{"id":"https://openalex.org/W4214894928","doi":"https://doi.org/10.1109/ccwc54503.2022.9720790","title":"NTRU and LASH for a Quantum Resistant Blockchain","display_name":"NTRU and LASH for a Quantum Resistant Blockchain","publication_year":2022,"publication_date":"2022-01-26","ids":{"openalex":"https://openalex.org/W4214894928","doi":"https://doi.org/10.1109/ccwc54503.2022.9720790"},"language":"en","primary_location":{"id":"doi:10.1109/ccwc54503.2022.9720790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc54503.2022.9720790","pdf_url":null,"source":{"id":"https://openalex.org/S4363608098","display_name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084845177","display_name":"Chuck Easttom","orcid":"https://orcid.org/0000-0002-6744-6731"},"institutions":[{"id":"https://openalex.org/I184565670","display_name":"Georgetown University","ror":"https://ror.org/05vzafd60","country_code":"US","type":"education","lineage":["https://openalex.org/I184565670"]},{"id":"https://openalex.org/I4210106218","display_name":"Institute for Linguistic Evidence","ror":"https://ror.org/019rrzp31","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210106218"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chuck Easttom","raw_affiliation_strings":["Georgetown University,United States","Georgetown University, United States"],"affiliations":[{"raw_affiliation_string":"Georgetown University,United States","institution_ids":["https://openalex.org/I184565670","https://openalex.org/I4210106218"]},{"raw_affiliation_string":"Georgetown University, United States","institution_ids":["https://openalex.org/I184565670"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084845177"],"corresponding_institution_ids":["https://openalex.org/I184565670","https://openalex.org/I4210106218"],"apc_list":null,"apc_paid":null,"fwci":0.2913,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.47882831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9549999833106995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9666739702224731},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.862321138381958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7021912932395935},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.6065082550048828},{"id":"https://openalex.org/keywords/ntru","display_name":"NTRU","score":0.5848603248596191},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.563572883605957},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43101251125335693},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.41599246859550476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38474351167678833},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.37028968334198},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20621463656425476},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.13300582766532898},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10954168438911438},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10567048192024231},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.08570438623428345},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.07523587346076965}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9666739702224731},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.862321138381958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7021912932395935},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.6065082550048828},{"id":"https://openalex.org/C122368425","wikidata":"https://www.wikidata.org/wiki/Q6955493","display_name":"NTRU","level":4,"score":0.5848603248596191},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.563572883605957},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43101251125335693},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.41599246859550476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38474351167678833},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.37028968334198},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20621463656425476},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13300582766532898},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10954168438911438},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10567048192024231},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.08570438623428345},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.07523587346076965}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccwc54503.2022.9720790","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccwc54503.2022.9720790","pdf_url":null,"source":{"id":"https://openalex.org/S4363608098","display_name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1513904472","https://openalex.org/W2477092523","https://openalex.org/W2557383824","https://openalex.org/W2603065436","https://openalex.org/W2735590426","https://openalex.org/W2754529701","https://openalex.org/W2765971729","https://openalex.org/W2779943051","https://openalex.org/W2805377271","https://openalex.org/W2890851917","https://openalex.org/W2896582668","https://openalex.org/W2921980263","https://openalex.org/W2922252487","https://openalex.org/W2957499534","https://openalex.org/W2979990733","https://openalex.org/W3017089210","https://openalex.org/W3021821211","https://openalex.org/W3035858830","https://openalex.org/W3104029894","https://openalex.org/W3128444354","https://openalex.org/W3198459119","https://openalex.org/W6747321050"],"related_works":["https://openalex.org/W3173021030","https://openalex.org/W3212142976","https://openalex.org/W4229818418","https://openalex.org/W4310449350","https://openalex.org/W2558478802","https://openalex.org/W4308642416","https://openalex.org/W2350092350","https://openalex.org/W2398072191","https://openalex.org/W1974628768","https://openalex.org/W4312389283"],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2],"permeated":[3],"society":[4],"and":[5],"is":[6],"being":[7],"applied":[8],"to":[9,21,36,39],"numerous":[10],"industries.":[11],"However,":[12],"the":[13,45],"advent":[14],"of":[15,47],"quantum":[16,40,48,60],"computing":[17,41],"poses":[18],"a":[19,57],"threat":[20],"current":[22,53],"blockchain":[23,28,50],"implementations.":[24,51],"Most":[25],"widely":[26],"used":[27],"implementations":[29],"depend":[30],"on":[31],"algorithms":[32],"that":[33],"are":[34],"known":[35],"be":[37],"vulnerable":[38],"attacks.":[42],"This":[43],"necessitates":[44],"exploration":[46],"resistant":[49,61],"The":[52],"study":[54],"provides":[55],"such":[56],"proposal":[58],"for":[59],"blockchain.":[62]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
