{"id":"https://openalex.org/W4404248876","doi":"https://doi.org/10.1515/jmc-2024-0007","title":"On the quantum security of high-dimensional RSA protocol","display_name":"On the quantum security of high-dimensional RSA protocol","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404248876","doi":"https://doi.org/10.1515/jmc-2024-0007"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2024-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2024-0007","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1515/jmc-2024-0007","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017392108","display_name":"Naeim Rahmani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Nour-eddine Rahmani","raw_affiliation_strings":["ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003147257","display_name":"Taoufik Serraj","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Taoufik Serraj","raw_affiliation_strings":["ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025462153","display_name":"Moulay Chrif Ismaili","orcid":"https://orcid.org/0000-0001-5550-5426"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Moulay Chrif Ismaili","raw_affiliation_strings":["ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco","institution_ids":["https://openalex.org/I4210108110"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048731347","display_name":"Abdelmalek Azizi","orcid":"https://orcid.org/0000-0002-0634-1995"},"institutions":[{"id":"https://openalex.org/I4210108110","display_name":"Mohamed I University","ror":"https://ror.org/01ejxf797","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210108110"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdelmalek Azizi","raw_affiliation_strings":["ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"ACSA Laboratory, Faculty of Sciences, Mohammed Premier University , Oujda , Morocco","institution_ids":["https://openalex.org/I4210108110"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017392108"],"corresponding_institution_ids":["https://openalex.org/I4210108110"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17471172,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"18","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5483702421188354},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5422803163528442},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5262390971183777},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.47334933280944824},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3678855001926422},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.34471312165260315},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08437606692314148}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5483702421188354},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5422803163528442},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5262390971183777},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47334933280944824},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3678855001926422},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34471312165260315},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08437606692314148},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2024-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2024-0007","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ddb55e83cd924af8861c4ddd42c727f5","is_oa":true,"landing_page_url":"https://doaj.org/article/ddb55e83cd924af8861c4ddd42c727f5","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp p. 212-9 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2024-0007","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2024-0007","pdf_url":null,"source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1491861813","https://openalex.org/W1675339804","https://openalex.org/W1978868348","https://openalex.org/W1989510734","https://openalex.org/W2061949491","https://openalex.org/W2084652510","https://openalex.org/W2098290658","https://openalex.org/W2106970188","https://openalex.org/W2141040012","https://openalex.org/W2168676717","https://openalex.org/W2315723423","https://openalex.org/W2603065436","https://openalex.org/W2791664942","https://openalex.org/W2866028610","https://openalex.org/W2920734175","https://openalex.org/W2990927541","https://openalex.org/W3036715653","https://openalex.org/W4226075590","https://openalex.org/W4292101538","https://openalex.org/W4293193836","https://openalex.org/W4381326042","https://openalex.org/W4385188034","https://openalex.org/W6740786498"],"related_works":["https://openalex.org/W2111375262","https://openalex.org/W2317728013","https://openalex.org/W1991205173","https://openalex.org/W2060145807","https://openalex.org/W4248806346","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727","https://openalex.org/W4399217595","https://openalex.org/W1561797008"],"abstract_inverted_index":{"Abstract":[0],"The":[1,73],"idea":[2],"of":[3,20,32,51,54,57,71,91,101],"extending":[4],"the":[5,24,49,52,63,86,99,110],"classical":[6],"RSA":[7,21],"protocol":[8],"using":[9,27],"algebraic":[10,25,55,59],"number":[11,60],"fields":[12],"was":[13],"introduced":[14],"by":[15],"Takagi":[16],"and":[17,30,62,81,88,113],"Naito":[18],"(Construction":[19],"cryptosystem":[22],"over":[23],"field":[26,61],"ideal":[28],"theory":[29,65],"investigation":[31],"its":[33],"security.":[34],"Electron":[35],"Commun":[36],"Japan":[37],"Part":[38],"III":[39],"Fund":[40],"Electr":[41],"Sci.":[42],"2000;83:19\u201329).":[43],"Recently,":[44],"Zheng":[45,102],"et":[46,103],"al.":[47],"proposed":[48,122],"use":[50],"ring":[53],"integers":[56],"an":[58],"lattice":[64],"to":[66],"present":[67,115],"a":[68,116,127,137],"high-dimensional":[69],"form":[70],"RSA.":[72],"authors":[74],"claim":[75],"that":[76,98,132],"their":[77],"proposal":[78],"is":[79,82,106,126],"post-quantum":[80],"significant":[83],"both":[84],"from":[85],"theoretical":[87],"practical":[89,117],"point":[90],"view.":[92],"In":[93],"this":[94,121],"article,":[95],"we":[96,114],"prove":[97],"security":[100],"al.\u2019s":[104],"scheme":[105],"still":[107],"based":[108],"on":[109,120],"factorization":[111],"problem,":[112],"quantum":[118,128],"attack":[119,125],"scheme,":[123],"our":[124],"polynomial":[129],"time":[130],"algorithm":[131,135],"employs":[133],"Shor\u2019s":[134],"as":[136],"subroutine.":[138]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
