{"id":"https://openalex.org/W4408100449","doi":"https://doi.org/10.1109/ants63515.2024.10898369","title":"Quantum-Enhanced Elliptic Curve Cryptography Implementations for IoT: A Comparative Analysis","display_name":"Quantum-Enhanced Elliptic Curve Cryptography Implementations for IoT: A Comparative Analysis","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4408100449","doi":"https://doi.org/10.1109/ants63515.2024.10898369"},"language":"en","primary_location":{"id":"doi:10.1109/ants63515.2024.10898369","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898369","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032810720","display_name":"Rashmi Sahay","orcid":"https://orcid.org/0000-0003-4713-069X"},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rashmi Sahay","raw_affiliation_strings":["The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad"],"affiliations":[{"raw_affiliation_string":"The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad","institution_ids":["https://openalex.org/I4210138731"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013900967","display_name":"Kaushik Sekaran","orcid":"https://orcid.org/0009-0000-7675-769X"},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kaushik Sekaran","raw_affiliation_strings":["The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad"],"affiliations":[{"raw_affiliation_string":"The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad","institution_ids":["https://openalex.org/I4210138731"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037954313","display_name":"M. Priyadharshini","orcid":"https://orcid.org/0000-0001-7981-360X"},"institutions":[{"id":"https://openalex.org/I4210138731","display_name":"ICFAI Foundation for Higher Education","ror":"https://ror.org/04p3pp808","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210138731"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Priyadharshini","raw_affiliation_strings":["The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad"],"affiliations":[{"raw_affiliation_string":"The ICFAI Foundation for Higher Education,Faculty of Science and Technology,IcfaiTech,Hyderabad","institution_ids":["https://openalex.org/I4210138731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032810720"],"corresponding_institution_ids":["https://openalex.org/I4210138731"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71371316,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9765999913215637,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7975694537162781},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7138718366622925},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.583494246006012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5756357908248901},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5720117688179016},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5685725212097168},{"id":"https://openalex.org/keywords/curve25519","display_name":"Curve25519","score":0.5458354353904724},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.5264996886253357},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4463653266429901},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43365657329559326},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3634397089481354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3214614689350128},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3019159436225891},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17563802003860474},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16120877861976624},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09866324067115784},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.08201080560684204},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.059031158685684204}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7975694537162781},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7138718366622925},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.583494246006012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5756357908248901},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5720117688179016},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5685725212097168},{"id":"https://openalex.org/C198690329","wikidata":"https://www.wikidata.org/wiki/Q15702839","display_name":"Curve25519","level":5,"score":0.5458354353904724},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.5264996886253357},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4463653266429901},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43365657329559326},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3634397089481354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3214614689350128},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3019159436225891},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17563802003860474},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16120877861976624},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09866324067115784},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.08201080560684204},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.059031158685684204},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants63515.2024.10898369","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898369","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2765582111","https://openalex.org/W2919670389","https://openalex.org/W2995031877","https://openalex.org/W3000833961","https://openalex.org/W3109409938","https://openalex.org/W3196922736","https://openalex.org/W3206925236","https://openalex.org/W4220817325","https://openalex.org/W4288051764","https://openalex.org/W4312223255","https://openalex.org/W4313496490","https://openalex.org/W4377690911","https://openalex.org/W4386469546","https://openalex.org/W4389262401","https://openalex.org/W4389797922","https://openalex.org/W4399968890","https://openalex.org/W4400850431","https://openalex.org/W4401276915"],"related_works":["https://openalex.org/W2782833818","https://openalex.org/W2332531239","https://openalex.org/W2013613544","https://openalex.org/W3201596224","https://openalex.org/W4312920169","https://openalex.org/W1565266559","https://openalex.org/W2096369450","https://openalex.org/W4399980823","https://openalex.org/W1972323540","https://openalex.org/W2350595686"],"abstract_inverted_index":{"The":[0],"rapid":[1],"advancements":[2],"in":[3,17,77,84,149],"quantum":[4,35,55,74],"computation":[5],"pose":[6],"significant":[7],"threats":[8],"to":[9,34,80,89,145,162],"traditional":[10],"cryptographic":[11,51],"systems,":[12],"such":[13,38],"as":[14,39],"those":[15],"used":[16],"the":[18,48,97,133],"Internet":[19],"of":[20,50,99,106],"Things":[21],"(IoT).":[22],"RSA":[23],"and":[24,41,68,83,111,129,142],"methods":[25,121],"like":[26,87],"Elliptic":[27],"Curve":[28],"Cryptography":[29],"(ECC)":[30],"are":[31,71],"particularly":[32],"vulnerable":[33],"algorithmic":[36],"techniques,":[37],"Shor\u2019s":[40,90],"Grover\u2019s":[42,81],"algorithms.":[43],"This":[44,116],"paper":[45,134],"focuses":[46],"on":[47,54,60,96],"analysis":[49],"models":[52],"based":[53],"technologies,":[56],"with":[57,102],"special":[58],"emphasis":[59],"IoT":[61,114,165],"security.":[62],"It":[63],"examines":[64],"how":[65],"both":[66,127],"symmetric":[67,78],"public-key":[69,85],"cryptography":[70],"affected":[72],"by":[73],"comput-ing\u2014highlighting":[75],"vulnerabilities":[76],"schemes":[79],"algorithm":[82],"systems":[86,138],"ECC":[88],"algorithm.":[91],"Significant":[92],"focus":[93],"is":[94],"placed":[95],"advancement":[98],"quantum-resistant":[100,143],"ECC,":[101,125],"an":[103],"in-depth":[104],"evaluation":[105],"its":[107],"effectiveness,":[108],"security":[109,148],"capabilities,":[110],"suitability":[112],"for":[113,122,158],"applications.":[115],"work":[117],"also":[118],"compares":[119],"various":[120],"implementing":[123],"quantum-enhanced":[124],"considering":[126],"software":[128],"hardware":[130],"solutions.":[131],"Furthermore,":[132],"explores":[135],"emerging":[136],"hybrid":[137],"that":[139],"integrate":[140],"classical":[141],"encryption":[144],"offer":[146],"enhanced":[147],"transitional":[150],"scenarios.":[151],"Lastly,":[152],"it":[153],"outlines":[154],"potential":[155],"research":[156],"avenues":[157],"developing":[159],"new":[160],"techniques":[161],"protect":[163],"future":[164],"networks":[166],"from":[167],"quantum-based":[168],"attacks.":[169]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
