{"id":"https://openalex.org/W4413915535","doi":"https://doi.org/10.1145/3745812.3745888","title":"Comparing Quantum-Resistant Cryptographic Algorithms for Securing Next-Generation Communications","display_name":"Comparing Quantum-Resistant Cryptographic Algorithms for Securing Next-Generation Communications","publication_year":2024,"publication_date":"2024-12-23","ids":{"openalex":"https://openalex.org/W4413915535","doi":"https://doi.org/10.1145/3745812.3745888"},"language":"en","primary_location":{"id":"doi:10.1145/3745812.3745888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745888","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3745812.3745888","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119513779","display_name":"Satish Shankarrao Banait","orcid":null},"institutions":[{"id":"https://openalex.org/I2802982682","display_name":"Sandip Foundation","ror":"https://ror.org/04vhxp922","country_code":"IN","type":"education","lineage":["https://openalex.org/I2802982682"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Satish Shankarrao Banait","raw_affiliation_strings":["School of Compter Science &amp; Engg. Sandip University, Sandip University, Nashik., Nashik, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0002-4159-9094","affiliations":[{"raw_affiliation_string":"School of Compter Science &amp; Engg. Sandip University, Sandip University, Nashik., Nashik, Maharashtra, India","institution_ids":["https://openalex.org/I2802982682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119513780","display_name":"Komal Baburao Umare","orcid":null},"institutions":[{"id":"https://openalex.org/I121750182","display_name":"National Institute of Technology Warangal","ror":"https://ror.org/017ebfz38","country_code":"IN","type":"education","lineage":["https://openalex.org/I121750182"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Komal Baburao Umare","raw_affiliation_strings":["Electronics and Communication Engineering, National Institute of Technology Warangal Telangana, Warangal, Telangana, India"],"raw_orcid":"https://orcid.org/0009-0002-4455-6775","affiliations":[{"raw_affiliation_string":"Electronics and Communication Engineering, National Institute of Technology Warangal Telangana, Warangal, Telangana, India","institution_ids":["https://openalex.org/I121750182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110660626","display_name":"M. R. Sen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125057","display_name":"Vivekananda Global University","ror":"https://ror.org/038mz4r36","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125057"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Madhumay Sen","raw_affiliation_strings":["Computer Science and Applications, Vivekananda Global university, Jaipur, Rajasthan, India"],"raw_orcid":"https://orcid.org/0009-0002-9872-0833","affiliations":[{"raw_affiliation_string":"Computer Science and Applications, Vivekananda Global university, Jaipur, Rajasthan, India","institution_ids":["https://openalex.org/I4210125057"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071404767","display_name":"Sandeep Kumar","orcid":"https://orcid.org/0000-0002-4752-7884"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sandeep Kumar","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence, SR University, Warangal, Telangana, India"],"raw_orcid":"https://orcid.org/0000-0002-4752-7884","affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence, SR University, Warangal, Telangana, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082942970","display_name":"Parikshit N. Mahalle","orcid":"https://orcid.org/0000-0001-5474-6826"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Parikshit N. Mahalle","raw_affiliation_strings":["Department of Artificial Intelligence and Data Science, Vishwakarma Institute of Technology, Pune, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0001-5474-6826","affiliations":[{"raw_affiliation_string":"Department of Artificial Intelligence and Data Science, Vishwakarma Institute of Technology, Pune, Maharashtra, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031387629","display_name":"Jambi Ratna Raja Kumar","orcid":"https://orcid.org/0000-0002-9870-7076"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jambi Ratna Raja