{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:45:28Z","timestamp":1743155128671,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813078"},{"type":"electronic","value":"9783031813085"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81308-5_27","type":"book-chapter","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:25:50Z","timestamp":1740065150000},"page":"287-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Computing in Cybersecurity Using Quantum Key Distribution and Quantum Random Number Generator"],"prefix":"10.1007","author":[{"given":"Archit","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Shilpi","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Narayan C.","family":"Debnath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,21]]},"reference":[{"issue":"8","key":"27_CR1","doi-asserted-by":"publisher","first-page":"358","DOI":"10.3390\/info13080358","volume":"13","author":"A Saini","year":"2022","unstructured":"Saini, A., Tsokanos, A., Kirner, R.: Quantum randomness in cryptography\u2014a survey of cryptosystems, RNG-based ciphers, and QRNGs. Information 13(8), 358 (2022)","journal-title":"Information"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Shapna Akter, M.: Quantum cryptography for enhanced network security: a comprehensive survey of research, developments, and future directions (2023). arXiv e-prints: arXiv:2306","DOI":"10.1109\/BigData59044.2023.10386889"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"157356","DOI":"10.1109\/ACCESS.2020.3019345","volume":"8","author":"OS Althobaiti","year":"2020","unstructured":"Althobaiti, O.S., Dohler, M.: \u201cCybersecurity challenges associated with the internet of things in a post-quantum world. IEEE Access 8, 157356\u2013157381 (2020)","journal-title":"IEEE Access"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Nurhadi, A.I., Syambas. N.R.: Quantum key distribution (QKD) protocols: A survey. In: 2018 4th International conference on wireless and telematics (ICWT). IEEE (2018)","DOI":"10.1109\/ICWT.2018.8527822"},{"issue":"6","key":"27_CR5","doi-asserted-by":"publisher","first-page":"065001","DOI":"10.1117\/1.AP.3.6.065001","volume":"3","author":"C Schimpf","year":"2021","unstructured":"Schimpf, C., et al.: Entanglement-based quantum key distribution with a blinking-free quantum dot operated at a temperature up to 20 K. Adv. Photon. 3(6), 065001\u2013065001 (2021)","journal-title":"Adv. Photon."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Kalra, M., Poonia, R.C.: Design a new protocol and compare with BB84 protocol for quantum key distribution. In: Soft computing for problem solving: SocProS 2017, vol. 2. Springer Singapore (2019)","DOI":"10.1007\/978-981-13-1595-4_76"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Amer, O., Krawec, W.O., Wang, B.: Efficient routing for quantum key distribution networks. In: 2020 IEEE international conference on quantum computing and engineering (QCE). IEEE (2020)","DOI":"10.1109\/QCE49297.2020.00027"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Williams, J., et al.: Implementation of quantum key distribution and quantum clock synchronization via time bin encoding. In: Quantum computing, communication, and simulation, vol. 11699. SPIE (2021)","DOI":"10.1117\/12.2581862"},{"key":"27_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2548-3","volume":"19","author":"H-J Ding","year":"2020","unstructured":"Ding, H.-J., et al.: Predicting optimal parameters with random forest for quantum key distribution. Quantum Inf. Process. 19, 1\u20138 (2020)","journal-title":"Quantum Inf. Process."},{"key":"27_CR10","unstructured":"Dhoha, A.-M., et al.: Quantum cryptography on IBM QX. In: 2019 2nd international conference on computer applications & information security (ICCAIS). IEEE (2019)"},{"issue":"5","key":"27_CR11","doi-asserted-by":"publisher","first-page":"3144","DOI":"10.1109\/TIT.2022.3141874","volume":"68","author":"K Yao","year":"2022","unstructured":"Yao, K., Krawec, W.O., Zhu, J.: Quantum sampling for finite key rates in high dimensional quantum cryptography. IEEE Trans. Inf. Theory 68(5), 3144\u20133163 (2022)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"27_CR12","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/j.matpr.2021.05.593","volume":"51","author":"S Abidin","year":"2022","unstructured":"Abidin, S., et al.: Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC). Mater. Today Proc. 51, 508\u2013514 (2022)","journal-title":"Mater. Today Proc."},{"issue":"1","key":"27_CR13","first-page":"308","volume":"4","author":"I Traboulsi","year":"2024","unstructured":"Traboulsi, I.: Quantum random number generation-security analysis: investigating security analysis of quantum random number generation (QRNG) methods for generating truly random numbers with quantum mechanical processes. J. Artif. Intell. Res. Appl. 4(1), 308\u2013319 (2024)","journal-title":"J. Artif. Intell. Res. Appl."},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"110259","DOI":"10.1016\/j.comnet.2024.110259","volume":"242","author":"D Soler","year":"2024","unstructured":"Soler, D., et al.: A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs. Comput. Netw. 242, 110259 (2024)","journal-title":"Comput. Netw."},{"issue":"3","key":"27_CR15","first-page":"41","volume":"7","author":"M Iavich","year":"2021","unstructured":"Iavich, M., et al.: Novel quantum random number generator with the improved certification method. Int. J. Math. Sci. Comput. (IJMSC) 7(3), 41 (2021)","journal-title":"Int. J. Math. Sci. Comput. (IJMSC)"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"279","DOI":"10.12785\/ijcds\/150122","volume":"15","author":"RB Prajapati","year":"2024","unstructured":"Prajapati, R.B., Panchal, S.D.: Enhanced approach to generate one time password (OTP) using quantum true random number generator (QTRNG). Int. J. Comput. Digit. Syst. 15(1), 279\u2013292 (2024)","journal-title":"Int. J. Comput. Digit. Syst."},{"key":"27_CR17","unstructured":"Regazzoni, F., et al.: A high speed integrated quantum random number generator with on-chip real-time randomness extraction (2021). arXiv preprint: arXiv:2102.06238"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Proceedings of the 11th International Conference on Advanced Intelligent Systems and Informatics (AISI 2025)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81308-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:25:58Z","timestamp":1740065158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81308-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813078","9783031813085"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81308-5_27","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AISI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Intelligent Systems and Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Port Said","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 January 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 January 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aisi2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.egyptscience-srge.com\/AISI2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}