{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:40:05Z","timestamp":1755974405866,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T00:00:00Z","timestamp":1721347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science and Technology Council (NSTC)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,19]]},"DOI":"10.1145\/3686625.3686634","type":"proceedings-article","created":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:31:07Z","timestamp":1725384667000},"page":"46-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3661-6048","authenticated-orcid":false,"given":"Basker","family":"Palaniswamy","sequence":"first","affiliation":[{"name":"National Sun Yat-sen University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6135-3508","authenticated-orcid":false,"given":"Ting-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"National Sun Yat-sen University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5605-7354","authenticated-orcid":false,"given":"Arijit","family":"Karati","sequence":"additional","affiliation":[{"name":"National Sun Yat-sen University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"unstructured":"[n. d.]. Frodo-KEM. https:\/\/frodokem.org\/. Accessed: 2024-03-02.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Alkim Erdem","year":"2016","unstructured":"Erdem Alkim, L\u00e9o Ducas, Thomas P\u00f6ppelmann, and Peter Schwabe. 2016. Post-quantum key { Exchange\u2014A} new hope. In 25th USENIX Security Symposium (USENIX Security 16). 327\u2013343."},{"key":"e_1_3_2_1_3_1","volume-title":"Post-quantum cryptography. Nature 549, 7671","author":"Bernstein J","year":"2017","unstructured":"Daniel\u00a0J Bernstein and Tanja Lange. 2017. Post-quantum cryptography. Nature 549, 7671 (2017), 188\u2013194."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2976749.2978425"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/EuroSP.2018.00032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-030-34618-8_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_8_1","volume-title":"Conf. on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings 10","author":"D\u2019Anvers Jan-Pieter","year":"2018","unstructured":"Jan-Pieter D\u2019Anvers, Angshuman Karmakar, Sujoy Sinha\u00a0Roy, and Frederik Vercauteren. 2018. Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In Progress in Cryptology\u2013AFRICACRYPT 2018: 10th Intl. Conf. on Cryptology in Africa, Marrakesh, Morocco, May 7\u20139, 2018, Proceedings 10. Springer, 282\u2013305."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/978-3-642-13190-5_26"},{"volume-title":"Proc. of the 21st International Conference on Security and Cryptography. INSTICC, 298\u2013309.","author":"Karati Arijit","unstructured":"Arijit Karati, Ting-Yu Chen, and Kai-Yao Lin. 2024. QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks. In In Proc. of the 21st International Conference on Security and Cryptography. INSTICC, 298\u2013309.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"An attack on the Needham- Schroeder public- key authentication protocol. Information processing letters 56, 3","author":"Lowe Gavin","year":"1995","unstructured":"Gavin Lowe. 1995. An attack on the Needham- Schroeder public- key authentication protocol. Information processing letters 56, 3 (1995)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/3-540-61042-1_43"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/359657.359659"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1568318.1568324"},{"key":"e_1_3_2_1_15_1","volume-title":"Net Loss: An econometric method to measure the impact of Internet shutdowns. ACM Journal on Computing and Sustainable Societies","author":"Tagat Anirudh","year":"2024","unstructured":"Anirudh Tagat, Amreesh Phokeer, and Hanna Kreitem. 2024. Net Loss: An econometric method to measure the impact of Internet shutdowns. ACM Journal on Computing and Sustainable Societies (2024)."},{"volume-title":"Encyclopedia of cryptography and security","author":"Van\u00a0Tilborg CA","unstructured":"Henk\u00a0CA Van\u00a0Tilborg and Sushil Jajodia. 2014. Encyclopedia of cryptography and security. Springer Science & Business Media.","key":"e_1_3_2_1_16_1"}],"event":{"acronym":"IECC 2024","name":"IECC 2024: 2024 6th International Electronics Communication Conference","location":"Fukuoka Japan"},"container-title":["Proceedings of the 2024 6th International Electronics Communication Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686625.3686634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686625.3686634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:19:07Z","timestamp":1755973147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686625.3686634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,19]]},"references-count":16,"alternative-id":["10.1145\/3686625.3686634","10.1145\/3686625"],"URL":"https:\/\/doi.org\/10.1145\/3686625.3686634","relation":{},"subject":[],"published":{"date-parts":[[2024,7,19]]},"assertion":[{"value":"2024-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}