{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:31:34Z","timestamp":1764570694257,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/isqed.2017.7918335","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T20:32:38Z","timestamp":1493929958000},"page":"319-324","source":"Crossref","is-referenced-by-count":30,"title":["Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things"],"prefix":"10.1109","author":[{"given":"Tim","family":"Guneysu","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Oder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"371","article-title":"Compact ring-LWE cryptoprocessor","volume":"8731","author":"roy","year":"2014","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2014-16th International Workshop Busan South Korea September 23&#x2013;26 2014 Proceedings ser Lecture Notes in Computer Science L Batina and M Robshaw Eds"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_33"},{"key":"ref12","first-page":"346","article-title":"High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers","volume":"9230","author":"p\u00f6 ppelmann","year":"2015","journal-title":"Progress in Cryptology-LATINCRYPT 2015-4th International Conference on Cryptology and Information Security in Latin America Guadalajara Mexico August 23&#x2013;26 2015 Proceedings ser Lecture Notes in Computer Science K E Lauter and F Rodr&#x00ED;guez-Henr&#x00ED;quez Eds"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref14","first-page":"230","article-title":"On ideal lattices and learning with errors over rings","volume":"2012","author":"lyubashevsky","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref17","first-page":"1","article-title":"BKZ 2.0: Better lattice security estimates","volume":"7073","author":"chen","year":"2011","journal-title":"Advances in Cryptology-ASIACRYPT 2011-17th International Conference on the Theory and Application of Cryptology and Information Security Seoul South Korea December 4&#x2013;8 2011 Proceedings ser Lecture Notes in Computer Science D H Lee and X Wang Eds"},{"key":"ref18","article-title":"U. of Waterloo. Dept. of Combinatorics, Optimization, and U. of Waterloo. Faculty of Mathematics","author":"solinas","year":"1999","journal-title":"Generalized Mersenne Numbers Faculty of Mathematics University of Waterloo"},{"key":"ref19","first-page":"866","article-title":"Compact hardware implementation of ring-LWE cryptosystems","volume":"2013","author":"roy","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","first-page":"360","article-title":"An identity based encryption scheme based on quadratic residues","volume":"2260","author":"cocks","year":"2001","journal-title":"Cryptography and Coding 8th IMA International Conference Cirencester UK December 17&#x2013;19 2001 Proceedings"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","article-title":"Efficient selective-ID secure identity-based encryption without random oracles","volume":"3027","author":"boneh","year":"2004","journal-title":"Advances in Cryptology-EURO-CRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques Interlaken Switzerland May 2&#x2013;6 2004 Proceedings"},{"key":"ref6","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","volume":"6110","author":"lyubashevsky","year":"2010","journal-title":"Advances in Cryptology-EURO-CRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Riviera May 30-June 3 2010 Proceedings ser Lecture Notes in Computer Science H Gilbert Ed"},{"key":"ref5","first-page":"22","article-title":"Efficient identity-based encryption over NTRU lattices","volume":"8874","author":"ducas","year":"2014","journal-title":"Advances in Cryptology-ASIACRYPT 2014-20th International Conference on the Theory and Application of Cryptology and Information Security Kaoshiung Taiwan R O C December 7-11 2014 Proceedings Part II ser Lecture Notes in Computer Science P Sarkar and T Iwata Eds"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_30"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-642-19074-2_21","article-title":"Better key sizes (and attacks) for LWE-based encryption","volume":"6558","author":"lindner","year":"2011","journal-title":"CT-RSA ser Lecture Notes in Computer Science A Kiayias Ed"},{"key":"ref2","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","volume":"1","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-CRYPTO 2001 21st Annual International Cryptology Conference Santa Barbara California USA August 19&#x2013;23 2001 Proceedings"},{"key":"ref1","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology Proceedings of CRYPTO &#x2018;84 Santa Barbara California USA August 19&#x2013;22 1984 Proceedings"},{"key":"ref9","first-page":"68","article-title":"Towards practical lattice-based public-key encryption on reconfigurable hardware","volume":"8282","author":"p\u00f6ppelmann","year":"2013","journal-title":"Selected Areas in Cryptography-SAC 2013-20th International Conference Burnaby BC Canada August 14-16 2013 Revised Selected Papers ser Lecture Notes in Computer Science T Lange K E Lauter and P Lisonek Eds"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865754"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.05.013"},{"key":"ref21","first-page":"725","article-title":"Efficient software implementation of ring-LWE encryption","volume":"2014","author":"de clercq","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506580"}],"event":{"name":"2017 18th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2017,3,14]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2017,3,15]]}},"container-title":["2017 18th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7910185\/7918273\/07918335.pdf?arnumber=7918335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T09:36:59Z","timestamp":1569231419000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7918335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isqed.2017.7918335","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}