{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:44:38Z","timestamp":1773881078044,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["1921576"],"award-info":[{"award-number":["1921576"]}]},{"name":"National Science Foundation","award":["1922410"],"award-info":[{"award-number":["1922410"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3529652","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"282-284","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Post-Quantum Cipher Power Analysis in Lightweight Devices"],"prefix":"10.1145","author":[{"given":"Kathryn","family":"Hines","sequence":"first","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"Manohar","family":"Raavi","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"John-Michael","family":"Villeneuve","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"Simeon","family":"Wuthier","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]},{"given":"Javier","family":"Moreno-Colin","sequence":"additional","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]},{"given":"Yan","family":"Bai","sequence":"additional","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]},{"given":"Sang-Yoon","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Colorado Colorado Springs, Colorado Springs, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EmergiTech.2016.7737367"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384725"},{"key":"e_1_3_2_1_3_1","volume-title":"elliptic curve cryptography, and digital signatures. omputers & Security","author":"Caelli William J","year":"1999","unstructured":"William J Caelli , Edward P Dawson , and Scott A Rea . 1999. PKI , elliptic curve cryptography, and digital signatures. omputers & Security , Vol. 18 , 1 ( 1999 ), 47--66. William J Caelli, Edward P Dawson, and Scott A Rea. 1999. PKI, elliptic curve cryptography, and digital signatures. omputers & Security, Vol. 18, 1 (1999), 47--66."},{"key":"e_1_3_2_1_4_1","volume-title":"Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2302--2307","author":"Chang Sang-Yoon","year":"2017","unstructured":"Sang-Yoon Chang , Sristi Lakshmi Sravana Kumar , and Yih-Chun Hu . 2017 a. Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2302--2307 . https:\/\/doi.org\/10.1109\/ICDCS.2017.260 10.1109\/ICDCS.2017.260 Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, and Yih-Chun Hu. 2017a. Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2302--2307. https:\/\/doi.org\/10.1109\/ICDCS.2017.260"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098265"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.8.49-57"},{"key":"e_1_3_2_1_7_1","volume-title":"Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In 2008 IEEE Symposium on Security and Privacy (sp 2008","author":"Halperin Daniel","year":"2008","unstructured":"Daniel Halperin , Thomas S. Heydt-Benjamin , Benjamin Ransford , Shane S. Clark , Benessa Defend , Will Morgan , Kevin Fu , Tadayoshi Kohno , and William H. Maisel . 2008 . Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In 2008 IEEE Symposium on Security and Privacy (sp 2008 ). 129--142. https:\/\/doi.org\/10.1109\/SP. 2008 .31 10.1109\/SP.2008.31 Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno, and William H. Maisel. 2008. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In 2008 IEEE Symposium on Security and Privacy (sp 2008). 129--142. https:\/\/doi.org\/10.1109\/SP.2008.31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925777"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.02.004"},{"key":"e_1_3_2_1_10_1","volume-title":"NIST Status Update on the 3rd Round. https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/status-update-on-the-3rd-round\/images-media\/session-1-moody-nist-round-3-update.pdf Retrieved","author":"National Institute of Standards and Technology. 2017.","year":"2022","unstructured":"National Institute of Standards and Technology. 2017. NIST Status Update on the 3rd Round. https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/status-update-on-the-3rd-round\/images-media\/session-1-moody-nist-round-3-update.pdf Retrieved March 16, 2022 from National Institute of Standards and Technology. 2017. NIST Status Update on the 3rd Round. https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/status-update-on-the-3rd-round\/images-media\/session-1-moody-nist-round-3-update.pdf Retrieved March 16, 2022 from"},{"key":"e_1_3_2_1_11_1","volume-title":"Performance Characterization of Post-Quantum Digital Certificates. In 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, 1--9.","author":"Raavi Manohar","year":"2021","unstructured":"021a) Manohar Raavi , Pranav Chandramouli , Simeon Wuthier , Xiaobo Zhou , and Sang-Yoon Chang . 2021 a . Performance Characterization of Post-Quantum Digital Certificates. In 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, 1--9. 021a)Manohar Raavi, Pranav Chandramouli, Simeon Wuthier, Xiaobo Zhou, and Sang-Yoon Chang. 2021 a. Performance Characterization of Post-Quantum Digital Certificates. In 2021 International Conference on Computer Communications and Networks (ICCCN). IEEE, 1--9."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78375-4_17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3077843"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00012"},{"key":"e_1_3_2_1_16_1","volume-title":"Open Quantum Safe","year":"2022","unstructured":", Open Quantum Safe . 2022 . Algorithms in liboqs. https:\/\/openquantumsafe.org\/liboqs\/algorithms\/ , Open Quantum Safe. 2022. Algorithms in liboqs. https:\/\/openquantumsafe.org\/liboqs\/algorithms\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453528"},{"key":"e_1_3_2_1_18_1","volume-title":"Selected Areas in Cryptography -- SAC","author":"Stebila Douglas","year":"2016","unstructured":"Douglas Stebila and Michele Mosca . 2017. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project . In Selected Areas in Cryptography -- SAC 2016 , Roberto Avanzi and Howard Heys (Eds.). Springer International Publishing , Cham, 14--37. Douglas Stebila and Michele Mosca. 2017. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography -- SAC 2016, Roberto Avanzi and Howard Heys (Eds.). Springer International Publishing, Cham, 14--37."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies","author":"Talla Vamsi","unstructured":"Vamsi Talla , Bryce Kellogg , Benjamin Ransford , Saman Naderiparizi , Shyamnath Gollakota , and Joshua R. Smith . 2015. Powering the next Billion Devices with Wi-Fi . In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies ( Heidelberg, Germany) (CoNEXT '15). Association for Computing Machinery, New York, NY, USA, Article 4, bibinfonumpages13 pages. https:\/\/doi.org\/10.1145\/2716281.2836089 10.1145\/2716281.2836089 Vamsi Talla, Bryce Kellogg, Benjamin Ransford, Saman Naderiparizi, Shyamnath Gollakota, and Joshua R. Smith. 2015. Powering the next Billion Devices with Wi-Fi. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies (Heidelberg, Germany) (CoNEXT '15). Association for Computing Machinery, New York, NY, USA, Article 4, bibinfonumpages13 pages. https:\/\/doi.org\/10.1145\/2716281.2836089"},{"key":"e_1_3_2_1_20_1","unstructured":"N. Tesla. 1914. Apparatus for transmitting electrical energy. http:\/\/www.google.com\/patents\/US1119732 US Patent 1 119 732. N. Tesla. 1914. Apparatus for transmitting electrical energy. http:\/\/www.google.com\/patents\/US1119732 US Patent 1 119 732."}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3529652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3529652"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":20,"alternative-id":["10.1145\/3507657.3529652","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3529652","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}