{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:02Z","timestamp":1772906342549,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902392"],"award-info":[{"award-number":["61902392"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-AFSG Research Fund","award":["CCF-AFSG RF20230206"],"award-info":[{"award-number":["CCF-AFSG RF20230206"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tii.2025.3528582","type":"journal-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:11:04Z","timestamp":1738005064000},"page":"3504-3514","source":"Crossref","is-referenced-by-count":6,"title":["HTM-PQC: Hardening Cryptography Keys Under the Trend of Post-Quantum Cryptography Migration on Industrial Internet"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6130-3668","authenticated-orcid":false,"given":"Lingjia","family":"Meng","sequence":"first","affiliation":[{"name":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9895-3816","authenticated-orcid":false,"given":"Yu","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0490-2485","authenticated-orcid":false,"given":"Fangyu","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cryptology, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7568-289X","authenticated-orcid":false,"given":"Mingyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Dalian Maritime University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5697-7740","authenticated-orcid":false,"given":"Ziqiang","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Ningxia University, Yinchuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1693-3000","authenticated-orcid":false,"given":"Jiankuo","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1508-4879","authenticated-orcid":false,"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103593"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"ref4","article-title":"Migrating software systems towards post-quantum-cryptographyA systematic literature review","author":"Nther","year":"2024","journal-title":"arXiv:2404.12854"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327400"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3560834.3563831"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40003-2_24"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72725-3_5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41181-6_26"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3355222"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.173-213"},{"key":"ref12","article-title":"A survey on security and cryptographic perspective of industrial-internet-of-things","volume":"25","author":"Mishra","year":"2023","journal-title":"Internet Things"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_17"},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3587037","article-title":"A configurable CRYSTALS-Kyber hardware implementation with side-channel protection","volume":"23","author":"Jati","year":"2024","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"ref15","article-title":"On protecting SPHINCS against fault attacks","author":"Gent","year":"2023","journal-title":"Cryptology ePrint Arch."},{"key":"ref16","first-page":"217","article-title":"Strong and efficient cache side-channel protection using hardware transactional memory","volume-title":"Proc. 26th USENIX Secur. Symp. Secur. 17","author":"Gruss","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2897666"},{"key":"ref18","first-page":"288","article-title":"Protecting private keys of Dilithium using hardware transactional memory","volume-title":"Proc. Int. Conf. Inf. Secur.","author":"Meng","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3497776.3517778"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2023.105112"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref22","article-title":"Profiling side-channel attacks on Dilithium: A small bit-fiddling leak breaks it all","author":"Marzougui","year":"2022","journal-title":"Cryptology ePrint Arch."},{"key":"ref23","article-title":"A practical template attack on CRYSTALS-Dilithium","author":"Berzati","year":"2023","journal-title":"Cryptology ePrint Arch."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8391"},{"issue":"1","key":"ref26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s42400-022-00117-w","article-title":"Hash-based signature revisited","volume":"5","author":"Li","year":"2022","journal-title":"Cybersecurity"},{"key":"ref27","first-page":"299","article-title":"Oops, i did it againsecurity of one-time signatures under two-message attacks","volume-title":"Proc. Int. Conf. Sel. Areas Cryptogr.","author":"Groot Bruinderink","year":"2017"},{"key":"ref28","article-title":"TRESOR runs encryption securely outside RAM","volume-title":"Proc. 20th USENIX Secur. Symp. Secur.","author":"Mller","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3603170"},{"issue":"2","key":"ref30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3567426","article-title":"Agile acceleration of stateful hash-based signatures in hardware","volume":"23","author":"Thoma","year":"2024","journal-title":"ACM Trans. Embedded Comput. Syst."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833713"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i3.136-163"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE58400.2024.10546550"},{"key":"ref34","first-page":"97","article-title":"Investigating transactional memory for high performance embedded systems","volume-title":"Proc. Architecture Comput. Syst.: 33rd Int. Conf.","author":"Piatka","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.40"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2947124"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833768"},{"key":"ref38","article-title":"A side-channel secure signature scheme","author":"Del Pino","year":"2023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58723-8_8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9424\/10949153\/10854988.pdf?arnumber=10854988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T22:24:51Z","timestamp":1744064691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10854988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":40,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tii.2025.3528582","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}