{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:32Z","timestamp":1773655892254,"version":"3.50.1"},"reference-count":5,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080042","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"969-971","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users"],"prefix":"10.3103","volume":"53","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"E. N.","family":"Shkorkina","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7204_CR1","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W. and Preskill, J., Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., 2000, vol. 85, no. 2, p. 441.","journal-title":"Phys. Rev. Lett."},{"key":"7204_CR2","unstructured":"GOST (State Standard) R 56829\u20132015: Intelligent Transport Systems. Terms and Definitions, 2016."},{"key":"7204_CR3","unstructured":"Rostovtsev, A. and Stolbunov, A., Public-key cryptosystem based on isogenies, IACR Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2006\/145.pdf."},{"key":"7204_CR4","unstructured":"Galbraith, S.D., Petit, C., and Silva, J., Identification protocols and signature schemes based on supersingular isogeny problems, International Conference on the Theory and Application of Cryptology and Information Security, Cham, 2017, pp. 3\u201333."},{"key":"7204_CR5","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TC.2017.2771535","volume":"67","author":"A. Faz-Hern\u00e1ndez","year":"2018","unstructured":"Faz-Hern\u00e1ndez, A., Lopez, J., Ochoa-Jimenez, E., and Rodriguez-Henriquez, F., A faster software implementation of the supersingular isogeny Diffie-Hellman key exchange protocol, IEEE Trans. Comput., 2018, vol. 67, no. 11, pp. 1622\u20131636.","journal-title":"IEEE Trans. Comput."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080042.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080042","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080042.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:01Z","timestamp":1773611761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":5,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7204"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080042","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"1 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}