{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:17:25Z","timestamp":1740133045859,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"NATO Science for Peace and Security Programme","award":["G5797"],"award-info":[{"award-number":["G5797"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/lcomm.2023.3275647","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T17:42:30Z","timestamp":1683913350000},"page":"1694-1698","source":"Crossref","is-referenced-by-count":3,"title":["Bit Security Estimation for Leakage-Prone Key Establishment Schemes"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7453-4019","authenticated-orcid":false,"given":"Marcus","family":"de Ree","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8074-0417","authenticated-orcid":false,"given":"Georgios","family":"Mantas","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9829-0955","authenticated-orcid":false,"given":"Jonathan","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800455"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref23","first-page":"62","article-title":"Guesswork and variation distance as measures of cipher security","author":"pliam","year":"1999","journal-title":"Proc Int Workshop Sel Areas Cryptogr (SAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2974621"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1994.394764"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"journal-title":"Entropy measures and unconditional security in cryptography","year":"1997","author":"cachin","key":"ref22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1995.550316"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511977985"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914359"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7390857"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001722"},{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2543687"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2618725"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"journal-title":"6g white paper Research challenges for trust security and privacy","year":"2020","author":"ylianttila","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/10178697\/10124043.pdf?arnumber=10124043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:14:07Z","timestamp":1690913647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10124043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":23,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2023.3275647","relation":{},"ISSN":["1089-7798","1558-2558","2373-7891"],"issn-type":[{"type":"print","value":"1089-7798"},{"type":"electronic","value":"1558-2558"},{"type":"electronic","value":"2373-7891"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}