Collected molecules will appear here. Add from search or explore.
Empirical analysis and measurement of energy consumption (computation + communication) for post-quantum cryptographic key establishment on Bluetooth Low Energy and similar wireless low-power networks
citations
0
co_authors
3
This is a research paper (arXiv preprint) with zero repository signals (0 stars, 0 forks, 44 days old), indicating either unpublished work or preliminary distribution. The contribution is an empirical measurement and analysis study that separates computation vs. communication costs in post-quantum key exchange on BLE—a useful narrowing of focus compared to prior work, but fundamentally incremental. The novelty lies in the decomposition methodology and BLE-specific validation, not in new cryptographic techniques or infrastructure. As a paper-only artifact with no associated code repository, it has no adoption surface and offers minimal defensibility. Frontier labs (OpenAI, Anthropic, Google) show no interest in this niche (post-quantum cryptography is dominated by NIST, cryptographic standards bodies, and telecom infrastructure companies). The work is domain-specific to embedded security and wireless protocols—too narrow and too early-stage to pose defensibility concerns. The low frontier risk reflects that this addresses a regulatory/standards compliance problem (PQC migration), not a frontier capability that labs would build to replace or compete with. Integration would only occur if embedded in a BLE-stack implementation or IoT security product, both outside frontier labs' core focus.
TECH STACK
INTEGRATION
reference_implementation
READINESS