{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:55:00Z","timestamp":1757778900386},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.23919\/date48585.2020.9116517","type":"proceedings-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T23:28:37Z","timestamp":1592263717000},"page":"1532-1537","source":"Crossref","is-referenced-by-count":3,"title":["AMSA: Adaptive Merkle Signature Architecture"],"prefix":"10.23919","author":[{"given":"Emanuel","family":"Regnath","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Wots+ - shorter signatures for hash-based signature schemes","author":"h\u00fclsing","year":"2017","journal-title":"Cryptology ePrint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8554"},{"key":"ref12","article-title":"Iota signatures, private keys and address reuse","author":"pinckaers","year":"2018","journal-title":"Blog-Article"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3_5"},{"article-title":"Micro-ECC","year":"0","author":"mackay","key":"ref17"},{"key":"ref18","first-page":"317","article-title":"Estimating the cost of generic quantum pre-image attacks on sha-2 and sha-3","author":"amy","year":"2016","journal-title":"International Conference on Selected Areas in Cryptography"},{"key":"ref4","article-title":"A Firmware Update Architecture for Internet of Things Devices","author":"moran","year":"2019","journal-title":"Internet-draft"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.04.003"},{"year":"0","key":"ref6","article-title":"AMSA Code"},{"year":"2019","key":"ref5","article-title":"Request for Public Comments on Stateful Hash-Based Signatures"},{"key":"ref8","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Proc Adv Cryptology?Crypto"},{"key":"ref7","article-title":"Constructing digital signatures from a one-way function","author":"lamport","year":"1979","journal-title":"CSL 98"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090354"},{"article-title":"Establishing the quantum supremacy frontier with a 281 pflop\/s simulation","year":"2019","author":"villalonga","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8391"}],"event":{"name":"2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2020,3,9]]},"location":"Grenoble, France","end":{"date-parts":[[2020,3,13]]}},"container-title":["2020 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9112295\/9116186\/09116517.pdf?arnumber=9116517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T22:42:45Z","timestamp":1594680165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9116517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/date48585.2020.9116517","relation":{},"subject":[],"published":{"date-parts":[[2020,3]]}}}