROOM-32 as examples. Performance, energy consumption, and security levels were measured. Performance was assessed by determining the number of encryption operations per second, which allows evaluating the real-time encryption speed. Energy consumption was measured using a precision multimeter to determine the amount of energy consumed during encryption. Security level was assessed through an analysis of the physical security of keys and resistance to various types of attacks, including brute force and side-channel attacks. The results of the study showed that hardware encryption on the STM32F407VG microcontroller provides significantly higher performance, lower energy consumption, and higher security compared to software encryption on the ESP32-WROOM-32. This confirms the high efficiency of hardware encryption for use in IoT systems that require reliable data protection.</p>
      </abstract>
      <kwd-group>
        <kwd>hardware encryptor</kwd>
        <kwd>cryptographic libraries</kwd>
        <kwd>STM32</kwd>
        <kwd>ESP32</kwd>
        <kwd>data security</kwd>
        <kwd>energy consumption</kwd>
        <kwd>performance 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In today's technological landscape, the Internet of Things (IoT) is becoming an increasingly
significant part of our daily lives [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. With the growing number of devices connected to the IoT
network, the risk of data security also increases, which is one of the most pressing issues today.
IoT devices, including microcontrollers, are becoming potential targets for cybercriminals who use
various attack methods to gain unauthorized access to confidential information [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Data encryption is one of the most effective methods for protecting information in IoT. It allows
data to be transformed into a format that cannot be read without a special key, thus ensuring its
confidentiality even if intercepted [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Furthermore, encryption helps maintain data integrity and
device authentication, which is particularly important in large and complex IoT systems [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Microcontrollers, which are the backbone of many IoT devices, use both hardware and software
encryption [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Hardware encryptors, integrated directly into microcontrollers, provide high
performance and energy efficiency [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. At the same time, software encryption libraries offer
flexibility and ease of integration into various systems.
      </p>
      <p>The purpose of this study is to evaluate the effectiveness of hardware and software encryption
on microcontrollers in the context of IoT systems. The research aims to determine the
performance, energy consumption, and security level of the two encryption approaches: hardware
encryption on the STM32F407VG microcontroller and software encryption on the
ESP32-WROOM32 microcontroller using the mbed TLS cryptographic library.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        The analysis of existing works allows identifying the trends and challenges faced by IoT device
developers, as well as approaches that can be used to optimize security [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which arise in IoT
systems due to shortcomings in the implementation of cryptographic algorithms and protocols.
      </p>
      <p>
        Several publications are dedicated to data protection tasks in IoT networks, with some studies
focusing on improving encryption methods [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. New encryption algorithms are adapted for
resource-constrained microcontrollers, enabling reliable information protection with minimal
consumption [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Specifically, in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], a new lightweight hybrid encryption algorithm with a novel
design approach for IoT is discussed, while [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] presents a compact implementation of the CHAM
block cipher on lower-class microcontrollers.
      </p>
      <p>
        Regarding the libraries for implementing these ciphers on microcontrollers, several researchers
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] have developed their own libraries to facilitate the encryption implementation process. For
example, the study [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] presented a multiprecision ANSI C library, which ensures efficient
execution of cryptographic algorithms across various platforms. This library is optimized for
resource-constrained microcontrollers and allows for high-performance execution of basic
encryption operations. Another study describes Seal-embedded, a homomorphic encryption library
for IoT [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. However, it is important to note that not all libraries are equally efficient in terms of
resource consumption and resistance to attacks [15].
      </p>
      <p>
        Many studies also address the optimization of microcontroller resources when applying
encryption, particularly ways to reduce computational costs and memory requirements for
implementing encryption algorithms [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ]. Other authors compare the encryption efficiency on
different devices to ensure IoT security [
        <xref ref-type="bibr" rid="ref16">17</xref>
        ] and evaluate the performance of IoT encryption
algorithms in the context of memory and energy consumption [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ].
