{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:04:31Z","timestamp":1761581071583},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Emerg. Sel. Topics Circuits Syst."],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/jetcas.2013.2244772","type":"journal-article","created":{"date-parts":[[2013,3,7]],"date-time":"2013-03-07T20:26:29Z","timestamp":1362687989000},"page":"106-116","source":"Crossref","is-referenced-by-count":20,"title":["Securing M2M With Post-Quantum Public-Key Cryptography"],"prefix":"10.1109","volume":"3","author":[{"given":"Jie-Ren","family":"Shih","sequence":"first","affiliation":[]},{"given":"Yongbo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Ming-Chun","family":"Hsiao","sequence":"additional","affiliation":[]},{"given":"Ming-Shing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wen-Chung","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Bo-Yin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"An-Yeu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chen-Mou","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"o'rourke","year":"2002","journal-title":"Efficient NTRU Implementations"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2008.4580158"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/11496137_12","article-title":"Rainbow, a new multivariable polynomial signature scheme","author":"ding","year":"2005","journal-title":"Proc 3rd Int Conf Appl Cryptogr Netw Secur"},{"key":"ref13","first-page":"371","article-title":"TTS: High-speed signatures on a low-cost smart card","volume":"3156","author":"yang","year":"2004","journal-title":"Proc 6th Int Workshop Cryptogr Hardware Embed Syst"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/11734666_7","article-title":"Implementing minimized multivariate PKC on low-resource embedded systems","author":"yang","year":"2006","journal-title":"Proc 3rd Int Conf Security Pervasive Comput"},{"key":"ref15","first-page":"33","article-title":"SSE implementation of multivariate PKCs on modern <ref_formula><tex Notation=\"TeX\">$\\times$<\/tex><\/ref_formula>86 CPUs","author":"chen","year":"2009","journal-title":"Proc 11th Int Workshop Cryptogr Hardware Embed Syst"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2008.52"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1986.1057137"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625802"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387668"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"ref8","first-page":"262","article-title":"NTRU in constrained devices","author":"bailey","year":"2001","journal-title":"Proc 3rd Int Workshop Cryptogr Hardware Embed Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"NTRU: A ring-based public key cryptosystem","author":"hoffstein","year":"1998","journal-title":"Proc 3rd Int Symp Algor Number Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"ref22","first-page":"650","article-title":"Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm","volume":"4","author":"kwon","year":"2001","journal-title":"Proc 2001 IEEE Int Symp Circuits Syst"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MEMCOD.2004.1459818","article-title":"Bluespec system verilog: Efficient, correct RTL from high level specifications","author":"nikhil","year":"2004","journal-title":"Proc 2nd ACM IEEE Int Conf Formal Methods Models Co-Design"}],"container-title":["IEEE Journal on Emerging and Selected Topics in Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5503868\/6475966\/06472114.pdf?arnumber=6472114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:26:10Z","timestamp":1638217570000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6472114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":22,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jetcas.2013.2244772","relation":{},"ISSN":["2156-3357","2156-3365"],"issn-type":[{"value":"2156-3357","type":"print"},{"value":"2156-3365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}