pith. sign in
Pith Number

pith:53ZEU7FT

pith:2026:53ZEU7FTPDD6F5VBTT3LGE2O4O
not attested not anchored not stored refs resolved

MQTT Across a Raspberry Pi 5 IoT Network Utilizing Quantum-resistant Signature Algorithms

Chansu Yu, Ray Feingold

FALCON post-quantum signatures secure MQTT on Raspberry Pi 5 devices while exposing measurable performance overheads.

arxiv:2605.13698 v1 · 2026-05-13 · cs.CR

Add to your LaTeX paper
\usepackage{pith}
\pithnumber{53ZEU7FTPDD6F5VBTT3LGE2O4O}

Prints a linked badge after your title and injects PDF metadata. Compiles on arXiv. Learn more · Embed verified badge

Record completeness

1 Bitcoin timestamp
2 Internet Archive
3 Author claim open · sign in to claim
4 Citations open
5 Replications open
Portable graph bundle live · download bundle · merged state
The bundle contains the canonical record plus signed events. A mirror can host it anywhere and recompute the same current state with the deterministic merge algorithm.

Claims

C1strongest claim

By measuring system performance, the research characterizes the practical trade-offs of deploying lattice-based PQC on lightweight hardware.

C2weakest assumption

That the observed performance on three Raspberry Pi 5 boards under controlled lab conditions will generalize to real-world IoT deployments with intermittent connectivity, varied sensors, and production-scale message rates.

C3one line summary

An experimental deployment of the FALCON lattice-based signature scheme inside MQTT on Raspberry Pi 5 hardware quantifies the resulting latency and resource overhead for IoT use.

References

17 extracted · 17 resolved · 0 Pith anchors

[1] K.-Y. Chen and J.-P. Chen. Masking floating-point number multiplication and addition of Falcon.IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(2):276–303, 2024. DOI: 10.46586/tc 2024 · doi:10.46586/tches.v2024.i2.276-303
[2] Build a Motion Detection System with a Raspberry Pi.open- source.com, 2020 2020
[3] Introducing the MQTT Protocol – MQTT Essentials: Part 1 2024
[4] Lin, X. et al. Thorough power analysis on Falcon Gaussian samplers and practical countermeasure. InLecture Notes in Computer Science, pages 229–258. Springer,
[5] DOI: 10.1007/978-3-031-91820-9_8 · doi:10.1007/978-3-031-91820-9_8
Receipt and verification
First computed 2026-05-18T02:44:16.878251Z
Builder pith-number-builder-2026-05-17-v1
Signature Pith Ed25519 (pith-v1-2026-05) · public key
Schema pith-number/v1.0

Canonical hash

eef24a7cb378c7e2f6a19cf6b3134ee39dc360b45dd8a2314fb9b3cda1d67190

Aliases

arxiv: 2605.13698 · arxiv_version: 2605.13698v1 · doi: 10.48550/arxiv.2605.13698 · pith_short_12: 53ZEU7FTPDD6 · pith_short_16: 53ZEU7FTPDD6F5VB · pith_short_8: 53ZEU7FT
Agent API
Verify this Pith Number yourself
curl -sH 'Accept: application/ld+json' https://pith.science/pith/53ZEU7FTPDD6F5VBTT3LGE2O4O \
  | jq -c '.canonical_record' \
  | python3 -c "import sys,json,hashlib; b=json.dumps(json.loads(sys.stdin.read()), sort_keys=True, separators=(',',':'), ensure_ascii=False).encode(); print(hashlib.sha256(b).hexdigest())"
# expect: eef24a7cb378c7e2f6a19cf6b3134ee39dc360b45dd8a2314fb9b3cda1d67190
Canonical record JSON
{
  "metadata": {
    "abstract_canon_sha256": "1aba68125f8f5f00d4fec65031396ca67286729b5525255e62d29f541f3d1be1",
    "cross_cats_sorted": [],
    "license": "http://creativecommons.org/licenses/by/4.0/",
    "primary_cat": "cs.CR",
    "submitted_at": "2026-05-13T15:50:18Z",
    "title_canon_sha256": "dc2c9c903fa35165d33908ec34f87ac82665d33740e1f379d55b3ed022c2ca5a"
  },
  "schema_version": "1.0",
  "source": {
    "id": "2605.13698",
    "kind": "arxiv",
    "version": 1
  }
}