      </p>
      <p>Despite some research in this area, there are certain unresolved issues and tasks that require
further investigation. One of the main challenges is ensuring maximum data security with the
limited resources of microcontrollers. Additionally, research on the effectiveness of encryption
optimization methods to ensure low energy consumption and high data processing speed in IoT
networks remains relevant.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Microcontrollers in IoT</title>
      <p>Microcontrollers are the foundation of most IoT devices, providing data processing,
communication, and device management. Their typically rich functional capabilities make them
suitable for a variety of applications. Microcontrollers play a key role in IoT, as they are used to
control and monitor connected devices and collect data from them.</p>
      <p>The role of microcontrollers in an IoT system usually depends on their functionality and the
tasks they are assigned. The use of microcontrollers in IoT has several typical directions, including:</p>
      <p>Overall, microcontrollers are a fundamental component of IoT systems, as they perform critical
tasks related to sensors, device control, communication, and data processing. In the context of
these functions, ensuring data security becomes extremely important.</p>
      <p>The requirements for protecting the confidentiality, integrity, and availability of data are the
main reasons why encryption plays a crucial role in IoT. Microcontrollers collect and process a lot
of sensitive information, and without proper protection, this data can become a target for
cybercriminals. The use of modern cryptographic methods, such as hardware and software
encryption, helps ensure reliable data protection at all levels of the IoT system.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Encryption on microcontrollers</title>
      <p>
        Encryption on microcontrollers plays a critical role in ensuring data security in embedded systems,
particularly in the context of IoT [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ]. The primary objective of this process is to prevent
unauthorized access to data and devices or alteration of information by transforming it into a
cryptographically unintelligible form using specialized algorithms. Implementing encryption on a
microcontroller involves a complex sequence of operations aimed at ensuring data confidentiality,
integrity, and authenticity [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ].
      </p>
      <p>Many modern microcontrollers are equipped with built-in hardware modules for encryption.
These hardware encryptors allow cryptographic operations to be performed at the hardware level,
ensuring high data processing speed and low power consumption. Hardware encryption
significantly reduces the load on the microcontroller's central processor, freeing it to perform other
important tasks.</p>
      <p>For microcontrollers that do not have built-in hardware encryption modules, software
cryptographic libraries are used. These libraries provide necessary functions for encryption,
decryption, and key management, implementing cryptographic algorithms at the software level.</p>
      <p>The features of hardware encryption and the use of cryptographic libraries will be discussed in
the following sections, where we will analyze their advantages, disadvantages, and compare their
effectiveness in various usage scenarios in IoT systems.</p>
      <sec id="sec-4-1">
        <title>4.1. Hardware encryption</title>
        <p>Hardware encryption is an essential component of the functionality of modern microcontrollers,
providing high performance and low power consumption during cryptographic operations.
Hardware encryptors are integrated directly into microcontrollers and allow encryption and
decryption of data at the hardware level. Figure 1 illustrates the block diagram showing the main
components of the hardware encryptor and their interaction.</p>
        <p>From Figure 1, it can be seen that the input data is fed into the Encryption Processor, which
performs the core cryptographic operations (Table 1) to transform Plaintext into Ciphertext.</p>
        <sec id="sec-4-1-1">
          <title>Operation Description</title>
          <p>Non-linear substitution of each
byte of the plaintext using a
substitution table (S-box)
Cyclic shift of bytes in each
row of the state matrix
Linear transformation of each
column of the state matrix
Bitwise XOR between the state 
matrix and the round key


 ℎ</p>
          <p>Formula
( ) =  ( )</p>
          <p>( ) =  ( )
( ) =  ′ ℎ
( ) =  ′′
( ) =  ′</p>
          <p>( ) =  ′′
( ,  ) =  ⊕  
( ,  ) =  ⊕ 
The Key Generator block denotes the generation of cryptographic keys using a Pseudo-Random
Number Generator (PRNG) to create reliable keys. These keys are stored in the key memory and
passed to the encryption processor and control blocks. Keys are stored in The Key Storage and
are only accessible to the encryption processor through the control blocks. Control Units manage
the encryption process, provide operation synchronization, and control access to keys and data.
