{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:45:43Z","timestamp":1730209543886,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T00:00:00Z","timestamp":1655337600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,16]]},"DOI":"10.1109\/comm54429.2022.9817281","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:41:28Z","timestamp":1657741288000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Comparative Performance Evaluation of Key Exchange Protocols"],"prefix":"10.1109","author":[{"given":"Octavian","family":"Catrina","sequence":"first","affiliation":[{"name":"Politehnica University of Bucharest,Bucharest,Romania"}]},{"given":"Silvia-Ioana","family":"Stanciu","sequence":"additional","affiliation":[{"name":"Politehnica University of Bucharest,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref10","article-title":"RFC 7919. Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)","author":"gillmor","year":"2016","journal-title":"IETF"},{"key":"ref11","article-title":"RFC 7748. Elliptic Curves for Security","author":"langley","year":"2016","journal-title":"IETF"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_14"},{"journal-title":"Ed448-goldilocks a new elliptic curve","year":"2015","author":"hamburg","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref15","article-title":"RFC 8032. Edwards-Curve Digital Signature Algorithm (EdDSA)","author":"josefsson","year":"2017","journal-title":"IETF"},{"year":"2015","key":"ref16"},{"journal-title":"NIST","article-title":"FIPS PUB 198-1. The Keyed-Hash Message Authentication Code (HMAC)","year":"2008","key":"ref17"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-58146-9","author":"boyd","year":"2020","journal-title":"Protocols for Authentication and Key Establishment"},{"key":"ref3","article-title":"RFC 7296. Internet Key Exchange Protocol Version 2 (IKEv2)","author":"kaufman","year":"2014","journal-title":"IETF"},{"journal-title":"Introduction to Modern Cryptography","year":"2008","author":"katz","key":"ref6"},{"key":"ref5","first-page":"400","article-title":"SIGMA: The &#x2018;SIGn-and-MAc&#x2019; approach to authenticated Diffie- Hellman and its use in the IKE protocols","volume":"2729","author":"krawczyk","year":"2003","journal-title":"Advances in Cryptology - CRYPTO'98 Ser Lecture Notes in Computer Science"},{"key":"ref8","article-title":"NIST Special Publication 800-57 Part 1 (Rev. 5). Recom-mendation for Key Management: Part 1 - General","author":"barker","year":"2020","journal-title":"NIST"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"ref2","article-title":"RFC 8446. The Transport Layer Security (TLS) Protocol Version 1.3","author":"rescorla","year":"2018","journal-title":"IETF"},{"key":"ref1","article-title":"RFC 4303. IP Encapsulating Security Payload (ESP)","author":"kent","year":"2015","journal-title":"IETF"},{"year":"2013","key":"ref9"}],"event":{"name":"2022 14th International Conference on Communications (COMM)","start":{"date-parts":[[2022,6,16]]},"location":"Bucharest, Romania","end":{"date-parts":[[2022,6,18]]}},"container-title":["2022 14th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817096\/9817149\/09817281.pdf?arnumber=9817281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:42:19Z","timestamp":1659660139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,16]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/comm54429.2022.9817281","relation":{},"subject":[],"published":{"date-parts":[[2022,6,16]]}}}