{"id":"https://openalex.org/W4403447639","doi":"https://doi.org/10.1109/acit62333.2024.10712472","title":"Towards UAT Methodology on Cryptographic Library Assessment","display_name":"Towards UAT Methodology on Cryptographic Library Assessment","publication_year":2024,"publication_date":"2024-09-19","ids":{"openalex":"https://openalex.org/W4403447639","doi":"https://doi.org/10.1109/acit62333.2024.10712472"},"language":"en","primary_location":{"id":"doi:10.1109/acit62333.2024.10712472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069117608","display_name":"Yevgen Kotukh","orcid":"https://orcid.org/0000-0003-4997-620X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yevgen Kotukh","raw_affiliation_strings":["Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043418124","display_name":"Oleksandr Marukhnenko","orcid":"https://orcid.org/0000-0002-0583-3752"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksandr Marukhnenko","raw_affiliation_strings":["Kharkiv National University of Radioelectronics,School of Cybersecurity,Kharkiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Radioelectronics,School of Cybersecurity,Kharkiv,Ukraine","institution_ids":["https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082596868","display_name":"Gennady Khalimov","orcid":"https://orcid.org/0000-0002-2054-9186"},"institutions":[{"id":"https://openalex.org/I107158390","display_name":"Kharkiv National University of Radio Electronics","ror":"https://ror.org/01ctj1b90","country_code":"UA","type":"education","lineage":["https://openalex.org/I107158390"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Gennady Khalimov","raw_affiliation_strings":["Kharkiv National University of Radioelectronics,School of Cybersecurity,Kharkiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Radioelectronics,School of Cybersecurity,Kharkiv,Ukraine","institution_ids":["https://openalex.org/I107158390"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052156068","display_name":"Maksym Korobchynskyi","orcid":"https://orcid.org/0000-0001-8049-4730"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maksym Korobchynskyi","raw_affiliation_strings":["Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114286301","display_name":"Serhii Khamula","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Serhii Khamula","raw_affiliation_strings":["Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050712956","display_name":"Myhailo Rudenko","orcid":"https://orcid.org/0000-0002-9180-1510"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Myhailo Rudenko","raw_affiliation_strings":["Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Yevhenii Bereznyak Military Academy,School of Cybersecurity,Kyiv,Ukraine","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5069117608"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18273865,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"571","last_page":"575"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9528999924659729,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6920112371444702},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6743320226669312},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5177806615829468},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.47567763924598694},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2331787347793579}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6920112371444702},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6743320226669312},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5177806615829468},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.47567763924598694},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2331787347793579}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62333.2024.10712472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62333.2024.10712472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2032906740","https://openalex.org/W2063948661","https://openalex.org/W2069153391","https://openalex.org/W2080309018","https://openalex.org/W2084342165","https://openalex.org/W2087377210","https://openalex.org/W2137147061","https://openalex.org/W2295324833","https://openalex.org/W3212189172","https://openalex.org/W6637574876","https://openalex.org/W6686161983","https://openalex.org/W6734016297","https://openalex.org/W6784452228","https://openalex.org/W6991423693"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"This":[0],"article":[1,188,205],"delineates":[2],"a":[3,12,89,118,207],"User":[4],"Acceptance":[5],"Testing":[6],"(UAT)":[7],"methodology":[8,212],"specifically":[9],"tailored":[10],"for":[11,34,91,214],"cryptographic":[13,81,221],"transformation":[14,222],"library":[15],"incorporating":[16],"an":[17],"advanced":[18],"encryption":[19,158,228],"scheme":[20,229],"based":[21,137,200],"on":[22,66,138,201,225],"the":[23,28,80,102,134,139,146,149,174,184,191,211,216,220,226,236],"generalized":[24,150],"Suzuki":[25,140,151,231],"2-groups":[26],"within":[27],"MST3":[29,135],"cryptosystem":[30,37,122,147],"framework.":[31],"The":[32,124,142,180,204],"impetus":[33],"augmenting":[35],"existing":[36],"methodologies":[38],"stems":[39],"from":[40],"rapid":[41],"advancements":[42],"in":[43,58,98,121,133,155],"quantum":[44,47],"computing.":[45],"These":[46],"computers":[48],"possess":[49],"formidable":[50],"computational":[51],"capabilities":[52,159],"that":[53],"can":[54],"exploit":[55],"vulnerabilities":[56],"inherent":[57],"many":[59],"extant":[60],"public-key":[61],"cryptosystems,":[62],"particularly":[63],"those":[64],"reliant":[65],"factorization":[67],"and":[68,74,109,116,160],"discrete":[69],"logarithms,":[70],"such":[71],"as":[72,88],"RSA":[73],"ECC.":[75],"For":[76],"nearly":[77],"two":[78],"decades,":[79],"community":[82],"has":[83],"explored":[84],"using":[85,148],"noncommutative":[86],"groups":[87,113],"foundation":[90],"constructing":[92],"quantum-resistant":[93],"cryptosystems.":[94],"A":[95],"seminal":[96],"contribution":[97],"this":[99,129,178,187,240],"field":[100],"was":[101],"unsolvable":[103],"word":[104],"problem":[105],"articulated":[106],"by":[107,183,197],"Wagner":[108],"Magyarik,":[110],"which":[111],"utilizes":[112],"of":[114,128,145,157,177,186,194,210,219,239],"permutations":[115],"represents":[117],"promising":[119],"avenue":[120],"development.":[123],"most":[125],"recent":[126],"iteration":[127],"concept":[130],"is":[131],"embodied":[132],"cryptosystem,":[136],"group.":[141],"initial":[143],"deployment":[144],"2group":[152],"faced":[153],"constraints":[154],"terms":[156],"vulnerability":[161],"to":[162],"exhaustive":[163],"attacks.":[164],"Recent":[165],"years":[166],"have":[167],"witnessed":[168],"numerous":[169],"proposals":[170],"aimed":[171],"at":[172],"refining":[173],"fundamental":[175],"design":[176],"system.":[179],"research":[181],"conducted":[182],"authors":[185],"significantly":[189],"broadens":[190],"application":[192],"scope":[193],"public":[195],"cryptography":[196],"enhancing":[198],"parameterization":[199],"non-Abelian":[202],"groups.":[203],"provides":[206],"detailed":[208],"exposition":[209],"employed":[213],"testing":[215],"practical":[217],"implementation":[218],"library,":[223],"focusing":[224],"enhanced":[227],"utilizing":[230],"2-groups.":[232],"Moreover,":[233],"it":[234],"confirms":[235],"operational":[237],"viability":[238],"approach.":[241]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