Input/Output (I/O Interfaces) Interfaces facilitate data exchange between the hardware encryptor
and other parts of the microcontroller or external devices. They transmit encrypted data to the
next processing or storage stages. Encrypted data (Ciphertext) emerges at the output of the
encryption processor, which can be safely transmitted or stored. Upon completion of the
encryption process, the data will be protected from unauthorized access.</p>
          <p>Let's consider the properties of popular microcontrollers and SoCs that have built-in hardware
capabilities for encryption.</p>
          <p>
            1. STM32. STM32 microcontrollers typically feature built-in AES (Advanced Encryption
Standard) hardware encryption, providing efficient and secure data encryption [
            <xref ref-type="bibr" rid="ref21">22</xref>
            ]. Using
this hardware encryption allows encryption operations to be performed without significant
CPU resource consumption [
            <xref ref-type="bibr" rid="ref22">23</xref>
            ].
2. ESP8266 and ESP32. These microcontrollers from Espressif also support hardware
encryption [
            <xref ref-type="bibr" rid="ref23">24</xref>
            ]. For example, ESP8266 has a built-in AES hardware encryptor, while ESP32
additionally supports hardware encryption using SHA (Secure Hash Algorithm) hash
functions.
          </p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Cryptographic libraries for microcontrollers</title>
        <p>Hardware encryption provides significant advantages in performance and security, as encryption is
performed by specialized components of the microcontroller. However, not all microcontrollers
have built-in cryptographic accelerators. In such cases, software cryptographic libraries come to
the rescue, implementing the necessary cryptographic algorithms and functions at the software
level.</p>
        <p>Cryptographic libraries play an important role in ensuring data security in
microcontrollerbased systems, especially when hardware encryptors are unavailable or insufficient to perform all
necessary cryptographic operations. These libraries implement various cryptographic algorithms
and functions at the software level, providing flexibility and a wide range of capabilities for
developers.</p>
        <p>The first step in implementing encryption is initializing the necessary cryptographic libraries on
the microcontroller. This stage involves selecting the cryptographic algorithm, generating keys,
and configuring operating modes (encryption or decryption). Subsequent procedures involve data
preparation, including dividing it into blocks if the algorithm requires working with data blocks,
and adding additional information, such as an initialization vector, to enhance encryption security.
Data encryption is performed according to the selected cryptographic algorithm and key, including
adding data for authentication (if necessary), key expansion, and performing mathematical
encryption operations on data blocks. Upon completion of the encryption operations, encrypted
data is obtained, which can be used for transmission or storage in a secure location.</p>
        <p>The list of popular cryptographic libraries relevant for microcontroller-based projects is quite
extensive:</p>
        <p>
          Crypto a cryptographic function library for Arduino and other microcontrollers [
          <xref ref-type="bibr" rid="ref25">26</xref>
          ]. It
contains implementations of various encryption algorithms, such as AES (Advanced
Encryption Standard) and DES (Data Encryption Standard), as well as hash functions like
MD5 and SHA. However, it may require more resources than some other libraries.
AESLib a library specializing in the implementation of the AES algorithm, widely used
for data encryption. It allows the use of different keys and AES modes of operation to
protect information. It works on most Arduino boards, including Arduino Uno, although
the operation speed may be limited due to resource constraints [
          <xref ref-type="bibr" rid="ref26">27</xref>
          ].
        </p>
        <p>
          TinyAES a library for implementing AES on Arduino microcontrollers. It is known for
its efficiency and small size, making it an ideal choice for resource-constrained embedded
systems. This library offers AES implementation on AVR microcontrollers (on which
Arduino Uno is based) and is optimized for the limited resources of these devices. It can be
particularly useful for projects where code size and speed are crucial [
          <xref ref-type="bibr" rid="ref27">28</xref>
          ].
