{"id":"https://openalex.org/W4415004129","doi":"https://doi.org/10.1109/acit65614.2025.11185847","title":"Implementing Post-Quantum Cyber Security in Financial Systems","display_name":"Implementing Post-Quantum Cyber Security in Financial Systems","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415004129","doi":"https://doi.org/10.1109/acit65614.2025.11185847"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048315686","display_name":"Nadav Voloch","orcid":"https://orcid.org/0000-0001-5296-4985"},"institutions":[{"id":"https://openalex.org/I2802112877","display_name":"Ruppin Academic Center","ror":"https://ror.org/0361c8163","country_code":"IL","type":"education","lineage":["https://openalex.org/I2802112877"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Nadav Voloch","raw_affiliation_strings":["Ruppin Academic Center,Computer Engineering Department,Israel"],"affiliations":[{"raw_affiliation_string":"Ruppin Academic Center,Computer Engineering Department,Israel","institution_ids":["https://openalex.org/I2802112877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023321641","display_name":"Noa Voloch Bloch","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Noa Voloch - Bloch","raw_affiliation_strings":["Raicol Crystals Ltd,Rosh Ha&#x2019;Ayin,Israel"],"affiliations":[{"raw_affiliation_string":"Raicol Crystals Ltd,Rosh Ha&#x2019;Ayin,Israel","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5048315686"],"corresponding_institution_ids":["https://openalex.org/I2802112877"],"apc_list":null,"apc_paid":null,"fwci":3.0965,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9366933,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"532","last_page":"536"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6739000082015991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.6739000082015991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.603600025177002},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4909000098705292},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48570001125335693},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.42500001192092896},{"id":"https://openalex.org/keywords/safeguard","display_name":"Safeguard","score":0.37720000743865967},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.33719998598098755}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6991000175476074},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.603600025177002},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5278000235557556},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4909000098705292},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48570001125335693},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.42500001192092896},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.37720000743865967},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3490999937057495},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33719998598098755},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3156999945640564},{"id":"https://openalex.org/C164516710","wikidata":"https://www.wikidata.org/wiki/Q1166072","display_name":"Financial transaction","level":3,"score":0.2842999994754791},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28110000491142273},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.263700008392334},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320330595","display_name":"Ruppin Academic Center","ror":"https://ror.org/0361c8163"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W258537497","https://openalex.org/W1489585445","https://openalex.org/W1513904472","https://openalex.org/W1599937967","https://openalex.org/W2076357705","https://openalex.org/W2168676717","https://openalex.org/W2318956958","https://openalex.org/W2513867367","https://openalex.org/W2765923746","https://openalex.org/W2766522683","https://openalex.org/W3108763476","https://openalex.org/W3118290196","https://openalex.org/W4238341678","https://openalex.org/W4403446826","https://openalex.org/W4408043300"],"related_works":[],"abstract_inverted_index":{"Quantum":[0],"computing":[1],"threatens":[2],"classical":[3],"cryptographic":[4,62],"systems,":[5,24],"particularly":[6],"those":[7],"used":[8],"in":[9,22,64,98],"financial":[10,23,78,99,118],"security":[11,82],"infrastructures.":[12],"This":[13],"paper":[14,91],"explores":[15],"the":[16,26,58,110],"implementation":[17],"of":[18,28,60,112],"post-quantum":[19,73],"cryptography":[20],"(PQC)":[21],"addressing":[25],"vulnerabilities":[27],"traditional":[29],"schemes":[30],"such":[31],"as":[32],"RSA,":[33],"ECC,":[34],"and":[35,48,50,104],"Diffie-Hellman.":[36],"It":[37],"examines":[38],"NIST\u2019s":[39],"standardized":[40],"PQC":[41,96,114],"algorithms,":[42],"including":[43],"Kyber":[44],"for":[45,52,76,87],"key":[46],"exchange":[47],"Dilithium":[49],"Falcon":[51],"digital":[53],"signatures.":[54,89],"The":[55,90,107],"study":[56],"highlights":[57],"role":[59],"hybrid":[61],"approaches":[63],"ensuring":[65],"a":[66,70],"seamless":[67],"transition,":[68],"with":[69,85],"focus":[71],"on":[72,95],"TLS":[74],"1.3":[75],"secure":[77],"communications.":[79],"Additionally,":[80],"blockchain":[81],"is":[83],"analyzed":[84],"SPHINCS+":[86],"quantum-resistant":[88],"reviews":[92],"existing":[93],"research":[94],"adoption":[97],"applications,":[100],"emphasizing":[101],"security,":[102],"performance,":[103],"regulatory":[105],"considerations.":[106],"findings":[108],"underscore":[109],"necessity":[111],"proactive":[113],"integration":[115],"to":[116],"safeguard":[117],"transactions":[119],"against":[120],"quantum":[121],"threats.":[122]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
