{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T08:44:41Z","timestamp":1769589881029,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1109\/wf-iot54382.2022.10152075","type":"proceedings-article","created":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T23:49:29Z","timestamp":1687564169000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Applied Post-Quantum Secure Method for IoT Devices: A Case Study for Autonomous Vehicles Communication"],"prefix":"10.1109","author":[{"given":"Gabriel Rossi","family":"Figlarz","sequence":"first","affiliation":[{"name":"School of Technology, Pontif&#x00ED;cia Universidade Cat&#x00F3;lica do Rio Grande do Sul, PUCRS,Porto Alegre,Brazil"}]},{"given":"Fabiano Passuelo","family":"Hessel","sequence":"additional","affiliation":[{"name":"School of Technology, Pontif&#x00ED;cia Universidade Cat&#x00F3;lica do Rio Grande do Sul, PUCRS,Porto Alegre,Brazil"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2018.10.103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2017.7972217"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0046"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1666-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2100060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICT49546.2020.9239560"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ET2ECN.2014.7044953"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SYSMART.2016.7894533"},{"key":"ref9","volume-title":"Learn quantum computing: a field guide","year":"2021"},{"key":"ref10","volume-title":"Qiskit. Representing qubit states","year":"2021"},{"key":"ref11","article-title":"Active implementation of end-to-end post-quantum encryption","author":"Tutoveanu","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref13","volume-title":"National Institute of Standards and Technology. Status report on the second round of the nist post-quantum cryptography standardization process","year":"2020"},{"key":"ref14","article-title":"Lattice based cryptography for beginners","author":"Chi","year":"2015","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927079"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36563-X_9"},{"key":"ref17","volume-title":"An introduction to mathematical cryptography","volume":"1","author":"Hoffstein","year":"2008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref19","first-page":"906","article-title":"Understanding the ntru cryptosystem","author":"Clark","year":"2019","journal-title":"Honors College, Honors Research Projects"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3162254"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.016"},{"key":"ref22","volume-title":"Ntru python library with application to encrypted domain","author":"Khan","year":"2015"},{"key":"ref23","volume-title":"What is ntru and why do we like it so much?","author":"Eichinger","year":"2019"},{"key":"ref24","article-title":"Ntru algorithm specifications and supporting documentation","volume-title":"Second PQC Standardization Conference","author":"Chen"}],"event":{"name":"2022 IEEE 8th World Forum on Internet of Things (WF-IoT)","location":"Yokohama, Japan","start":{"date-parts":[[2022,10,26]]},"end":{"date-parts":[[2022,11,11]]}},"container-title":["2022 IEEE 8th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10151825\/10152024\/10152075.pdf?arnumber=10152075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T10:23:02Z","timestamp":1709288582000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10152075\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wf-iot54382.2022.10152075","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]}}}