4.
        </p>
        <p>
          uECC a library used to implement elliptic curve cryptography on microcontrollers [
          <xref ref-type="bibr" rid="ref28">29</xref>
          ].
It provides the ability to use elliptic curves for key generation and data signing.
        </p>
        <p>
          Mbedtls a library offering implementations of a wide range of cryptographic algorithms,
but may be somewhat heavy for use on Arduino Uno platforms due to its large amount of
code and resource requirements [
          <xref ref-type="bibr" rid="ref29">30</xref>
          ].
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Library compatibility with microcontrollers</title>
        <p>Compatibility of encryption libraries with different microcontroller modifications is a crucial
aspect in the development of security systems for embedded devices. The choice of an appropriate
library depends on several factors, including the computational power of the microcontroller, the
amount of available memory, energy consumption requirements, and support for specific
cryptographic algorithms. Let's consider the main aspects of compatibility:
1. Computational Power. Microcontrollers with higher computational power (e.g., ARM
Cortex-M series) can support more complex cryptographic algorithms and libraries, such as
mbed TLS or WolfSSL. Less powerful microcontrollers (e.g., AVR or PIC) may require
libraries optimized for them, such as TinyCrypt.
2. Memory. The amount of available RAM and Flash memory also affects the choice of
library. Some encryption libraries require significant memory to store keys and perform
algorithms, which can be an issue for microcontrollers with limited resources. For such
cases, there are optimized libraries like micro-ecc for ECC cryptography.
3. Energy Consumption. For battery-powered devices, it is important to choose libraries
optimized for low energy consumption. This might include the use of specific algorithms or
hardware cryptography accelerators if they are available in the microcontroller.
4. Support for Cryptographic Algorithms. Different applications may require different
cryptographic algorithms (AES, RSA, ECC, etc.). It is important to ensure that the library
supports the necessary algorithms and that they are optimized for the specific
microcontroller.</p>
        <p>Comparison of the properties of cryptographic libraries for microcontrollers is presented in
Table 2.</p>
        <sec id="sec-4-3-1">
          <title>Wide range of functions, flexibility</title>
        </sec>
        <sec id="sec-4-3-2">
          <title>Low resource simplicity Low memory usage, high speed</title>
        </sec>
        <sec id="sec-4-3-3">
          <title>Low memory usage, high security Easy integration, high performance</title>
        </sec>
        <sec id="sec-4-3-4">
          <title>High performance, flexibility</title>
        </sec>
        <sec id="sec-4-3-5">
          <title>All well-known microcontrollers consumption, AVR, ESP8266</title>
        </sec>
        <sec id="sec-4-3-6">
          <title>AVR, ARM Cortex-M,</title>
          <p>ESP8266, ESP32
STM32, AVR, ESP32
STM32, ESP32, ARM
Cortex-M
STM32, ESP32, NXP
LPC</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Results</title>
      <sec id="sec-5-1">
        <title>5.1. Performance</title>
        <p>The study used two types of microcontrollers: one with hardware encryption (STM32F407VG) and
one with software encryption (ESP32-WROOM-32). To evaluate the efficiency of hardware and
software encryption, the performance, energy consumption and security metrics were used.
