{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:48Z","timestamp":1751602308460,"version":"3.41.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_30","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:36:25Z","timestamp":1745307385000},"page":"354-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for\u00a0CAN Networks"],"prefix":"10.1007","author":[{"given":"Arcangelo","family":"Castiglione","sequence":"first","affiliation":[]},{"given":"Teresa","family":"Elia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"30_CR1","unstructured":"Avatefipour, O., Malik, H.: State-of-the-art survey on in-vehicle network communication (can-bus) security and vulnerabilities (2018). https:\/\/arxiv.org\/abs\/1802.a01725"},{"key":"30_CR2","doi-asserted-by":"publisher","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symmetric Cryptology (2019). https:\/\/doi.org\/10.46586\/tosc.v2019.i2.55-93","DOI":"10.46586\/tosc.v2019.i2.55-93"},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Bozdal, M., Samie, M., Aslam, S., Jennions, I.: Evaluation of can bus security challenges. Sensors 20(8) (2020). https:\/\/doi.org\/10.3390\/s20082364. https:\/\/www.mdpi.com\/1424-8220\/20\/8\/2364","DOI":"10.3390\/s20082364"},{"key":"30_CR4","doi-asserted-by":"publisher","unstructured":"Campos, F., Meyer, M., Sanwald, S., St\u00f6ttinger, M., Wang, Y.: Post-quantum cryptography for ecu security use cases. In: 17 th escar Europe : Embedded Security in t(Konferenzver\u00f6ffentlichung) (2019). https:\/\/doi.org\/10.13154\/294-6673","DOI":"10.13154\/294-6673"},{"key":"30_CR5","first-page":"87","volume":"2020","author":"A Castiglione","year":"2020","unstructured":"Castiglione, A., Palmieri, F., Colace, F., Lombardi, M., Santaniello, D., et al.: On the impact of lightweight ciphers in automotive networks. J. Vis. Lang. Sentient Syst. 2020, 87\u201392 (2020)","journal-title":"J. Vis. Lang. Sentient Syst."},{"key":"30_CR6","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, SEC\u201911, p.\u00a06. USENIX Association, USA (2011)"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"Cultice, T., Thapliyal, H.: PUF-based post-quantum CAN-FD framework for vehicular security. Information 13(8) (2022). https:\/\/doi.org\/10.3390\/info13080382. https:\/\/www.mdpi.com\/2078-2489\/13\/8\/382","DOI":"10.3390\/info13080382"},{"key":"30_CR8","unstructured":"Currie, R.: Developments in car hacking. In: SANS Institute - SANS Reading Room (2020). https:\/\/api.semanticscholar.org\/CorpusID:214794169"},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2), 22,501 (2019). https:\/\/doi.org\/10.1007\/s11432-017-9436-7","DOI":"10.1007\/s11432-017-9436-7"},{"issue":"16","key":"30_CR10","doi-asserted-by":"publisher","first-page":"12518","DOI":"10.1109\/JIOT.2020.3032935","volume":"8","author":"G D\u2019Angelo","year":"2021","unstructured":"D\u2019Angelo, G., Castiglione, A., Palmieri, F.: A cluster-based multidimensional approach for detecting attacks on connected vehicles. IEEE Internet Things J. 8(16), 12518\u201312527 (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3032935","journal-title":"IEEE Internet Things J."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"El\u017cbieta, G.: Communication in automotive networks illustrated with an example of vehicle stability program: part i - control area network. GSTF J. Eng. Technol. (JET) 2, 1\u20137 (2014). https:\/\/api.semanticscholar.org\/CorpusID:109158573","DOI":"10.7603\/s40707-013-0013-8"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Fakhfakh, F., Tounsi, M., Mosbah, M.: Cybersecurity attacks on can bus based vehicles: a review and open challenges. Libr. Hi Tech 40, 1179\u20131203 (2021). https:\/\/api.semanticscholar.org\/CorpusID:238722666","DOI":"10.1108\/LHT-01-2021-0013"},{"key":"30_CR13","unstructured":"Greenberg, A.: Hackers remotely kill a jeep on the highway-with me in it. WIRED (2015). https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/. Accessed 22 Nov 2024"},{"key":"30_CR14","doi-asserted-by":"publisher","unstructured":"Hoppe, T., Kiltz, S., Dittmann, J.: Security threats to automotive can networks\u2014practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1), 11\u201325 (2011). Special Issue on Safecomp 2008. https:\/\/doi.org\/10.1016\/j.ress.2010.06.026. URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0951832010001602.","DOI":"10.1016\/j.ress.2010.06.026"},{"key":"30_CR15","unstructured":"Jang, K., Baksi, A., Kim, H., Song, G., Seo, H., Chattopadhyay, A.: Quantum analysis of AES. Cryptology ePrint Archive, Paper 2022\/683 (2022). https:\/\/eprint.iacr.org\/2022\/683"},{"key":"30_CR16","doi-asserted-by":"publisher","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462 (2010). https:\/\/doi.org\/10.1109\/SP.2010.34","DOI":"10.1109\/SP.2010.34"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Mattsson, J.P., Smeets, B., Thormarker, E.: Quantum-resistant cryptography (2021). https:\/\/arxiv.org\/abs\/2112.00399","DOI":"10.23919\/ETR.2021.9904724"},{"key":"30_CR18","unstructured":"Schulze, S., Pukall, M., Saake, G., Hoppe, T., Dittmann, J.: On the need of data management in automotive systems. In: Datenbanksysteme f\u00fcr Business, Technologie und Web (2009). https:\/\/api.semanticscholar.org\/CorpusID:3001742"},{"key":"30_CR19","unstructured":"Wang, W., St\u00f6ttinger, M.: Post-quantum secure architectures for automotive hardware secure modules. Cryptology ePrint Archive, Paper 2020\/026 (2020). https:\/\/eprint.iacr.org\/2020\/026"},{"key":"30_CR20","doi-asserted-by":"publisher","unstructured":"Winkler, D., Sep\u00falveda, D., Cupelli, M., Olexa, R., Sep\u00falveda, J.: Quantum secure high performance automotive systems. In: 19$$^{th}$$ escar Europe : The World\u2019s Leading Automotive Cyber Security Conference (Konferenzver\u00f6ffentlichung) (2021). https:\/\/doi.org\/10.13154\/294-8352","DOI":"10.13154\/294-8352"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:37:52Z","timestamp":1751567872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_30","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}