{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:27:50Z","timestamp":1775737670329,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176324","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"84-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities"],"prefix":"10.1145","author":[{"given":"Xiruo","family":"Liu","sequence":"first","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Rafael","family":"Misoczki","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]},{"given":"Manoj R.","family":"Sastry","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_3"},{"key":"e_1_3_2_1_2_1","unstructured":"R. Alleaume. 2007. SECOQC White Paper on Quantum Key Distribution and Cryptography. (2007). R. Alleaume. 2007. SECOQC White Paper on Quantum Key Distribution and Cryptography. (2007)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860482"},{"key":"e_1_3_2_1_4_1","volume-title":"Hash-Based TPM Signatures for the Quantum World International Conference on Applied Cryptography and Network Security. Springer, 77--94","author":"Ando Megumi","year":"2016"},{"key":"e_1_3_2_1_5_1","unstructured":"Arduino. {n. d.}. Arduino 101. (.{n. d.}). deftempurl%https:\/\/www.arduino.cc tempurl accessed 2018-01-03. Arduino. {n. d.}. Arduino 101. (.{n. d.}). deftempurl%https:\/\/www.arduino.cc tempurl accessed 2018-01-03."},{"key":"e_1_3_2_1_6_1","unstructured":"Arduino and ATMEL. {n. d.}. Arduino WiFi 101 Shield. (.{n. d.}). https:\/\/www.arduino.cc\/en\/Main\/ArduinoWiFiShield101 tempurl accessed 2017-09--12. Arduino and ATMEL. {n. d.}. Arduino WiFi 101 Shield. (.{n. d.}). https:\/\/www.arduino.cc\/en\/Main\/ArduinoWiFiShield101 tempurl accessed 2017-09--12."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516650"},{"key":"e_1_3_2_1_8_1","unstructured":"Paulo S. L. M. Barreto Patrick Longa Michael Naehrig Jefferson E. Ricardini and Gustavo Zanon. 2016. Sharper Ring-LWE Signatures. IACR Cryptology ePrint Archive (2016) 1026. Paulo S. L. M. Barreto Patrick Longa Michael Naehrig Jefferson E. Ricardini and Gustavo Zanon. 2016. Sharper Ring-LWE Signatures. IACR Cryptology ePrint Archive (2016) 1026."},{"key":"e_1_3_2_1_9_1","volume-title":"Quantum Cryptography: Public Key Distribution and Coin Tossing Proceedings of IEEE International Conference on Communication Systems and Signal Processing","author":"Bennett C. H."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein Johannes Buchmann and Erik Dahmen. 2009. Post-Quantum Cryptography. Springer-Verlag. Daniel J. Bernstein Johannes Buchmann and Erik Dahmen. 2009. Post-Quantum Cryptography. Springer-Verlag.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.71"},{"key":"e_1_3_2_1_12_1","unstructured":"SIG Bluetooth. 2010. Bluetooth Core Specification version 4.0. Specification of the Bluetooth System (2010). SIG Bluetooth. 2010. Bluetooth Core Specification version 4.0. Specification of the Bluetooth System (2010)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898083"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Bernard Candaele Dimitrios Soudris and Iraklis Anagnostopoulos. 2015. Trusted Computing for Embedded Systems. Springer. Bernard Candaele Dimitrios Soudris and Iraklis Anagnostopoulos. 2015. Trusted Computing for Embedded Systems. Springer.","DOI":"10.1007\/978-3-319-09420-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"L\u00e9o Ducas Alain Durmus Tancr\u00e8de Lepoint and Vadim Lyubashevsky. 2013. Lattice Signatures and Bimodal Gaussians. Springer Berlin Heidelberg 40--56. L\u00e9o Ducas Alain Durmus Tancr\u00e8de Lepoint and Vadim Lyubashevsky. 2013. Lattice Signatures and Bimodal Gaussians. Springer Berlin Heidelberg 40--56.","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_1_20_1","unstructured":"C. Elliott A. Colvin D. Pearson O. Pikalo J. Schlafer and H. Yeh. 2005. Current status of the DARPA Quantum Network. (2005). https:\/\/arxiv.org\/ftp\/quant-ph\/papers\/0503\/0503058.pdf tempurl accessed 2018-01-03. C. Elliott A. Colvin D. Pearson O. Pikalo J. Schlafer and H. Yeh. 2005. Current status of the DARPA Quantum Network. (2005). https:\/\/arxiv.org\/ftp\/quant-ph\/papers\/0503\/0503058.pdf tempurl accessed 2018-01-03."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Matthieu Finiasz. 2011. Parallel-CFS. Springer Berlin Heidelberg 159--170. Matthieu Finiasz. 2011. Parallel-CFS. Springer Berlin Heidelberg 159--170.","DOI":"10.1007\/978-3-642-19574-7_11"},{"key":"e_1_3_2_1_22_1","unstructured":"Trusted Computing Group. 2011. TPM Main Specification. (2011). https:\/\/trustedcomputinggroup.org\/tpm-main-specification tempurl accessed 2018-01-03. Trusted Computing Group. 2011. TPM Main Specification. (2011). https:\/\/trustedcomputinggroup.org\/tpm-main-specification tempurl accessed 2018-01-03."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Andreas H\u00fclsing. 