{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:44:56Z","timestamp":1757619896465,"version":"3.44.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T00:00:00Z","timestamp":1753488000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T00:00:00Z","timestamp":1753488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04858-8","type":"journal-article","created":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T06:11:59Z","timestamp":1753510319000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-quantum security with twisted edwards curves and ECC integration"],"prefix":"10.1007","volume":"24","author":[{"given":"R.","family":"Krishnaprabha","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,26]]},"reference":[{"key":"4858_CR1","doi-asserted-by":"crossref","unstructured":"Almazrouei, K., Alnajjar, K.A.: Error-correcting codes in communication systems. In: 2024 International Wireless Communications and Mobile Computing (IWCMC), pp. 1\u20136 (2024)","DOI":"10.1109\/IWCMC61514.2024.10592361"},{"issue":"7671","key":"4858_CR2","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017)","journal-title":"Nature"},{"key":"4858_CR3","unstructured":"Chavet, C., Le Gal, B., Coussy, P., Tourres, M., Alavi, S.F.:. Error correction codes, from communication to cryptography... two sides of one chip. In: Conf\u00e9rence annuelle GdR S\u00e9curit\u00e9 Informatique, (2024)"},{"key":"4858_CR4","doi-asserted-by":"crossref","unstructured":"Chen, L., Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R.A., Smith-Tone, D.: Report on post-quantum cryptography, volume\u00a012. US Department of Commerce, National Institute of Standards and Technology\u00a0..., (2016)","DOI":"10.6028\/NIST.IR.8105"},{"key":"4858_CR5","unstructured":"Gayoso Mart\u00ednez, V., Hern\u00e1ndez Encinas, L., S\u00e1nchez \u00c1vila, C.: A survey of the elliptic curve integrated encryption scheme. (2010)"},{"key":"4858_CR6","doi-asserted-by":"crossref","unstructured":"Hankerson, D., Menezes, A.: Elliptic curve cryptography. In: Encyclopedia of Cryptography, Security and Privacy, pp. 1\u20132. Springer (2021)","DOI":"10.1007\/978-3-642-27739-9_245-2"},{"key":"4858_CR7","unstructured":"Hayward, M.: Quantum computing and shor\u2019s algorithm. Sydney: Macquarie University Mathematics Department (2008)"},{"key":"4858_CR8","doi-asserted-by":"crossref","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted edwards curves revisited. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 326\u2013343. Springer (2008)","DOI":"10.1007\/978-3-540-89255-7_20"},{"issue":"177","key":"4858_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"4858_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, M., Pattnaik, P.: Post quantum cryptography (pqc)-an overview. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/HPEC43674.2020.9286147"},{"issue":"6","key":"4858_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. (CSUR) 51(6), 1\u201341 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"4858_CR12","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1090\/S0273-0979-1987-15544-3","volume":"17","author":"JH Silverman","year":"1987","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves. Bull. Am. Math. Soc. 17, 148\u2013149 (1987)","journal-title":"Bull. Am. Math. Soc."},{"key":"4858_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4252-7","volume-title":"Rational Points on Elliptic Curves","author":"JH Silverman","year":"1992","unstructured":"Silverman, J.H., Tate, J.T.: Rational Points on Elliptic Curves, vol. 9. Springer, Berlin (1992)"},{"key":"4858_CR14","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-319-11659-4_15","volume-title":"International Workshop on Post-Quantum Cryptography","author":"F Song","year":"2014","unstructured":"Song, F.: A note on quantum security for post-quantum cryptography. In: International Workshop on Post-Quantum Cryptography, pp. 246\u2013265. Springer, Berlin (2014)"},{"key":"4858_CR15","unstructured":"Stinson, D.R.: Mathematics for cryptography. (2016)"},{"key":"4858_CR16","unstructured":"Ugwuishiwu, C.H., Orji, U.E., Ugwu, C.I., Asogwa, C.N.: An overview of quantum cryptography and shor\u2019s algorithm. Int. J. Adv. Trends Comput. Sci. Eng. 9(5), (2020)"},{"key":"4858_CR17","doi-asserted-by":"crossref","unstructured":"Varnita, L.S.S., Subramanyam, K., Narasimha, T.P., Bhandari, H., Angayarkanni, S. A.: study on isogeny based cryptography. In: 2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC), pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/ICECCC61767.2024.10593878"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04858-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04858-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04858-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T01:30:47Z","timestamp":1757295047000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04858-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,26]]},"references-count":17,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4858"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04858-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2025,7,26]]},"assertion":[{"value":"22 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"There is no Conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"236"}}