{"id":"https://openalex.org/W3204561459","doi":"https://doi.org/10.1109/acit52158.2021.9548534","title":"Sustainability and Time Complexity Estimation of \u0421ryptographic Algorithms Main Operations on Elliptic Curves","display_name":"Sustainability and Time Complexity Estimation of \u0421ryptographic Algorithms Main Operations on Elliptic Curves","publication_year":2021,"publication_date":"2021-09-15","ids":{"openalex":"https://openalex.org/W3204561459","doi":"https://doi.org/10.1109/acit52158.2021.9548534","mag":"3204561459"},"language":"en","primary_location":{"id":"doi:10.1109/acit52158.2021.9548534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit52158.2021.9548534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110533601","display_name":"Igor Yakymenko","orcid":null},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Igor Yakymenko","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016123191","display_name":"Mykhailo Kasianchuk","orcid":"https://orcid.org/0000-0002-4469-8055"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Kasianchuk","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030092637","display_name":"Vasyl Yatskiv","orcid":"https://orcid.org/0000-0001-9778-6625"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vasyl Yatskiv","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045605427","display_name":"Ruslan Shevchuk","orcid":"https://orcid.org/0000-0001-5381-9528"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Ruslan Shevchuk","raw_affiliation_strings":["Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007882125","display_name":"Vasyl Koval","orcid":"https://orcid.org/0000-0003-4726-097X"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vasyl Koval","raw_affiliation_strings":["Department of Information And Computing Systems And Control, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Information And Computing Systems And Control, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015836056","display_name":"Solomiya Yatskiv","orcid":"https://orcid.org/0000-0001-7470-7314"},"institutions":[{"id":"https://openalex.org/I160977438","display_name":"West Ukrainian National University","ror":"https://ror.org/047988g19","country_code":"UA","type":"education","lineage":["https://openalex.org/I160977438"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Solomiya Yatskiv","raw_affiliation_strings":["Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, West Ukrainian National University, Ternopil, Ukraine","institution_ids":["https://openalex.org/I160977438"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5110533601"],"corresponding_institution_ids":["https://openalex.org/I160977438"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21860791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"494","last_page":"498"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.6364195346832275},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6268402934074402},{"id":"https://openalex.org/keywords/subtraction","display_name":"Subtraction","score":0.6101447343826294},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5457921624183655},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5156856775283813},{"id":"https://openalex.org/keywords/time-complexity","display_name":"Time complexity","score":0.48001259565353394},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.46446388959884644},{"id":"https://openalex.org/keywords/hamming-weight","display_name":"Hamming weight","score":0.4204622507095337},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.2860015630722046},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.27869290113449097},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2785601019859314},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.0992605984210968}],"concepts":[{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.6364195346832275},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6268402934074402},{"id":"https://openalex.org/C68060419","wikidata":"https://www.wikidata.org/wiki/Q40754","display_name":"Subtraction","level":2,"score":0.6101447343826294},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5457921624183655},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5156856775283813},{"id":"https://openalex.org/C311688","wikidata":"https://www.wikidata.org/wiki/Q2393193","display_name":"Time complexity","level":2,"score":0.48001259565353394},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.46446388959884644},{"id":"https://openalex.org/C63361517","wikidata":"https://www.wikidata.org/wiki/Q5645805","display_name":"Hamming weight","level":5,"score":0.4204622507095337},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.2860015630722046},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.27869290113449097},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2785601019859314},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0992605984210968},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit52158.2021.9548534","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit52158.2021.9548534","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/12","display_name":"Responsible consumption and production","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W827356921","https://openalex.org/W1507823573","https://openalex.org/W1604636366","https://openalex.org/W1684267317","https://openalex.org/W1902467112","https://openalex.org/W1970154887","https://openalex.org/W2001193973","https://openalex.org/W2009233073","https://openalex.org/W2072578815","https://openalex.org/W2110018936","https://openalex.org/W2122087485","https://openalex.org/W2136692073","https://openalex.org/W2154290215","https://openalex.org/W2528044090","https://openalex.org/W2546441932","https://openalex.org/W2578795631","https://openalex.org/W2767047824","https://openalex.org/W2797328866","https://openalex.org/W2890638870","https://openalex.org/W3023445585","https://openalex.org/W3085429270","https://openalex.org/W3091753483","https://openalex.org/W3095391614","https://openalex.org/W3150073287","https://openalex.org/W6637193517","https://openalex.org/W6745188558","https://openalex.org/W6783610666"],"related_works":["https://openalex.org/W3082721911","https://openalex.org/W2119606669","https://openalex.org/W2057474768","https://openalex.org/W2128180682","https://openalex.org/W2104685162","https://openalex.org/W2151387463","https://openalex.org/W1992130569","https://openalex.org/W961142965","https://openalex.org/W4383504288","https://openalex.org/W2304361112"],"abstract_inverted_index":{"This":[0,122],"paper":[1],"presents":[2],"the":[3,8,33,38,45,82,88,92,98,110,114,119,126,134],"time":[4,47,86],"complexity":[5],"estimates":[6],"for":[7,16,43,52,133],"methods":[9],"of":[10,26,35,48,66,81,94,113,128,136],"points":[11,53],"exponentiation,":[12],"which":[13,60,140],"are":[14,101],"basic":[15],"encrypting":[17],"information":[18,138],"flows":[19],"in":[20,74],"computer":[21],"systems.":[22],"As":[23],"a":[24],"result":[25],"numerical":[27],"experiments,":[28],"it":[29],"is":[30,104,116,141],"determined":[31],"that":[32,106],"method":[34,96],"doubling-addition-subtraction":[36,120],"has":[37],"lowest":[39],"complexity.":[40],"Mathematical":[41],"models":[42],"determining":[44],"execution":[46,85],"each":[49,95],"considered":[50],"algorithm":[51,129],"exponentiation":[54],"on":[55,87,97],"elliptic":[56],"curves":[57],"were":[58],"developed,":[59],"allowed":[61],"to":[62,71,124,143],"conduct":[63],"in-depth":[64],"analysis":[65,77],"their":[67],"performance":[68],"and":[69,91,130],"resistance":[70],"special":[72,144],"attacks,":[73],"particular":[75],"timing":[76],"attack.":[78],"The":[79],"dependences":[80],"cryptographic":[83,137],"operations":[84],"key":[89],"length":[90],"sustainability":[93,112],"Hamming":[99],"weight":[100],"investigated.":[102],"It":[103],"proved":[105],"under":[107],"certain":[108],"conditions":[109],"highest":[111],"system":[115],"achieved":[117],"by":[118],"algorithm.":[121],"allows":[123],"justify":[125],"choice":[127],"its":[131],"parameters":[132],"implementation":[135],"security,":[139],"resistant":[142],"attacks.":[145]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
