{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T05:15:37Z","timestamp":1769318137599,"version":"3.49.0"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972294"],"award-info":[{"award-number":["61972294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932016"],"award-info":[{"award-number":["61932016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Provincial Key Laboratory of Data Security and Privacy Protection","award":["2017B030301004-11"],"award-info":[{"award-number":["2017B030301004-11"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2019,11,1]]},"DOI":"10.1109\/mitp.2019.2943136","type":"journal-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T22:41:03Z","timestamp":1573512063000},"page":"27-32","source":"Crossref","is-referenced-by-count":20,"title":["Isogeny-Based Cryptography: A Promising Post-Quantum Technique"],"prefix":"10.1109","volume":"21","author":[{"given":"Cong","family":"Peng","sequence":"first","affiliation":[{"name":"Peng Cheng LaboratoryWuhan University"}]},{"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[{"name":"Wuhan University"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of Kentucky"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Data Security and Privacy ProtectionWuhan University"}]}],"member":"263","reference":[{"key":"ref10","first-page":"759","article-title":"SeaSign: Compact isogeny signatures from class group actions","author":"de feo","year":"0","journal-title":"Proc Annu Int Conf Theory Appl Cryptographic Techn"},{"key":"ref11","article-title":"A note on post-quantum authenticated key exchange from supersingular isogenies","volume":"2018","author":"longa","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref12","article-title":"Modeling quantum-safe authenticated key establishment, and an isogeny-based protocol","volume":"2018","author":"legrow","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref13","article-title":"Authenticated key exchange for SIDH","volume":"2018","author":"galbraith","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref14","article-title":"Strongly secure authenticated key exchange from supersingular isogeny","volume":"2018","author":"xu","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref15","first-page":"177","article-title":"Supersingular isogeny Diffie&#x2013;Hellman authenticated key exchange","author":"fujioka","year":"2018","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/jmc-2012-0016","article-title":"Constructing elliptic curve isogenies in quantum subexponential time","volume":"8","author":"childs","year":"2014","journal-title":"J Math Cryptol"},{"key":"ref3","article-title":"Public-key cryptosystem based on isogenies","volume":"2006","author":"rostovtsev","year":"2006","journal-title":"IACR Cryptology ePrint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_9"},{"key":"ref7","first-page":"395","article-title":"CSIDH: An efficient post-quantum commutative group action","author":"castryck","year":"2018","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref2","article-title":"Mathematics of isogeny based cryptography","author":"de feo","year":"2017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref9","first-page":"3","article-title":"Identification protocols and signature schemes based on supersingular isogeny problems","author":"galbraith","year":"2017","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6294\/8896130\/08896171.pdf?arnumber=8896171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:41:30Z","timestamp":1657744890000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8896171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,1]]},"references-count":15,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2019.2943136","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"value":"1520-9202","type":"print"},{"value":"1941-045X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,1]]}}}