The number of encryption operations per second was measured to assess how quickly encryption
can be performed in real-time. Encryption performance was measured by determining the number
of encryption operations executed per second. This allows for evaluating the real-time encryption
speed and comparing the efficiency of different encryption approaches. For software encryption on
the ESP32-WROOM-32, the mbed TLS cryptographic library was used. Each microcontroller was
set up to perform encryption on a fixed-size data block (16 bytes) using the AES algorithm. Specific
programs were developed to execute encryption in a loop for this purpose.</p>
        <p>The testing procedure involved running the encryption program on the microcontroller and
measuring the time required to perform a certain number of encryption operations (1000
operations). The number of encryption operations per second was then calculated by dividing the
total number of operations by the total execution time. Data was collected for each type of
encryption (hardware and software). The test results were recorded and analyzed to determine the
average performance value, after which graphs were created to visualize the performance
comparison between hardware and software encryption.</p>
        <p>The measurements showed that hardware encryption on the STM32F407VG significantly
outperformed software encryption on the ESP32-WROOM-32 in terms of the number of encryption
operations per second (Figure 2). This confirms the high efficiency of hardware encryption for use
in systems requiring fast and reliable data encryption.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Energy consumption</title>
        <p>Energy consumption was measured during the execution of encryption operations. This is crucial
for devices with limited power resources, such as battery-powered devices. Software encryption on
the ESP32-WROOM-32 was performed using the mbed TLS cryptographic library. Each
microcontroller was configured to encrypt a fixed-size data block (e.g., 16 bytes) using the AES
algorithm. Corresponding programs were developed to perform encryption in a loop.</p>
        <p>Energy consumption was measured using a precision multimeter or similar equipment that can
accurately measure the current and voltage consumed by the microcontroller. After starting the
encryption program on the microcontroller, the current and voltage were measured during the
encryption operations. Power was calculated, and the time required to perform a certain number of
encryption operations (1000 operations) was measured. Data was collected for each type of
encryption (hardware and software), and the measurement results were recorded and analyzed to
determine the average energy consumption during the encryption operations. Graphs were then
created to visualize the comparison of energy consumption between hardware and software
encryption.</p>
        <p>Measurements showed that hardware encryption on the STM32F407VG had significantly lower
energy consumption compared to software encryption on the ESP32-WROOM-32 (Figure 2). This
confirms the high efficiency of hardware encryption for use in energy-constrained systems that
require effective encryption with minimal energy consumption.</p>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Security</title>
        <p>The level of protection was assessed, including the physical protection of keys and resistance to
attacks. Evaluating the security level of encryption involved analyzing the physical protection of
keys and resistance to various types of attacks. This stage is critically important for ensuring
reliable data protection, especially in the face of increasing threats in the field of information
security.</p>
        <p>Hardware encryption provides a higher level of security because keys are stored in specialized
memory of the microcontroller, making unauthorized access more difficult. Software encryption
was supported by the mbed TLS cryptographic library, which stores keys in the microcontroller's
general memory, making them more vulnerable to attacks. Resistance to attacks was assessed by
conducting simulations of various types of attacks, including brute-force attacks, side-channel
attacks, and differential attacks. Tests were conducted for each microcontroller to model possible
attack scenarios and determine how effectively each type of encryption could withstand these
threats. Data on the physical protection of keys and the results of tests for resistance to attacks
were collected and analyzed to determine the overall security level of each type of encryption.
Graphs were then constructed to visualize the comparison of security levels between hardware and
software encryption.</p>
        <p>The results showed that hardware encryption on the STM32F407VG provides a significantly
higher level of security compared to software encryption on the ESP32-WROOM-32 (Figure 2).
This confirms the importance of using hardware encryption to protect critical data in the face of
increasing threats in the field of information security.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Discussion</title>
      <p>Further research in the field of hardware and software encryption on microcontrollers could focus
on several key aspects. Firstly, analyzing the efficiency of hardware encryption on new and
emerging microcontrollers in the market would be worthwhile. This would allow assessing the
potential of new hardware platforms in terms of security and performance.</p>
      <p>Secondly, it's important to develop and optimize software cryptographic libraries to achieve
better performance and energy efficiency across different hardware platforms. Optimization may
include algorithm enhancements, reducing memory consumption, and lowering energy
consumption, which is particularly crucial for resource-constrained devices.</p>
      <p>Integrating hardware and software encryption with other security protocols, such as TLS, is
another promising direction. This would provide comprehensive protection for IoT systems,
enhancing their resilience to various types of attacks and ensuring secure data transmission.</p>
      <p>
        Also, one of the directions of future research is the integration of post-quantum protocols in
encryption on microcontrollers for IoT devices [
        <xref ref-type="bibr" rid="ref30">31</xref>
        ]. The primary focus should be on adapting
postquantum algorithms, such as CRYSTALS-DILITHIUM, Kyber, NTRUEncrypt, and others, to the
limited resources of microcontrollers, and ensuring compatibility with existing communication
protocols and hardware interfaces.
