h1

h2

h3

h4

h5
h6
% IMPORTANT: The following is UTF-8 encoded.  This means that in the presence
% of non-ASCII characters, it will not work with BibTeX 0.99 or older.
% Instead, you should use an up-to-date BibTeX implementation like “bibtex8” or
% “biber”.

@MASTERSTHESIS{Westphal:1024815,
      author       = {Westphal, Tobias},
      othercontributors = {Unruh, Dominique and Henze, Martin and Stutte, Benjamin},
      title        = {{L}attice-based post-quantum cryptography for
                      memory-constrained {I}o{T} devices},
      school       = {RWTH Aachen University},
      type         = {Bachelorarbeit},
      address      = {Aachen},
      publisher    = {RWTH Aachen University},
      reportid     = {RWTH-2026-00350},
      pages        = {1 Online-Ressource : Illustrationen},
      year         = {2026},
      note         = {Veröffentlicht auf dem Publikationsserver der RWTH Aachen
                      University; Bachelorarbeit, RWTH Aachen University, 2025},
      abstract     = {Functional quantum computers could become reality in the
                      short-term future, threatening the current internet security
                      landscape, whose classical public-key cryptography schemes
                      are vulnerable to Shor’s algorithm. In the American
                      NIST’s standardization process for quantum secure
                      cryptography, an ongoing effort to replace these
                      vulnerabilities, schemes based on lattices performed well
                      and some have been selected for standardization. This
                      post-quantum cryptography will have to support application
                      in resource-constrained systems such as microcontroller
                      environments in the IoT. The inherently higher resource
                      consumption of these schemes compared to classical
                      cryptography makes this task challenging. This is especially
                      the case with regard to memory-constraints,which are said to
                      be the main bottleneck for implementations on constrained
                      devices. Due to their relatively small keys and efficient
                      execution, lattice-based cryptography again seems suitable.
                      We investigate the suitability of lattice-based cryptography
                      for memory-constrained devices and look particularly at the
                      KEM Kyber and the DSA Dilithium. Lattice-based PQC schemes
                      have been successfully implemented on high-end
                      microcontrollers such as the ARM Cortex-M4, where some
                      achieved low memory usage and performances that compete with
                      classical cryptography. Lattice-based PQC schemes have been
                      further optimized to fit memory-constrained devices with
                      <10kB RAM. These implementations can suffer from
                      considerable performance penalties. Both Kyber and Dilithium
                      seem to be the most suitable of the KEMs and DSAs
                      respectively for memory-constrained devices. The
                      memory-optimized implementations of both show reasonable
                      performances.},
      cin          = {125910 / 120000},
      ddc          = {004},
      cid          = {$I:(DE-82)125910_20230816$ / $I:(DE-82)120000_20140620$},
      typ          = {PUB:(DE-HGF)2},
      doi          = {10.18154/RWTH-2026-00350},
      url          = {https://publications.rwth-aachen.de/record/1024815},
}