{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:52:13Z","timestamp":1778082733766,"version":"3.51.4"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T00:00:00Z","timestamp":1749945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T00:00:00Z","timestamp":1749945600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T00:00:00Z","timestamp":1749945600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2701601"],"award-info":[{"award-number":["2022YFB2701601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Collaborative Innovation Fund","award":["XTCX-KJ-2023- 54"],"award-info":[{"award-number":["XTCX-KJ-2023- 54"]}]},{"name":"Special Fund for Key Technologies in Blockchain of Shanghai Scientific and Technological Committee","award":["23511100300"],"award-info":[{"award-number":["23511100300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,6,15]]},"DOI":"10.1109\/jiot.2025.3555027","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:48:25Z","timestamp":1743029305000},"page":"18708-18717","source":"Crossref","is-referenced-by-count":3,"title":["Efficient NTTRU TLS 1.3 for IoT Devices"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6744-5186","authenticated-orcid":false,"given":"Zhuo","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9418-3483","authenticated-orcid":false,"given":"Zhenyu","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-8228","authenticated-orcid":false,"given":"Jieyu","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2623-9170","authenticated-orcid":false,"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icpads60453.2023.00383"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8413"},{"key":"ref4","first-page":"1","article-title":"IEEE P1363 standard specifications for public-key cryptography","volume-title":"Proc. IEEE NIST Key Manag. Workshop CTO Phoenix Technol. Treas.","author":"Jablon"},{"key":"ref5","volume-title":"Security Innovation\u2019s NTRUEncrypt Adopted as X9 Standard for Data Protection","author":"Wire","year":"2011"},{"key":"ref6","volume-title":"OpenSSH release notes.","year":"2022"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2019.i3.180-201"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72565-9_12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref11","volume-title":"Hybrid key exchange in TLS 1.3","year":"2024"},{"key":"ref12","volume-title":"Hybrid Post-Quantum TLS 1.2 and 1.3 With AWS KMS","year":"2024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"ref14","article-title":"Algorithmic views of vectorized polynomial multipliers for NTRU and NTRU Prime (Long Paper)","author":"Chen","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.614-636"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref20","volume-title":"Asimd Vector Instructions","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref23","volume-title":"NTTRU: Truly fast NTRU using NTT.","author":"Lyubashevsky","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.221-244"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56235-8_9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54773-7_2"},{"key":"ref27","first-page":"845","article-title":"OpenSSLNTRU: Faster post-quantum TLS key exchange","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Bernstein"},{"key":"ref28","volume-title":"OpenSSL: The open source toolkit for SSL\/TLS.","year":"2024"},{"key":"ref29","volume-title":"Ntru Prime 20171130: First Round: PQC Project Submission Document","author":"Bernstein","year":"2017"},{"key":"ref30","volume-title":"CRYSTALS-Kyber Algorithm Specifications and Supporting Documentation: PQC Round","author":"Avanzi","year":"2019"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11031138\/10938997.pdf?arnumber=10938997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:00:10Z","timestamp":1775851210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10938997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,15]]},"references-count":30,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3555027","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,15]]}}}