      </p>
      <p>Expanding the scope of testing is also an important aspect of further research. Conducting more
extensive tests using different scenarios and data types would provide a more comprehensive
picture of the efficiency and security of encryption under various conditions. This would help
identify potential weaknesses and refine existing encryption methods.</p>
      <p>Overall, further research has the potential to significantly enhance the security and efficiency of
IoT systems. It would assist developers in selecting the best solutions for data protection,
considering the specific requirements of their projects. The results of this research could serve as a
basis for creating more reliable and energy-efficient IoT devices that meet modern security
challenges.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusion</title>
      <p>Based on the research findings, it is recommended to use microcontrollers with built-in hardware
encryption engines, such as STM32, for projects requiring high performance, low power
consumption, and high security levels. Hardware encryption is the most efficient solution for
critical IoT applications where data reliability and processing speed are crucial.</p>
      <p>Software cryptographic libraries like mbed TLS, AESLib, TinyAES, and others remain essential
tools for projects where hardware encryption engines are unavailable or where flexibility in
choosing encryption algorithms is needed. The choice of a specific library should be based on the
performance, power consumption, and security requirements of the particular project.</p>
      <p>Thus, encryption on microcontrollers serves not only as a means of data protection but also as a
critical component for supporting functional security and stability in IoT systems. Implementing
effective encryption methods helps mitigate risks associated with data breaches, unauthorized
access, and other cyber threats, ensuring the reliability and longevity of connected devices in the
modern Internet of Things world.</p>
      <p>erformance comparison of ECC libraries for IoT
-Applied Sciences</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          ,
          <article-title>Data security of IoT devices with limited resources: challenges and potential solutions</article-title>
          ,
          <source>in: Proceedings of the doors-2024: 4th Edge Computing Workshop</source>
          , ceur-ws.
          <source>org</source>
          , vol.
          <volume>3666</volume>
          ,
          <year>2024</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>W. H.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <article-title>Current research on Internet of Things (IoT) security: A survey</article-title>
          ,
          <source>Computer networks 148</source>
          (
          <year>2019</year>
          )
          <fpage>283</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Pearson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <article-title>Sic 2: Securing microcontroller based IoY devices with low-cost crypto coprocessors</article-title>
          ,
          <source>in: 2020 IEEE 26th International Conference on Parallel and Distributed Systems</source>
          , ICPADS, IEEE,
          <year>2020</year>
          , pp.
          <fpage>372</fpage>
          -
          <lpage>381</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rajagopalan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Janakiraman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rengarajan</surname>
          </string-name>
          ,
          <article-title>Medical image encryption: Microcontroller and fpga perspective, in: Medical Data Security for Bioengineers</article-title>
          ,
          <source>IGI Global</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>278</fpage>
          -
          <lpage>304</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Arpaia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonavolonta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cioffi</surname>
          </string-name>
          ,
          <article-title>Problems of the advanced encryption standard in protecting Internet of Things sensor networks</article-title>
          ,
          <source>Measurement</source>
          <volume>161</volume>
          (
          <year>2020</year>
          )
          <fpage>107853</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Dinu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Khrishnan</surname>
          </string-name>
          , P. Schaumont, SIA:
          <article-title>Secure intermittent architecture for off-the-shelf resource-constrained microcontrollers</article-title>
          ,
          <source>in: 2019 IEEE International Symposium on Hardware Oriented Security and Trust</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>217</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Meneghello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zucchetto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Polese</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Zanella,
          <article-title>IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices</article-title>
          ,
          <source>IEEE Internet of Things Journal</source>
          <volume>6</volume>
          (
          <issue>5</issue>
          ) (
          <year>2019</year>
          )
          <fpage>8182</fpage>
          -
          <lpage>8201</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Yabu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sakiyama</surname>
          </string-name>
          , T. Sugawara,
          <article-title>Low-memory implementation of authenticated encryption algorithm saeaes on arm cortex-m0 microcontroller</article-title>
          ,
          <source>in: 2020 IEEE 9th Global Conference on Consumer Electronics</source>
          ,
          <string-name>
            <surname>GCCE</surname>
          </string-name>
          , IEEE,
          <year>2020</year>
          ,
          <fpage>181</fpage>
          -
          <lpage>185</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          , P. Mykhailovskyi, IoT Smart Implants:
          <article-title>Information Security and the Implementation of Lightweight Cryptography, ceur-ws.org</article-title>
          , vol.
