{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:16:45Z","timestamp":1775326605814,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.23919\/date.2017.7927079","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T16:34:41Z","timestamp":1494866081000},"page":"698-703","source":"Crossref","is-referenced-by-count":37,"title":["Towards post-quantum security for IoT endpoints with NTRU"],"prefix":"10.23919","author":[{"given":"Oscar M.","family":"Guillen","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Poppelmann","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Bermudo Mera","sequence":"additional","affiliation":[]},{"given":"Elena Fuentes","family":"Bongenaar","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[]},{"given":"Johanna","family":"Sepulveda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2700078"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_28"},{"key":"ref12","author":"braithwaite","year":"2015","journal-title":"Experimenting with post-quantum cryptography"},{"key":"ref13","article-title":"EESS 1: Implementation Aspects of NTRUEncrypt, Version 3.1","author":"whyte","year":"2015","journal-title":"Consortium for Efficient Embedded Security Tech Rep"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref15","first-page":"197","article-title":"Lattice cryptography for the internet","author":"peikert","year":"2014","journal-title":"PQCrypto"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_21"},{"key":"ref17","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption","author":"lindner","year":"2011","journal-title":"CT-RSA"},{"key":"ref18","first-page":"512","article-title":"On the design of hardware building blocks for modern lattice-based encryption schemes","author":"g\u00f6ttert","year":"2012","journal-title":"CHES 2012"},{"key":"ref19","article-title":"NTRU Cipher Suites for TLS","author":"singer","year":"2001","journal-title":"IETF Internet-Draft draft-ietf-tls-ntru-00"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref27","first-page":"708","article-title":"Choosing parameters for NTRUEncrypt","volume":"2015","author":"hoffstein","year":"2015","journal-title":"IACR Eprint"},{"key":"ref3","year":"2015","journal-title":"Commercial national security algorithm suite"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(02)00588-7"},{"key":"ref5","first-page":"267","article-title":"NTRU: A ring-based public key cryptosystem","author":"hoffstein","year":"1998","journal-title":"Ants"},{"key":"ref8","author":"collen marie","year":"2002","journal-title":"Efficient NTRU Implementations"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44709-1_22"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref9","author":"monteverde","year":"2008","journal-title":"NTRU Software Implementation for Constrained Devices"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151055"},{"key":"ref20","article-title":"Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.3","author":"schanck","year":"2016","journal-title":"IETF Internet-Draft draft-whyte-qsh-tls"},{"key":"ref22","first-page":"172","article-title":"NAEP: provable security in the presence of decryption failures","volume":"2003","author":"howgrave-graham","year":"2003","journal-title":"IACR Eprint"},{"key":"ref21","first-page":"287","article-title":"A quantum-safe circuit-extension handshake for Tor","volume":"2015","author":"schanck","year":"2015","journal-title":"IACR Eprint"},{"key":"ref24","year":"0","journal-title":"The NIST Statistical Test Suite"},{"key":"ref23","article-title":"The Intel Random Number Generator","author":"jun","year":"1999","journal-title":"Technical Report White Paper"},{"key":"ref26","first-page":"263","article-title":"Efficiency improvement for NTRU","volume":"2007","author":"buchmann","year":"2007","journal-title":"IACR Eprint"},{"key":"ref25","article-title":"Almost inverses and fast NTRU key creation","author":"silverman","year":"1999","journal-title":"NTRU Cryptosystems (Technical Note# 014)"}],"event":{"name":"2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Lausanne, Switzerland","start":{"date-parts":[[2017,3,27]]},"end":{"date-parts":[[2017,3,31]]}},"container-title":["Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2017"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7919927\/7926947\/07927079.pdf?arnumber=7927079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T23:15:37Z","timestamp":1506986137000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7927079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.23919\/date.2017.7927079","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}