{"id":"https://openalex.org/W4384932556","doi":"https://doi.org/10.3390/cryptography7030037","title":"A New RSA Variant Based on Elliptic Curves","display_name":"A New RSA Variant Based on Elliptic Curves","publication_year":2023,"publication_date":"2023-07-19","ids":{"openalex":"https://openalex.org/W4384932556","doi":"https://doi.org/10.3390/cryptography7030037"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7030037","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030037","pdf_url":"https://www.mdpi.com/2410-387X/7/3/37/pdf?version=1689762503","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/3/37/pdf?version=1689762503","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059229145","display_name":"Maher Boudabra","orcid":"https://orcid.org/0000-0001-5043-0058"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Maher Boudabra","raw_affiliation_strings":["Department of Computing and Mathematics, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Mathematics, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083370009","display_name":"Abderrahmane Nitaj","orcid":"https://orcid.org/0000-0002-0372-1757"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210105918","display_name":"Normandie Universit\u00e9","ror":"https://ror.org/01k40cz91","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I98702875","display_name":"Universit\u00e9 de Caen Normandie","ror":"https://ror.org/051kpcy16","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Abderrahmane Nitaj","raw_affiliation_strings":["Department of Mathematics, LMNO, Normandie University, UNICAEN, CNRS, LMNO, 14000 Caen, France"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, LMNO, Normandie University, UNICAEN, CNRS, LMNO, 14000 Caen, France","institution_ids":["https://openalex.org/I98702875","https://openalex.org/I4210105918","https://openalex.org/I1294671590"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083370009"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210105918","https://openalex.org/I98702875"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.9003,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79184944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"7","issue":"3","first_page":"37","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.7054013013839722},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6235031485557556},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.5391280055046082},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5048807263374329},{"id":"https://openalex.org/keywords/integer-factorization","display_name":"Integer factorization","score":0.48710036277770996},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.4481316804885864},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43266281485557556},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.42649465799331665},{"id":"https://openalex.org/keywords/factorization","display_name":"Factorization","score":0.4262332022190094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3942941129207611},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2978782653808594},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.24933907389640808},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2338765263557434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09449687600135803}],"concepts":[{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.7054013013839722},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6235031485557556},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.5391280055046082},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5048807263374329},{"id":"https://openalex.org/C119677069","wikidata":"https://www.wikidata.org/wiki/Q4846249","display_name":"Integer factorization","level":4,"score":0.48710036277770996},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.4481316804885864},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43266281485557556},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.42649465799331665},{"id":"https://openalex.org/C187834632","wikidata":"https://www.wikidata.org/wiki/Q188804","display_name":"Factorization","level":2,"score":0.4262332022190094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3942941129207611},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2978782653808594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.24933907389640808},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2338765263557434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09449687600135803}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography7030037","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030037","pdf_url":"https://www.mdpi.com/2410-387X/7/3/37/pdf?version=1689762503","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-04222034v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04222034","pdf_url":"https://hal.science/hal-04222034/document","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 2410-387X","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:7f056307070d41ea86672daf034109ea","is_oa":true,"landing_page_url":"https://doaj.org/article/7f056307070d41ea86672daf034109ea","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 3, p 37 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7030037","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030037","pdf_url":"https://www.mdpi.com/2410-387X/7/3/37/pdf?version=1689762503","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4384932556.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W423632294","https://openalex.org/W599933888","https://openalex.org/W633449635","https://openalex.org/W1486898453","https://openalex.org/W1503520699","https://openalex.org/W1508193711","https://openalex.org/W1532946854","https://openalex.org/W1553510179","https://openalex.org/W1558077212","https://openalex.org/W1972565281","https://openalex.org/W2003736153","https://openalex.org/W2005317356","https://openalex.org/W2036378739","https://openalex.org/W2053464283","https://openalex.org/W2077446729","https://openalex.org/W2101040389","https://openalex.org/W2105418754","https://openalex.org/W2143772938","https://openalex.org/W2156666175","https://openalex.org/W2166780626","https://openalex.org/W2179025976","https://openalex.org/W2218139189","https://openalex.org/W2299136937","https://openalex.org/W2338543656","https://openalex.org/W2484860292","https://openalex.org/W2941958523","https://openalex.org/W3023478445","https://openalex.org/W4211068006","https://openalex.org/W4232836212","https://openalex.org/W4233185505","https://openalex.org/W4233922002","https://openalex.org/W4243791792","https://openalex.org/W6614788549","https://openalex.org/W6633270832","https://openalex.org/W6633485244"],"related_works":["https://openalex.org/W27999159","https://openalex.org/W1999127230","https://openalex.org/W18328579","https://openalex.org/W2018555057","https://openalex.org/W2154571469","https://openalex.org/W2160642957","https://openalex.org/W2041544105","https://openalex.org/W2540612917","https://openalex.org/W1604946673","https://openalex.org/W1494454048"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,73],"propose":[4],"a":[5,14,25],"new":[6,22,50,98],"scheme":[7,23,51,99],"based":[8],"on":[9],"ephemeral":[10],"elliptic":[11],"curves":[12],"over":[13],"finite":[15],"ring":[16],"with":[17],"an":[18],"RSA":[19,30,88],"modulus.":[20],"The":[21],"is":[24,56],"variant":[26],"of":[27,48],"both":[28,40],"the":[29,32,46,49,76,84,93,97],"and":[31,35,42,52,69,89],"KMOV":[33],"cryptosystems":[34],"can":[36,79],"be":[37,80],"used":[38],"for":[39],"signature":[41],"encryption.":[43],"We":[44],"study":[45],"security":[47],"show":[53,74],"that":[54,75],"it":[55],"immune":[57],"to":[58],"factorization":[59],"attacks,":[60,62,64,66,68],"discrete-logarithm-problem":[61],"sum-of-two-squares":[63],"sum-of-four-squares":[65],"isomorphism":[67],"homomorphism":[70],"attacks.":[71],"Moreover,":[72],"private":[77],"exponents":[78,86],"much":[81],"smaller":[82],"than":[83],"ordinary":[85],"in":[87,96],"KMOV,":[90],"which":[91],"makes":[92],"decryption":[94],"phase":[95],"more":[100],"efficient.":[101]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2023-07-22T00:00:00"}