          <volume>3609</volume>
          ,
          <year>2023</year>
          , pp.
          <fpage>145</fpage>
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jafarali</surname>
          </string-name>
          <string-name>
            <surname>Jassbi</surname>
          </string-name>
          ,
          <article-title>SEPAR: A new lightweight hybrid encryption algorithm with a novel design approach for IoT</article-title>
          ,
          <source>Wireless Personal Communications</source>
          <volume>114</volume>
          (
          <year>2020</year>
          )
          <fpage>2283</fpage>
          -
          <lpage>2314</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>H.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Park</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <article-title>Compact implementation of CHAM block cipher on low-end microcontrollers</article-title>
          ,
          <source>in: Information Security Applications: 21st International Conference, WISA 2020</source>
          , Springer International Publishing,
          <year>2020</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>141</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Temirbekova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pyrkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Abdiakhmetova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Berdaly</surname>
          </string-name>
          ,
          <article-title>Library of fully homomorphic encryption on a microcontroller</article-title>
          ,
          <source>in: 2022 International Conference on Smart Information Systems and Technologies</source>
          ,
          <string-name>
            <surname>SIST</surname>
          </string-name>
          , IEEE,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <article-title>[13] ovotný, Multiprecision ANSI C Library for Implementation of Cryptographic Algorithms on Microcontrollers</article-title>
          ,
          <source>in: 2019 8th Mediterranean Conference on Embedded Computing</source>
          ,
          <string-name>
            <surname>MECO</surname>
          </string-name>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Natarajan</surname>
          </string-name>
          , W. Dai,
          <article-title>Seal-embedded: A homomorphic encryption library for the internet of things</article-title>
          ,
          <source>IACR Transactions on Cryptographic Hardware and Embedded Systems</source>
          (
          <year>2021</year>
          )
          <fpage>756</fpage>
          -
          <lpage>779</lpage>
          .
          <article-title>encryption algorithms for IoT-based applications</article-title>
          ,
          <source>Arabian Journal for Science and Engineering</source>
          <volume>46</volume>
          (
          <issue>4</issue>
          ) (
          <year>2021</year>
          )
          <fpage>4015</fpage>
          -
          <lpage>4037</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          ,
          <article-title>Data security of IoT devices with limited resources: challenges and potential solutions</article-title>
          ,
          <source>in: Proceedings of the doors-2024: 4th Edge Computing Workshop</source>
          , ceur-ws.
          <source>org</source>
          , vol.
          <volume>3666</volume>
          ,
          <year>2024</year>
          , pp.
          <fpage>85</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pyrkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Temirbekova</surname>
          </string-name>
          ,
          <article-title>Compare encryption performance across devices to ensure the security of the IOT</article-title>
          ,
          <source>Indonesian Journal of Electrical Engineering and Computer Science</source>
          <volume>20</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          )
          <fpage>894</fpage>
          -
          <lpage>902</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Maitra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Richards</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abdelgawad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yelamarthi</surname>
          </string-name>
          ,
          <article-title>Performance evaluation of IoT encryption algorithms: memory, timing, and energy</article-title>
          , in
          <article-title>: 2019 IEEE sensors applications symposium</article-title>
          , SAS, IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Naumenko</surname>
          </string-name>
          ,
          <article-title>Analysis of Information Security Issues in Balancing Multiple Independent Containers on a Single Server</article-title>
          ,
          <source>in: Proceedings of the 3rd International Workshop on Information Technologies: Theoretical and Applied Problems</source>
          ,
          <string-name>
            <surname>ITTAP</surname>
          </string-name>
          <year>2023</year>
          ,
          <article-title>ceurws</article-title>
          .org, vol.