2013. W-OTS -- Shorter Signatures for Hash-Based Signature Schemes. Springer Berlin Heidelberg 173--188. Andreas H\u00fclsing. 2013. W-OTS -- Shorter Signatures for Hash-Based Signature Schemes. Springer Berlin Heidelberg 173--188.","DOI":"10.1007\/978-3-642-38553-7_10"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Chongkyung Kil Emre C Sezer Ahmed M Azab Peng Ning and Xiaolan Zhang. 2009. Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence IEEE International Conference on Dependable Systems & Networks. 115--124. Chongkyung Kil Emre C Sezer Ahmed M Azab Peng Ning and Xiaolan Zhang. 2009. Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence IEEE International Conference on Dependable Systems & Networks. 115--124.","DOI":"10.1109\/DSN.2009.5270348"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_27_1","unstructured":"Tom Lawton. 2014. Meter Operations in A Post AMI World. (2014). Tom Lawton. 2014. Meter Operations in A Post AMI World. (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046711"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"David McGrew Panos Kampanakis Scott Fluhrer Stefan-Lukas Gazdag Denis Butin and Johannes Buchmann. 2016. State Management for Hash-Based Signatures. Springer International Publishing 244--260. David McGrew Panos Kampanakis Scott Fluhrer Stefan-Lukas Gazdag Denis Butin and Johannes Buchmann. 2016. State Management for Hash-Based Signatures. Springer International Publishing 244--260.","DOI":"10.1007\/978-3-319-49100-4_11"},{"key":"e_1_3_2_1_33_1","unstructured":"Ralph C. Merkle. 1979. Secrecy Authentication and Public Key Systems. Ph.D. Dissertation. Stanford. Ralph C. Merkle. 1979. Secrecy Authentication and Public Key Systems. Ph.D. Dissertation. Stanford."},{"key":"e_1_3_2_1_34_1","volume-title":"Advances in Cryptology","author":"Miller V. S."},{"key":"e_1_3_2_1_35_1","unstructured":"National Institute of Standards and Technology. {n. d.}. Post-quantum Crypto Project. (. {n. d.}). http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/tempurl accessed 2017-09-12. National Institute of Standards and Technology. {n. d.}. Post-quantum Crypto Project. (. {n. d.}). http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/tempurl accessed 2017-09-12."},{"key":"e_1_3_2_1_36_1","unstructured":"National Institute of Standards and Technology. 2012. FIPS 180-4 - Secure Hash Standard (SHS). (2012). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf tempurl accessed 2018-01-03. National Institute of Standards and Technology. 2012. FIPS 180-4 - Secure Hash Standard (SHS). (2012). http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf tempurl accessed 2018-01-03."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_24"},{"key":"e_1_3_2_1_38_1","unstructured":"Global Platform. 2011. The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market. White Paper (February. 2011). Global Platform. 2011. The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market. White Paper (February. 2011)."},{"key":"e_1_3_2_1_39_1","unstructured":"European Comission CORDIS Community Research and Development Information Service. {n. d.}. PQCrypto Project. (. {n. d.}). deftempurl%http:\/\/cordis.europa.eu\/project\/rcn\/194347_en.html tempurl accessed 2017-09-12. European Comission CORDIS Community Research and Development Information Service. {n. d.}. PQCrypto Project. (. {n. d.}). deftempurl%http:\/\/cordis.europa.eu\/project\/rcn\/194347_en.html tempurl accessed 2017-09-12."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Security Symposium. 175--188","author":"Santos Nuno","year":"2012"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69170-9_25"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161306"},{"key":"e_1_3_2_1_44_1","volume-title":"SWATT: SoftWare-based ATTestation for Embedded Devices IEEE Symposium on Security and Privacy. 272--282","author":"Seshadri Arvind","year":"2004"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_3"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2069087.2069090"},{"key":"e_1_3_2_1_48_1","unstructured":"Song Tan Debraj De Wen-Zhan Song Junjie Yang and Sajal K Das. 2016. Survey of Security Advances in Smart Grid: A Data Driven Approach. IEEE Communications Surveys & Tutorials (2016). Song Tan Debraj De Wen-Zhan Song Junjie Yang and Sajal K Das. 2016. Survey of Security Advances in Smart Grid: A Data Driven Approach. IEEE Communications Surveys & Tutorials (2016)."}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","location":"Tempe AZ USA","acronym":"CODASPY '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T20:37:01Z","timestamp":1751488621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":48,"alternative-id":["10.1145\/3176258.3176324","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176324","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}