{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:31:48Z","timestamp":1740115908622,"version":"3.37.3"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1109\/sin63213.2024.10871762","type":"proceedings-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T18:33:17Z","timestamp":1739471597000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Dilithium-Based Verifiable Timed Signature Scheme"],"prefix":"10.1109","author":[{"given":"Erkan","family":"Uslu","sequence":"first","affiliation":[{"name":"ASELSAN Inc."}]},{"given":"Oguz","family":"Yayla","sequence":"additional","affiliation":[{"name":"Institute of Applied Mathematics, Middle East Technical University,Ankara,TURKEY"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417263"},{"volume-title":"Time-lock puzzles and timed-release crypto","year":"1996","author":"Rivest","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref7","article-title":"Crystals-dilithium","author":"Lyubashevsky","year":"2021","journal-title":"Algorithm Specifications and Supporting Documentation (Version 3.1)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.204.ipd"},{"volume-title":"Sha-3 standard: Permutation-based hash and extendable-output functions","year":"2015","author":"Dworkin","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27712-7"},{"key":"ref13","first-page":"620","article-title":"Homomorphic time-lock puz-zles and applications","volume-title":"Annual International Cryptology Conference","author":"Malavolta","year":"2019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/0220068"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/SIN63213.2024.10871762","article-title":"Dilithium-based verifiable timed signature scheme","volume-title":"Cryptology ePrint Archive, Paper 202411262","author":"Uslu","year":"2024"}],"event":{"name":"2024 17th International Conference on Security of Information and Networks (SIN)","start":{"date-parts":[[2024,12,2]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,12,4]]}},"container-title":["2024 17th International Conference on Security of Information and Networks (SIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10871205\/10871241\/10871762.pdf?arnumber=10871762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:48:48Z","timestamp":1740080928000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10871762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/sin63213.2024.10871762","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]}}}