{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:42:29Z","timestamp":1730248949558,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1109\/icl-gnss54081.2022.9797034","type":"proceedings-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T15:48:29Z","timestamp":1655826509000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS"],"prefix":"10.1109","author":[{"given":"Maki","family":"Yoshida","sequence":"first","affiliation":[{"name":"NICT,Tokyo,Japan"}]},{"given":"Sumio","family":"Morioka","sequence":"additional","affiliation":[{"name":"Interstellar Technologies Inc.,Hokkaido,Japan"}]},{"given":"Satoshi","family":"Obana","sequence":"additional","affiliation":[{"name":"Hosei University,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref10","first-page":"65","article-title":"A Simple and Key-Economical Unconditional Authenti-cation Scheme","volume":"2","author":"den boer","year":"1993","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/s21020467"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SECPRI.2000.848446"},{"year":"2016","journal-title":"International Civil Aviation Organisation","article-title":"International Standards and Recommended Practices - Annex 10 - Aeronautical Telecommunications - Vol 1 - Radio Navigation Aids","key":"ref13"},{"year":"2008","journal-title":"DoD U S","article-title":"Global Positioning System Standard Positioning Service Performance Standard","key":"ref14"},{"year":"2012","journal-title":"NIST","article-title":"FIPS PUB 180&#x2013;4: Secure Hash Standard (SHS)","key":"ref15"},{"year":"2015","journal-title":"NIST","article-title":"FIPS PUB 202: SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/73007.73014"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/3-540-46035-7_4"},{"year":"0","journal-title":"buybitcoinworldwide com 2022","key":"ref19"},{"year":"2018","journal-title":"European Commission","article-title":"Galileo Navigation Message Authentication Specification for Signal-in-Space Testing - v1.1","key":"ref4"},{"year":"2018","journal-title":"European Commission","article-title":"Commission Implementing Decision (EU) 2018\/321 of 2 March 2018 amending Implementing Decision (EU) 2017\/224 (CS Implemeting Act)","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.33012\/2021.17966"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TAES.2021.3053129"},{"year":"2008","journal-title":"NIST","article-title":"FIPS PUB 198&#x2013;1: The Keyed-Hash Message Authentication Code (HMAC)","key":"ref8"},{"year":"2011","journal-title":"ISO","article-title":"ISO\/IEC 9797&#x2013;1:2011: Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms Using a Block Cipher","key":"ref7"},{"year":"2017","journal-title":"European Commission","article-title":"Commission Implementing Decision (EU) 2017\/224 of 8 February 2017 (CS Implemeting Act)","key":"ref2"},{"year":"2021","journal-title":"European Union Agency for the Space Programme","article-title":"Galileo Open Service Navigation Message Authenti-cation (OSNMA) Info Note","key":"ref1"},{"year":"2004","journal-title":"NIST","article-title":"NIST Special Publication 800&#x2013;38B: Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication","key":"ref9"},{"year":"2021","journal-title":"European Union","article-title":"OSSISICD: Open Service Signal In Space Interface Control Document","key":"ref20"}],"event":{"name":"2022 International Conference on Localization and GNSS (ICL-GNSS)","start":{"date-parts":[[2022,6,7]]},"location":"Tampere, Finland","end":{"date-parts":[[2022,6,9]]}},"container-title":["2022 International Conference on Localization and GNSS (ICL-GNSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9797013\/9797014\/09797034.pdf?arnumber=9797034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T16:03:23Z","timestamp":1657555403000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9797034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icl-gnss54081.2022.9797034","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]}}}