{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:27:39Z","timestamp":1770283659029,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,16]]},"DOI":"10.1145\/3769002.3769963","type":"proceedings-article","created":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:16:19Z","timestamp":1770232579000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Cryptography and Physically Unclonable Functions for Secure In-Vehicle Communications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7991-2410","authenticated-orcid":false,"given":"Arcangelo","family":"Castiglione","sequence":"first","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4245-3437","authenticated-orcid":false,"given":"Teresa","family":"Elia","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0085-0748","authenticated-orcid":false,"given":"Christiancarmine","family":"Esposito","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9599-5996","authenticated-orcid":false,"given":"Franco","family":"Cirillo","sequence":"additional","affiliation":[{"name":"University of Salerno, Fisciano, Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591464"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app14051700"},{"key":"e_1_3_2_1_3_1","unstructured":"Shi Bai L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2021. CRYSTALS-Dilithium: Algorithm Specifications and Supporting Documentation (Version 3.1). Technical Report. (Feb. 2021). https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round3-20210208.pdf NIST PQC Round 3 Submission."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2202.02826"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Daniel J. Bernstein Johannes Buchmann and Erik Dahmen (Eds.). 2009. Post-Quantum Cryptography. Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-540-88702-7","DOI":"10.1007\/978-3-540-88702-7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Joppe W. Bos L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky John Schanck Peter Schwabe Gregor Seiler and Damien Stehl\u00e9. 2018. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. In EuroS&P 2018 - IEEE European Symposium on Security and Privacy. 353\u2013367. https:\/\/doi.org\/10.1109\/EuroSP.2018.00032","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Mehmet Bozdal Mohammad Samie Sohaib Aslam and I.K. Jennions. 2020. Evaluation of CAN Bus Security Challenges. Sensors 20 (April 2020) 16\u201317. https:\/\/doi.org\/10.3390\/s20082364","DOI":"10.3390\/s20082364"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/STA.2017.8314877"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.13154\/294-6673"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Arcangelo Castiglione and Teresa Elia. 2025. Enhancing Vehicle Communication Security: Implementing Post-quantum Solutions for CAN Networks. In Advanced Information Networking and Applications Leonard Barolli (Ed.). Springer Nature Switzerland Cham 354\u2013366.","DOI":"10.1007\/978-3-031-87772-8_30"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110488"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3281276"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Tyler Cultice Carson Labrado and Himanshu Thapliyal. 2020. A PUF Based CAN Security Framework. 602\u2013603. https:\/\/doi.org\/10.1109\/ISVLSI49217.2020.00094","DOI":"10.1109\/ISVLSI49217.2020.00094"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/info13080382"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7030040"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDCS52006.2021.9397896"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130495"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Chidera Eze Jerry Emmanuel Iyanu-Oluwa Onietan Itunuoluwa Isewon and Jelili Oyelade. 2023. Systematic Review on the Recent Trends of Cybersecurity in Automobile Industry. 1\u20137. https:\/\/doi.org\/10.1109\/SEB-SDG57117.2023.10124561","DOI":"10.1109\/SEB-SDG57117.2023.10124561"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi16110395"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3389\/fsens.2021.751748"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06269-5"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3059881"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3078740"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04927-0_3"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109952"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442443"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1484-3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142084"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04799-4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3098546"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Andrea Palanca Eric Evenchick Federico Maggi and Stefano Zanero. 2017. A Stealth Selective Link-Layer Denial-of-Service Attack Against Automotive Networks. 185\u2013206. https:\/\/doi.org\/10.1007\/978-3-319-60876-1_9","DOI":"10.1007\/978-3-319-60876-1_9"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2112.00399"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3312545"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22176679"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107593"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.25046\/aj0203165"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","unstructured":"Ali Shuja Siddiqui Yutian Gui J. Plusquellic and Fareena Saqib. 2017. Secure communication over CANBus. 1264\u20131267. https:\/\/doi.org\/10.1109\/MWSCAS.2017.8053160","DOI":"10.1109\/MWSCAS.2017.8053160"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Ali Shuja Siddiqui Chia-Che Lee Wenjie Che J. Plusquellic and Fareena Saqib. 2017. Secure intra-vehicular communication over CANFD. 97\u2013102. https:\/\/doi.org\/10.1109\/AsianHOST.2017.8354002","DOI":"10.1109\/AsianHOST.2017.8354002"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI51800.2020.00034"},{"key":"e_1_3_2_1_43_1","volume-title":"Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. NIST Special Publication 800\u2013232","author":"Turan Meltem S\u00f6nmez","unstructured":"Meltem S\u00f6nmez Turan, Kerry McKay, Donghoon Chang, Jinkeon Kang, and John Kelsey. 2024. Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions. NIST Special Publication 800\u2013232. National Institute of Standards and Technology, Gaithersburg, MD. https:\/\/csrc.nist.gov\/pubs\/sp\/800\/232\/ipd Initial Public Draft."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.13154\/294-8352"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562147"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060856"}],"event":{"name":"RACS '25: International Conference on Research in Adaptive and Convergent Systems","location":"Ho Chi Minh Vietnam","acronym":"RACS '25","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769002.3769963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T19:17:16Z","timestamp":1770232636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769002.3769963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,16]]},"references-count":47,"alternative-id":["10.1145\/3769002.3769963","10.1145\/3769002"],"URL":"https:\/\/doi.org\/10.1145\/3769002.3769963","relation":{},"subject":[],"published":{"date-parts":[[2025,11,16]]},"assertion":[{"value":"2026-02-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}