{"id":"https://openalex.org/W4388938204","doi":"https://doi.org/10.1109/icccnt56998.2023.10307081","title":"Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers","display_name":"Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388938204","doi":"https://doi.org/10.1109/icccnt56998.2023.10307081"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10307081","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307081","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084458056","display_name":"Taniya Hasija","orcid":"https://orcid.org/0000-0002-3891-3732"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Taniya Hasija","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108023962","display_name":"K. R. Ramkumar","orcid":null},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. R. Ramkumar","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081394876","display_name":"K. K. Singh","orcid":"https://orcid.org/0000-0003-4374-7713"},"institutions":[{"id":"https://openalex.org/I1340206300","display_name":"Defence Research and Development Organisation","ror":"https://ror.org/05k37v296","country_code":"IN","type":"government","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210150591"]},{"id":"https://openalex.org/I4210121405","display_name":"Centre for Artificial Intelligence and Robotics","ror":"https://ror.org/01xnbq218","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1340206300","https://openalex.org/I4210121405","https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhupendra Singh","raw_affiliation_strings":["Defence Research and Development Organisation,Centre for Artificial Intelligence &#x0026; Robotics,Bangalore,India"],"affiliations":[{"raw_affiliation_string":"Defence Research and Development Organisation,Centre for Artificial Intelligence &#x0026; Robotics,Bangalore,India","institution_ids":["https://openalex.org/I4210121405","https://openalex.org/I1340206300"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100647612","display_name":"Amanpreet Kaur","orcid":"https://orcid.org/0000-0003-3402-2411"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amanpreet Kaur","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067586960","display_name":"S. K. Mittal","orcid":"https://orcid.org/0000-0002-5434-244X"},"institutions":[{"id":"https://openalex.org/I74319210","display_name":"Chitkara University","ror":"https://ror.org/057d6z539","country_code":"IN","type":"education","lineage":["https://openalex.org/I74319210"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sudesh Kumar Mittal","raw_affiliation_strings":["Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India"],"affiliations":[{"raw_affiliation_string":"Chitkara University Institute of Engineering and Technology Chitkara University,Punjab,India","institution_ids":["https://openalex.org/I74319210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5084458056"],"corresponding_institution_ids":["https://openalex.org/I74319210"],"apc_list":null,"apc_paid":null,"fwci":0.5237,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72443892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7183165550231934},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7009267807006836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.656258225440979},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.574043869972229},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.5594078302383423},{"id":"https://openalex.org/keywords/financial-cryptography","display_name":"Financial cryptography","score":0.542133092880249},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4980335235595703},{"id":"https://openalex.org/keywords/strong-cryptography","display_name":"Strong cryptography","score":0.4710162878036499},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.46520644426345825},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.441629022359848},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.3580145835876465},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3298135995864868},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2769933342933655},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.14330413937568665},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.1084420382976532}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7183165550231934},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7009267807006836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.656258225440979},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.574043869972229},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.5594078302383423},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.542133092880249},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4980335235595703},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.4710162878036499},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.46520644426345825},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.441629022359848},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3580145835876465},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3298135995864868},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2769933342933655},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.14330413937568665},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.1084420382976532},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10307081","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307081","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1500356409","https://openalex.org/W1571067952","https://openalex.org/W1605116544","https://openalex.org/W1629301835","https://openalex.org/W1964723977","https://openalex.org/W2041551598","https://openalex.org/W2052131022","https://openalex.org/W2056104157","https://openalex.org/W2084652510","https://openalex.org/W2121213780","https://openalex.org/W2126629338","https://openalex.org/W2142798909","https://openalex.org/W2153360337","https://openalex.org/W2168676717","https://openalex.org/W2212436842","https://openalex.org/W2398921709","https://openalex.org/W2540411213","https://openalex.org/W2594570269","https://openalex.org/W2627086439","https://openalex.org/W2729223247","https://openalex.org/W2883417173","https://openalex.org/W2932447352","https://openalex.org/W3081426351","https://openalex.org/W3150650777","https://openalex.org/W3171756682","https://openalex.org/W4251491041","https://openalex.org/W4288754535","https://openalex.org/W4321349862","https://openalex.org/W4321353476","https://openalex.org/W4362497013","https://openalex.org/W4376465220","https://openalex.org/W6629828591","https://openalex.org/W6634240674","https://openalex.org/W6678994801","https://openalex.org/W6734623912","https://openalex.org/W6739730039"],"related_works":["https://openalex.org/W2858049852","https://openalex.org/W2917683495","https://openalex.org/W2188587181","https://openalex.org/W4287883653","https://openalex.org/W2613850739","https://openalex.org/W3099100150","https://openalex.org/W1585813234","https://openalex.org/W2548263541","https://openalex.org/W2739516235","https://openalex.org/W2187813466"],"abstract_inverted_index":{"In":[0,51],"an":[1],"increasingly":[2],"digital":[3,64],"world,":[4],"security":[5,62,164],"has":[6,29],"become":[7],"paramount.":[8],"Whether":[9],"it's":[10],"personal":[11],"information,":[12,77],"financial":[13],"transactions,":[14],"or":[15],"sensitive":[16,134,166],"communications,":[17],"the":[18,68,86,111,116,126,150,163,169],"need":[19],"to":[20,75,81,132,139,145,156],"safeguard":[21],"data":[22],"from":[23,46,99],"unauthorized":[24,82],"access":[25],"and":[26,43,49,73,92,110,143,147,161],"malicious":[27],"activities":[28],"never":[30],"been":[31],"more":[32],"critical.":[33],"Security":[34],"plays":[35],"a":[36,57],"vital":[37],"role":[38],"in":[39,63,115,149,168],"protecting":[40],"individuals,":[41],"organizations,":[42],"even":[44],"nations":[45],"potential":[47],"threats":[48],"risks.":[50],"this":[52],"context,":[53],"cryptography":[54,90,95,108,123],"emerges":[55],"as":[56],"fundamental":[58],"tool":[59],"for":[60],"ensuring":[61],"systems.":[65],"Cryptography":[66],"involves":[67],"use":[69],"of":[70,118,129,152,165],"mathematical":[71,130],"algorithms":[72,91,96,109],"techniques":[74],"encode":[76],"making":[78],"it":[79],"unintelligible":[80],"parties.":[83],"To":[84],"secure":[85,133],"information":[87,167],"symmetric":[88,106],"key":[89,94,107,122],"asymmetric":[93],"are":[97],"implemented":[98],"last":[100],"five":[101],"decades.":[102],"This":[103,136],"review":[104,137],"examines":[105],"challenges":[112,159],"they":[113],"face":[114],"era":[117],"quantum":[119,170],"computing.":[120],"Symmetric":[121],"relies":[124],"on":[125],"computational":[127],"complexity":[128],"problems":[131],"information.":[135],"aims":[138],"provide":[140],"valuable":[141],"insights":[142],"awareness":[144],"researchers":[146],"practitioners":[148],"field":[151],"cryptography,":[153],"enabling":[154],"them":[155],"address":[157],"these":[158],"effectively":[160],"maintain":[162],"era.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
