{"id":"https://openalex.org/W2015139338","doi":"https://doi.org/10.1109/icitst.2013.6750240","title":"Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography","display_name":"Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2015139338","doi":"https://doi.org/10.1109/icitst.2013.6750240","mag":"2015139338"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050709389","display_name":"Arome Junior Gabriel","orcid":"https://orcid.org/0000-0001-6665-9308"},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"A.J Gabriel","raw_affiliation_strings":["Computer Science Department, The Federal University of Technology, Akure, Ondo State, Nigeria","Computer Science Department, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The Federal University of Technology, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Computer Science Department, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084363743","display_name":"Boniface Kayode Alese","orcid":"https://orcid.org/0000-0002-5709-1017"},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"B.K. Alese","raw_affiliation_strings":["Computer Science Department, The Federal University of Technology, Akure, Ondo State, Nigeria","Computer Science Department, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, The Federal University of Technology, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Computer Science Department, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035327477","display_name":"Adebay\u1ecd Olus\u1ecdla Adetunmbi","orcid":"https://orcid.org/0000-0002-5524-6804"},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"A.O. Adetunmbi","raw_affiliation_strings":["Computer Resource Center, The Federal University of Technology, Akure, Ondo State, Nigeria","Computer Resource Center, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Computer Resource Center, The Federal University of Technology, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Computer Resource Center, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047427901","display_name":"Olumide Sunday Adewale","orcid":"https://orcid.org/0000-0003-4642-0150"},"institutions":[{"id":"https://openalex.org/I180664298","display_name":"Federal University of Technology","ror":"https://ror.org/01pvx8v81","country_code":"NG","type":"education","lineage":["https://openalex.org/I180664298"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"O.S. Adewale","raw_affiliation_strings":["Computer Resource Center, The Federal University of Technology, Akure, Ondo State, Nigeria","Computer Resource Center, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria"],"affiliations":[{"raw_affiliation_string":"Computer Resource Center, The Federal University of Technology, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]},{"raw_affiliation_string":"Computer Resource Center, The Federal University of Technology, P.M.B. 704, Akure, Ondo State, Nigeria","institution_ids":["https://openalex.org/I180664298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050709389"],"corresponding_institution_ids":["https://openalex.org/I180664298"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.08953515,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"449","last_page":"452"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.7575322389602661},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.6729131937026978},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6663488149642944},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6364978551864624},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6166125535964966},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6060652136802673},{"id":"https://openalex.org/keywords/pkcs-#1","display_name":"PKCS #1","score":0.5895028710365295},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.5633673667907715},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.5526646375656128},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.5383526086807251},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5379245281219482},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.5317075848579407},{"id":"https://openalex.org/keywords/financial-cryptography","display_name":"Financial cryptography","score":0.4886484742164612},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4621719717979431},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43802422285079956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3498947024345398},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3180030584335327},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.21555578708648682},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.19383227825164795},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19147664308547974},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.1740085482597351},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.12940359115600586},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.10047739744186401},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07794064283370972},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06951302289962769}],"concepts":[{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.7575322389602661},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.6729131937026978},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6663488149642944},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6364978551864624},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6166125535964966},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6060652136802673},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.5895028710365295},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.5633673667907715},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.5526646375656128},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.5383526086807251},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5379245281219482},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.5317075848579407},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.4886484742164612},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4621719717979431},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43802422285079956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3498947024345398},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3180030584335327},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.21555578708648682},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.19383227825164795},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19147664308547974},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.1740085482597351},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.12940359115600586},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.10047739744186401},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07794064283370972},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06951302289962769}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750240","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W964125998","https://openalex.org/W1824772149","https://openalex.org/W2033626294","https://openalex.org/W2035703056","https://openalex.org/W2067710992","https://openalex.org/W2083889349","https://openalex.org/W2103228545","https://openalex.org/W2126711795","https://openalex.org/W2130072301","https://openalex.org/W2132910944","https://openalex.org/W2144865108","https://openalex.org/W2152167937","https://openalex.org/W2153153350","https://openalex.org/W2163737492","https://openalex.org/W4250351803","https://openalex.org/W4285719527","https://openalex.org/W6638515452","https://openalex.org/W6682802046"],"related_works":["https://openalex.org/W3089213837","https://openalex.org/W2746704214","https://openalex.org/W4235974794","https://openalex.org/W2188587181","https://openalex.org/W4242589469","https://openalex.org/W2362346192","https://openalex.org/W2369864987","https://openalex.org/W2744204007","https://openalex.org/W4229081530","https://openalex.org/W2015139338"],"abstract_inverted_index":{"Crystography":[0],"is":[1,108],"the":[2,10,39,64,70],"combination":[3],"of":[4,12,41,66,72,106],"Cryptography":[5,33,99],"and":[6,30,47,58],"Steganography":[7,101],"for":[8,55],"enhancing":[9],"security":[11,36,105],"communications":[13],"over":[14],"enterprise":[15],"networks.":[16],"Most":[17],"existing":[18],"Crystographic":[19,93],"systems":[20,82],"are":[21],"based":[22,83],"on":[23,38,84],"Public":[24],"key":[25],"Cryptographic":[26],"schemes":[27],"like":[28],"RSA":[29],"Elliptic":[31],"Curve":[32],"(ECC),":[34],"whose":[35],"depends":[37],"difficulty":[40],"solving":[42,56],"Integer":[43],"Factorisation":[44],"Problem":[45],"(IFP)":[46],"Discrete":[48],"Logarithm":[49],"problem":[50],"(DLP)":[51],"respectively.":[52],"However,":[53],"techniques":[54],"IFP":[57],"DLP":[59],"problems,":[60],"improves":[61],"continually.":[62],"Therefore,":[63],"existence":[65],"Quantum":[67,98],"Computers":[68],"in":[69,111],"range":[71],"1000":[73],"bits":[74],"would":[75],"be":[76],"a":[77,91],"real":[78],"world":[79],"threat":[80],"to":[81,102],"those":[85],"problems.":[86],"This":[87],"paper":[88],"thus":[89],"propose":[90],"new":[92],"System":[94],"that":[95,104],"combines":[96],"Post":[97],"with":[100],"ensure":[103],"communication":[107],"maintained":[109],"both":[110],"Classical":[112],"Computing":[113,119],"era":[114],"as":[115,117],"well":[116],"Post-Quantum":[118],"era.":[120]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
