{"id":"https://openalex.org/W4404031647","doi":"https://doi.org/10.1109/icccnt61001.2024.10724484","title":"Recent Trends in Elliptic Curve Cryptography for Authentication Systems","display_name":"Recent Trends in Elliptic Curve Cryptography for Authentication Systems","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031647","doi":"https://doi.org/10.1109/icccnt61001.2024.10724484"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724484","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032999293","display_name":"Koushik V Prasad","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Koushik V Prasad","raw_affiliation_strings":["JAIN (Deemed to be University),School of Engineering and Technology,Department of Mechanical Engineering,Bangalore,Karnataka,India"],"affiliations":[{"raw_affiliation_string":"JAIN (Deemed to be University),School of Engineering and Technology,Department of Mechanical Engineering,Bangalore,Karnataka,India","institution_ids":["https://openalex.org/I106826634"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045211735","display_name":"Ankita Agarwal","orcid":"https://orcid.org/0000-0003-0570-7374"},"institutions":[{"id":"https://openalex.org/I4210133689","display_name":"Maharishi University of Management and Technology","ror":"https://ror.org/03fb58t45","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210133689"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ankita Agarwal","raw_affiliation_strings":["Maharishi University of Information Technology,Maharishi School of Engineering &#x0026; Technology,Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Maharishi University of Information Technology,Maharishi School of Engineering &#x0026; Technology,Uttar Pradesh,India","institution_ids":["https://openalex.org/I4210133689"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113148445","display_name":"Chandra Kant Gautam","orcid":null},"institutions":[{"id":"https://openalex.org/I3131826223","display_name":"The Sanskrit College and University","ror":"https://ror.org/04pr7ha69","country_code":"IN","type":"education","lineage":["https://openalex.org/I3131826223"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Chandra Kant Gautam","raw_affiliation_strings":["Sanskriti University,Department of Mechanical Engineering,Mathura,Uttar Pradesh,India"],"affiliations":[{"raw_affiliation_string":"Sanskriti University,Department of Mechanical Engineering,Mathura,Uttar Pradesh,India","institution_ids":["https://openalex.org/I3131826223"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032999293"],"corresponding_institution_ids":["https://openalex.org/I106826634"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.306124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9291999936103821,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9241999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.8270813226699829},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6456402540206909},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5847008228302002},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5726431608200073},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.46929770708084106},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.46835747361183167},{"id":"https://openalex.org/keywords/financial-cryptography","display_name":"Financial cryptography","score":0.4226991832256317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3817828297615051},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27204644680023193},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19808083772659302},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1586328148841858},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.058712512254714966}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.8270813226699829},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6456402540206909},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5847008228302002},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5726431608200073},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.46929770708084106},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.46835747361183167},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.4226991832256317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3817828297615051},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27204644680023193},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19808083772659302},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1586328148841858},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.058712512254714966}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724484","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724484","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W4223485136","https://openalex.org/W4312438676","https://openalex.org/W4312835327","https://openalex.org/W4313477379","https://openalex.org/W4365146858","https://openalex.org/W4379163652","https://openalex.org/W4383264248","https://openalex.org/W4383340363","https://openalex.org/W4385670540","https://openalex.org/W4386432334","https://openalex.org/W4389445792","https://openalex.org/W4393319695"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W1565266559","https://openalex.org/W1990743860","https://openalex.org/W2782833818","https://openalex.org/W1577956677","https://openalex.org/W2372901083","https://openalex.org/W3018297911","https://openalex.org/W2404540745","https://openalex.org/W2982287142","https://openalex.org/W2534382314"],"abstract_inverted_index":{"Elliptic":[0],"curve":[1,55],"cryptography":[2],"(ECC)":[3],"is":[4,26,122],"a":[5,32,61,119],"powerful":[6],"cryptographic":[7],"technique":[8],"that":[9],"permits":[10],"the":[11,18,23,53,90,96,105,111],"comfortable":[12],"transmission":[13],"of":[14,20,37,89,92,98,107,135],"personal":[15],"statistics":[16],"and":[17,47,77,110,128],"authentication":[19,84,136],"identities":[21],"over":[22],"net.":[24],"It":[25],"miles":[27],"becoming":[28,123],"increasingly":[29],"famous":[30],"as":[31,43],"modern":[33],"protection":[34],"era":[35],"because":[36],"its":[38],"many":[39],"security":[40],"benefits,":[41],"such":[42],"shorter":[44],"key":[45],"lengths":[46],"multiplied":[48],"resistance":[49],"to":[50,71,80],"cryptanalysis.":[51],"Because":[52],"elliptic":[54],"algorithms":[56],"have":[57,65],"advanced,":[58],"more":[59,78,125],"than":[60,137],"few":[62],"recent":[63],"traits":[64,87],"emerged.":[66],"Those":[67,86],"solutions":[68],"are":[69],"designed":[70],"make":[72],"ECC":[73,121],"even":[74,124],"greater":[75],"efficient":[76],"relaxed":[79],"be":[81],"used":[82],"in":[83],"systems.":[85],"consist":[88],"usage":[91],"massive":[93],"high":[94],"fields,":[95],"software":[97],"best":[99],"regular":[100],"bases,":[101],"advanced":[102],"point":[103],"representations,":[104],"adoption":[106],"new":[108],"curves,":[109],"growing":[112],"reliance":[113],"on":[114],"super":[115],"singular":[116],"curves.":[117],"As":[118],"result,":[120],"at":[126],"ease":[127],"can":[129],"provide":[130],"an":[131],"excellent":[132],"higher":[133],"degree":[134],"earlier.":[138]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
