{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T08:25:10Z","timestamp":1769588710868,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9824629","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T15:32:34Z","timestamp":1658244754000},"page":"979-984","source":"Crossref","is-referenced-by-count":2,"title":["Proof-of-Concept of Network Key Management Using Lattice-Based Cryptography"],"prefix":"10.1109","author":[{"given":"Nathan","family":"Keyaerts","sequence":"first","affiliation":[{"name":"University of Mons,Polytechnic of Mons,Mons,Belgium"}]},{"given":"Teklay","family":"Gebremichael","sequence":"additional","affiliation":[{"name":"Information Systems and Technology Mittuniversitetet,Sundsvall,Sweden"}]},{"given":"Mikael","family":"Gidlund","sequence":"additional","affiliation":[{"name":"Information Systems and Technology Mittuniversitetet,Sundsvall,Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"ref11","first-page":"112","article-title":"Public-key cryptosystems from lattice reduction problems","author":"oded","year":"1997","journal-title":"CRYPTO'97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843.019"},{"key":"ref13","article-title":"GGH Cryptosystem and Lattice Reduction Algorithms","author":"tian","year":"2011","journal-title":"McMaster University"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_18"},{"key":"ref15","first-page":"2724","article-title":"A novel batch-based group key management protocol applied to the internet of things","author":"luca","year":"2013","journal-title":"Ad Hoc Networks"},{"key":"ref16","author":"afghan syeda","year":"2018","journal-title":"Towards the self-powered Internet of Things (IoT) by energy harvesting Trends and technologies for green IoT"},{"key":"ref17","first-page":"57","article-title":"Create Your Own Internet of Things: A survey of IoT platforms","author":"kiran jot","year":"2017","journal-title":"IEEE Consumer Electronics Magazine 6 2"},{"key":"ref18","article-title":"Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network","volume":"1","author":"arslan","year":"2020","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"ref19","author":"zhaofei","year":"2011","journal-title":"GGH Cryptosystem and Lattice Reduction Algorithms Diss"},{"key":"ref4","first-page":"637","article-title":"Edge computing: Vision and challenges","volume":"5","author":"wei song","year":"2016","journal-title":"IEEE Internet of Things Journal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.26421\/QIC3.4-3"},{"key":"ref6","first-page":"31","author":"nico","year":"2018","journal-title":"Lightweight group-key establishment protocol for IoT devices Implementation and performance Analyses"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878707"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref7","author":"teklay","year":"2019","journal-title":"Lightweight Cryptographic Group Key Manage-ment Protocols for the Internet of Things"},{"key":"ref2","first-page":"1484","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"26","author":"rivest","year":"1977","journal-title":"SIAM Journal on Computing"},{"key":"ref1","article-title":"How Sony Sped Up A Factory With These Tiny, $35 Computers","author":"parmy","year":"2019","journal-title":"Forbes Forbes Magazine"},{"key":"ref9","volume":"10","author":"chris","year":"2016","journal-title":"A Decade of Lattice Cryptography"},{"key":"ref20","article-title":"Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device","author":"jon","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_11"},{"key":"ref21","article-title":"Internet of things: A survey on enabling technologies, protocols, and applications","author":"ala","year":"2015","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref23","article-title":"A practical algorithm for com-pleting half-Hadamard matrices using LLL","author":"assaf","year":"2022","journal-title":"Journal of Algebraic Combinatorics"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","location":"Dubrovnik, Croatia","start":{"date-parts":[[2022,5,30]]},"end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09824629.pdf?arnumber=9824629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T16:00:13Z","timestamp":1659974413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9824629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9824629","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}