Kumar","raw_affiliation_strings":["Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, Maharashtra, India"],"raw_orcid":"https://orcid.org/0000-0002-9870-7076","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, Maharashtra, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5119513779"],"corresponding_institution_ids":["https://openalex.org/I2802982682"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30074463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9878000020980835,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7205226421356201},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6235526204109192},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.41183650493621826},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3628505766391754},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2872512936592102}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7205226421356201},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6235526204109192},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.41183650493621826},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3628505766391754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2872512936592102}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3745812.3745888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745888","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3745812.3745888","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3745812.3745888","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2007000413","https://openalex.org/W2613836390","https://openalex.org/W2801513415","https://openalex.org/W2803371618","https://openalex.org/W2896685021","https://openalex.org/W2899381463","https://openalex.org/W2948602808","https://openalex.org/W3008629526","https://openalex.org/W3015258349","https://openalex.org/W3134524119","https://openalex.org/W3154892646","https://openalex.org/W4206417503","https://openalex.org/W4251010021","https://openalex.org/W4280552546","https://openalex.org/W4388366447","https://openalex.org/W4394603650"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Abstract:":[0],"Traditional":[1],"encryption":[2,50,92,248],"systems,":[3],"like":[4,34,183],"RSA":[5],"and":[6,21,36,87,127,134,142,154,172,189,211,246,253],"ECC":[7],"(Elliptic":[8],"Curve":[9],"Cryptography),":[10],"are":[11,25,58,81,192],"in":[12,136,144,238],"big":[13],"danger":[14],"because":[15],"quantum":[16,38,79,232,242],"computing":[17,176],"is":[18,216],"getting":[19],"better":[20],"faster.":[22],"These":[23],"systems":[24],"the":[26,47,95,100,105,152,184,202,206],"foundation":[27],"of":[28,46,62,98,108,116,138,175,187,208],"safe":[29,209,237],"messaging":[30],"today.":[31],"Using":[32],"algorithms":[33,226],"Shor's":[35],"Grover's,":[37],"computers":[39,80],"might":[40],"be":[41,229],"able":[42],"to":[43,68,160,194,217],"break":[44],"many":[45],"most":[48],"common":[49],"methods.":[51],"So,":[52],"people":[53],"who":[54],"work":[55,76],"with":[56,71,94,158,225],"cryptography":[57,66,197],"doing":[59,193],"a":[60,173,239],"lot":[61,174],"study":[63,148,203],"on":[64],"quantum-resistant":[65,161],"(QRC)":[67],"come":[69,157],"up":[70],"methods":[72,93,166,198,224,249],"that":[73,156,221,227],"will":[74,250],"still":[75],"even":[77],"when":[78],"used.":[82],"This":[83],"essay":[84],"looks":[85,112,204],"at":[86,113,180],"rates":[88,131],"different":[89],"quantum-":[90],"resistant":[91],"main":[96],"goal":[97],"finding":[99],"best":[101],"ones":[102],"for":[103],"protecting":[104],"next":[106],"generation":[107],"communication":[109,210],"systems.":[110],"It":[111,130],"various":[114],"types":[115],"algorithms,":[117],"such":[118],"as":[119],"hash-based":[120],"cryptography,":[121,123],"code-based":[122],"multivariate":[124],"quadratic":[125],"equations,":[126],"lattice-based":[128],"cryptography.":[129,162],"their":[132],"pros":[133],"cons":[135],"terms":[137],"security,":[139],"computational":[140],"efficiency,":[141],"usefulness":[143],"real":[145],"life.":[146],"The":[147],"also":[149],"talks":[150],"about":[151],"problems":[153],"trade-offs":[155],"switching":[159],"For":[163],"example,":[164],"some":[165],"need":[167],"very":[168],"large":[169],"key":[170],"sizes":[171],"power.":[177],"We":[178],"look":[179],"what":[181],"groups":[182],"National":[185],"Institute":[186],"Standards":[188],"Technology":[190],"(NIST)":[191],"make":[195],"post-quantum":[196],"more":[199,252,254],"uniform.":[200],"Lastly,":[201],"into":[205],"future":[207],"stresses":[212],"how":[213],"important":[214],"it":[215],"use":[218],"mixed":[219],"cryptosystems":[220],"combine":[222],"traditional":[223],"can't":[228],"broken":[230],"by":[231],"computers.":[233],"To":[234],"keep":[235],"interactions":[236],"world":[240],"after":[241],"computing,":[243],"strong,":[244],"flexible,":[245],"effective":[247],"become":[251],"important.":[255]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
