{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:07:35Z","timestamp":1764842855540},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,17]]},"DOI":"10.1109\/ants59832.2023.10469296","type":"proceedings-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T19:04:37Z","timestamp":1711393477000},"page":"756-761","source":"Crossref","is-referenced-by-count":3,"title":["A Post-Quantum End-to-End Encryption Protocol"],"prefix":"10.1109","author":[{"given":"Shashvat","family":"Sharma","sequence":"first","affiliation":[{"name":"Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India"}]},{"given":"Meenakshi","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Malaviya National Institute of Technology (MNIT),Department Of Computer Science and Engineering,Jaipur,India"}]},{"given":"Harish Kumar","family":"Sahu","sequence":"additional","affiliation":[{"name":"Defence Research and Development Organisation (DRDO),Scientific Analysis Group (SAG),Delhi,India"}]},{"given":"Ashish","family":"Karan","sequence":"additional","affiliation":[{"name":"Indian Air Force (IAF),India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45982-0_22"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1994.365700"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2018.090354"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"volume-title":"Post-Quantum Cryptography","year":"2009","author":"Daniel","key":"ref6"},{"article-title":"Cost analysis of hash collisions: Will quantum computers make sharcs obsolete?","year":"2009","author":"Bernstein","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/367701.367709"},{"key":"ref9","article-title":"Quantum safe cryptography and security: An introduction, benefits, enablers and challengers","volume-title":"ETSI (European Telecommunications Standards Institute), Tech. Rep.","author":"Campagna","year":"2015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0054319"},{"article-title":"Submission requirements and evaluation criteria for the post-quantum cryptography standardization process","volume-title":"Tech. Rep.","year":"2016","key":"ref11"},{"key":"ref12","article-title":"Nistir 8105 - report on post-quantum cryptography","volume-title":"Tech. Rep.","author":"Lily","year":"2016"},{"key":"ref13","article-title":"Nist special publication 800-57 part 1 revision 5 - recommendation for key management","volume-title":"Tech. Rep.","author":"Barker","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00032"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref17","first-page":"11","article-title":"The x3dh key agreement protocol","volume-title":"Tech. Rep. Revision 1, 2016-11-04","author":"Moxie","year":"2016"},{"key":"ref18","first-page":"35","article-title":"The double ratchet algorithm","volume-title":"Tech. Rep. Revision 1, 2016-11-20","author":"Moxie","year":"2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"}],"event":{"name":"2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","start":{"date-parts":[[2023,12,17]]},"location":"Jaipur, India","end":{"date-parts":[[2023,12,20]]}},"container-title":["2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10468574\/10468669\/10469296.pdf?arnumber=10469296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T21:53:16Z","timestamp":1711489996000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10469296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,17]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ants59832.2023.10469296","relation":{},"subject":[],"published":{"date-parts":[[2023,12,17]]}}}