          <volume>3628</volume>
          ,
          <year>2023</year>
          , pp.
          <fpage>450</fpage>
          -
          <lpage>461</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>C.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pearson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <article-title>Microcontroller based IoT system firmware security: Case studies</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Industrial Internet</source>
          ,
          <string-name>
            <surname>ICII</surname>
          </string-name>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>200</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kwon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>An</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Seo</surname>
          </string-name>
          ,
          <article-title>Efficient implementation of ARX-based block ciphers on 8-Bit AVR microcontrollers</article-title>
          ,
          <source>Mathematics</source>
          <volume>8</volume>
          (
          <issue>10</issue>
          ) (
          <year>2020</year>
          )
          <year>1837</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>K.</given-names>
            <surname>Rzepka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Szary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Cabaj</surname>
          </string-name>
          , W. Mazurczyk,
          <article-title>Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments</article-title>
          ,
          <source>Computer Networks</source>
          <volume>242</volume>
          (
          <year>2024</year>
          )
          <fpage>110252</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. T.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. H.</given-names>
            <surname>Hsia</surname>
          </string-name>
          ,
          <article-title>Development of the IoT module SCADA using MQTT Protocol and AES</article-title>
          ,
          <source>Journal of Advances in Artificial Life Robotics</source>
          <volume>2</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          )
          <fpage>109</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Al-Mashhadani</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Shujaa, IoT security using AES encryption technology based ESP32 platform</article-title>
          ,
          <source>Int. Arab J. Inf. Technol</source>
          .
          <volume>19</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>214</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>K.</given-names>
            <surname>Tomar</surname>
          </string-name>
          ,
          <article-title>PIC18F452 Microcontroller Home Security System: A Review Paper</article-title>
          ,
          <source>International Journal of Innovative Research in Computer Science &amp; Technology</source>
          <volume>10</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>34</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yoshimoto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Uetake</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Kodera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kusaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nogami</surname>
          </string-name>
          ,
          <article-title>Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library</article-title>
          , in: 2019
          <source>Seventh International Symposium on Computing and Networking (CANDAR)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>245</fpage>
          -
          <lpage>250</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>L.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Riom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. F.</given-names>
            <surname>Bissyandé</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Klein</surname>
          </string-name>
          ,
          <article-title>Revisiting the impact of common libraries for android-related investigations</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>154</volume>
          (
          <year>2019</year>
          )
          <fpage>157</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ninan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Emmert</surname>
          </string-name>
          ,
          <article-title>TinyPower: Side-Channel Attacks with Tiny Neural Networks</article-title>
          ,
          <source>in: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>320</fpage>
          -
          <lpage>331</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Nofal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dezfouli</surname>
          </string-name>
          ,
          <article-title>A comprehensive empirical analysis of tls handshake and record layer on iot platforms</article-title>
          ,
          <source>in: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>61</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Toros</surname>
          </string-name>
          ,
          <source>N. devices, and Engineering</source>
          <volume>25</volume>
          (
          <issue>2</issue>
          ) (
          <year>2024</year>
          )
          <fpage>278</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>K.</given-names>
            <surname>Bürstinghaus-Steinbach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Krauß</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Niederhagen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schneider</surname>
          </string-name>
          ,
          <article-title>Post-quantum tls on embedded systems: Integrating and evaluating kyber and sphincs+ with mbed tls</article-title>
          ,
          <source>in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>841</fpage>
          -
          <lpage>852</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>