{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T10:54:30Z","timestamp":1778151270758,"version":"3.51.4"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,29]]},"DOI":"10.1109\/isdfs60797.2024.10527265","type":"proceedings-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T17:33:23Z","timestamp":1715794403000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Key Exchange with Diffie-Hellman Protocol and Composite Hash-Functions"],"prefix":"10.1109","author":[{"given":"Manuel Alejandro","family":"Cardona-L\u00f3pez","sequence":"first","affiliation":[{"name":"Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico"}]},{"given":"Juan Carlos","family":"Chimal-Egu\u00eda","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico"}]},{"given":"V\u00edctor Manuel","family":"Silva-Garc\u00eda","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico Nacional,Centro de Innovaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico en C&#x00F3;mputo,Mexico City,Mexico"}]},{"given":"Rolando","family":"Flores-Carapia","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico Nacional,Centro de Investigaci&#x00F3;n en Computaci&#x00F3;n,Mexico City,Mexico"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225288"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.97"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405472"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT55263.2022.9987069"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC49216.2019.8966440"},{"issue":"5s","key":"ref6","first-page":"353","article-title":"Diffie-hellman key exchange based on block matrices combined with elliptic curves","volume":"11","author":"Hadi","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IICETA50496.2020.9318804"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SASM51857.2021.9841171"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GUCON.2018.8674956"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MPCIT51588.2020.9350454"},{"key":"ref11","first-page":"447","article-title":"Efficient extended diffie-hellman key exchange protocol","volume-title":"2019 International Conference on Computing, Power and Communication Technologies (GUCON)","author":"Rawat"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5485276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11599371_13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3230096"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC53470.2022.9753711"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2016.7807936"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225559"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PCI60110.2023.10325995"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/e25071005"}],"event":{"name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","location":"San Antonio, TX, USA","start":{"date-parts":[[2024,4,29]]},"end":{"date-parts":[[2024,4,30]]}},"container-title":["2024 12th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10526462\/10526466\/10527265.pdf?arnumber=10527265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T05:02:39Z","timestamp":1715835759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10527265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isdfs60797.2024.10527265","relation":{},"subject":[],"published":{"date-parts":[[2024,4,29]]}}}