{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:00:05Z","timestamp":1776931205131,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3736130.3764513","type":"proceedings-article","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:40:46Z","timestamp":1760190046000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Boot in Automotive Real-Time Systems in Context of Post-Quantum Cryptography"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2714-0882","authenticated-orcid":false,"given":"Dennis Kengo","family":"Oka","sequence":"first","affiliation":[{"name":"IAV, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8913-9647","authenticated-orcid":false,"given":"Philipp","family":"Jungklass","sequence":"additional","affiliation":[{"name":"IAV, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Retrieved","author":"Microsoft","year":"2025","unstructured":"Microsoft 2025. Microsoft's Majorana 1 chip carves new path for quantum computing. Retrieved August 27, 2025 from https:\/\/news.microsoft.com\/source\/features\/innovation\/microsofts-majorana-1-chip-carves-new-path-for-quantum-computing\/"},{"key":"e_1_3_3_1_2_2","volume-title":"Retrieved","year":"2025","unstructured":"TechGig 2025. Check out the world's first Quantum Operating System. Retrieved August 27, 2025 from https:\/\/content.techgig.com\/technology\/the-dawn-of-quantum-computing-introducing-qnodeos-the-first-quantum-operating-system\/articleshow\/120586133.cms"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_3_1_5_2","volume-title":"Kyungwoo Lee, Kyung Chul Gui, and Kai Scheibert.","author":"Kim Dongwoo","year":"2017","unstructured":"Dongwoo Kim, Eunji Shin, Jae Seung Park, Kyungwoo Lee, Kyung Chul Gui, and Kai Scheibert. 2017. Secure Boot Implementation for Hard Real-Time Powertrain System (No. 2017-01-1656). SAE Technical Paper."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.110"},{"key":"e_1_3_3_1_7_2","unstructured":"NIST. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/pubs\/ir\/8413\/upd1\/final"},{"key":"e_1_3_3_1_8_2","unstructured":"NIST. Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/pubs\/ir\/8545\/final"},{"key":"e_1_3_3_1_9_2","volume-title":"Proceedings of the International Conference on Automotive Cybersecurity.","author":"Rodr\u00edguez Javier","year":"2023","unstructured":"Javier Rodr\u00edguez, Manuel L\u00f3pez, and Pablo Hern\u00e1ndez. 2023. Hardware-Assisted Chain-of-Trust for Secure Boot in Automotive ECUs. Proceedings of the International Conference on Automotive Cybersecurity."},{"issue":"2","key":"e_1_3_3_1_10_2","first-page":"101","article-title":"Hybrid Secure Enclave\u2013Signature Framework for Low-Latency In-Vehicle Systems","volume":"15","author":"Chen Lina","year":"2024","unstructured":"Lina Chen and Shubham Patel. 2024. Hybrid Secure Enclave\u2013Signature Framework for Low-Latency In-Vehicle Systems. Journal of Automotive Embedded Systems, 15(2), 101\u2013118.","journal-title":"Journal of Automotive Embedded Systems"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116252"},{"key":"e_1_3_3_1_12_2","volume-title":"Evaluating NTRU and Dilithium for Secure Boot in ECUs. International Workshop on Post-Quantum Automotive Security.","author":"Kumar Rohit","year":"2022","unstructured":"Rohit Kumar, Ankit Singh, and Vishal Gupta. 2022. Evaluating NTRU and Dilithium for Secure Boot in ECUs. International Workshop on Post-Quantum Automotive Security."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.13154\/294-9372"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-021-00114-4"},{"key":"e_1_3_3_1_15_2","first-page":"318","volume-title":"Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. Information Security and Cryptology - ICISC","author":"Wolf Marko","year":"2011","unstructured":"Marko Wolf and Timo Gendrullis. 2012. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. Information Security and Cryptology - ICISC 2011. Ed. by Howon Kim. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 302\u2013318. isbn: 978-3-642-31912-9."},{"key":"e_1_3_3_1_16_2","volume-title":"Germany","author":"Step User's Infineon Technologies AG. AURIX","year":"2014","unstructured":"Infineon Technologies AG. AURIX TC27x C-Step User's Manual V2.2. Infineon Technologies AG. 81726 Munich, Germany, Dec. 2014."},{"key":"e_1_3_3_1_17_2","volume-title":"Germany","author":"User's Manual Infineon Technologies AG. AURIX","year":"2021","unstructured":"Infineon Technologies AG. AURIX TC3xx User's Manual. 2021-02. Infineon Technologies AG. 81726 Munich, Germany, Feb. 2021"},{"key":"e_1_3_3_1_18_2","volume-title":"Paper 2019\/844","author":"Kannwischer Matthias J.","year":"2019","unstructured":"Matthias J. Kannwischer, Daniel K. K. Lee, and Peter Schwabe. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. Cryptology ePrint Archive, Paper 2019\/844 (2019). url: https:\/\/eprint.iacr.org\/2019\/844."},{"key":"e_1_3_3_1_19_2","volume-title":"Vector Cybersecurity Symposium. Infineon Technologies AG.","author":"Ambekar Abhijit","year":"2024","unstructured":"Abhijit Ambekar. 2024. Challenges in adoption of post-quantum cryptography for Plug and Charge application. Vector Cybersecurity Symposium. Infineon Technologies AG. Sept. 2024."}],"event":{"name":"CSCS '25: Proceedings of the 2025 Cyber Security in CarS Workshop","location":"Taipei Taiwan","acronym":"CSCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2nd Cyber Security in CarS Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3736130.3764513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:58:22Z","timestamp":1767981502000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3736130.3764513"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"references-count":19,"alternative-id":["10.1145\/3736130.3764513","10.1145\/3736130"],"URL":"https:\/\/doi.org\/10.1145\/3736130.3764513","relation":{},"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"2025-10-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}