{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:26:07Z","timestamp":1766298367581,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/mesa61532.2024.10704874","type":"proceedings-article","created":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T17:45:08Z","timestamp":1728495908000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Quantum Cryptography for Secure Communications in Industrial Mechatronics and Embedded Systems"],"prefix":"10.1109","author":[{"given":"Sudhanshu","family":"Maurya","sequence":"first","affiliation":[{"name":"Indian Institute of Technology (IIT),Centre of Artificial Intelligence &#x0026; Robotics,Mandi,India"}]},{"given":"Shreyas","family":"Kasture","sequence":"additional","affiliation":[{"name":"Nagpur Campus, Symbiosis International (Deemed University),Symbiosis Institute of Technology,Pune,India"}]},{"given":"Amit","family":"Shukla","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (IIT),Centre of Artificial Intelligence &#x0026; Robotics,Mandi,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/dsn53405.2022.00025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/pst.2015.7232966"},{"key":"ref4","article-title":"Race to the bottom: embedded control systems binary security: an industrial control system protection approach","volume-title":"Phd Thesis 1 (Research TU\/e \/ Graduation TU\/e), Mathematics and Computer Science","author":"Abbasi","year":"2018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app12073584"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/secdev45635.2020.00017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/hase.2000.895448"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/quantum2010007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/computers7020031"},{"key":"ref10","article-title":"Compatibility between design of mechatronic systems for critical infrastructure security and technological readiness levels \u2013 STUME Journals","author":"Panevski","year":"2020","journal-title":"Compatibility Between Design of Mechatronic Systems for Critical Infrastructure Security and Technological Readiness Levels \u2013 STUME Journals"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/wf-iot.2019.8767183"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.29007\/h4rv"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tase.2021.3106335"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/iccd46524.2019.00035"},{"key":"ref15","first-page":"1","article-title":"Emerging (un-)reliability based security threats and mitigations for embedded systems: special session","volume-title":"Proceedings of the 2017 International Conference on Compilers, Architectures and Synthesis for Embedded Systems Companion (CASES 17)","author":"Amrouch"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.328-356"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/qute.202100116"},{"key":"ref18","first-page":"4","article-title":"He gives C-sieves on the CSIDH","volume-title":"Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings","author":"Peikert"},{"key":"ref19","first-page":"141","article-title":"Review on Cryptography Using Quantum Computing","volume-title":"International Journal for Modern Trends in Science and Technology","volume":"8","author":"Pathare","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FPL57034.2022.00076"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIIME59043.2023.00019"}],"event":{"name":"2024 20th IEEE\/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)","start":{"date-parts":[[2024,9,2]]},"location":"Genova, Italy","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 20th IEEE\/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10704794\/10704793\/10704874.pdf?arnumber=10704874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:39:32Z","timestamp":1728560372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10704874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/mesa61532.2024.10704874","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}