{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:38:40Z","timestamp":1770287920938,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100016978","name":"CODE","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100016978","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,20]]},"DOI":"10.1109\/csndsp54353.2022.9907900","type":"proceedings-article","created":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T19:41:19Z","timestamp":1665085279000},"page":"344-349","source":"Crossref","is-referenced-by-count":3,"title":["Performance analysis of the QKD algorithm using RS and AES"],"prefix":"10.1109","author":[{"given":"Jose","family":"Azocar","sequence":"first","affiliation":[{"name":"Faculty of Engineering University of Santiago of Chile,Centre for Multidisciplinary Research in Telecommunication Technologies (CIMTT),Department of Electrical Engineering"}]},{"given":"Ismael","family":"Soto","sequence":"additional","affiliation":[{"name":"Faculty of Engineering University of Santiago of Chile,Centre for Multidisciplinary Research in Telecommunication Technologies (CIMTT),Department of Electrical Engineering"}]},{"given":"Sebastian","family":"Lara","sequence":"additional","affiliation":[{"name":"Faculty of Engineering University of Santiago of Chile,Centre for Multidisciplinary Research in Telecommunication Technologies (CIMTT),Department of Electrical Engineering"}]},{"given":"Sebastian","family":"Gutierrez","sequence":"additional","affiliation":[{"name":"Economics School Universidad Central de Chile and Universidad Mayor,Chile"}]},{"given":"Pablo","family":"Palacios","sequence":"additional","affiliation":[{"name":"Universidad de Chile,Departamento de Ingenier&#x00E1; El&#x00E9;ctrica,Chile"}]},{"given":"Cesar","family":"Azurdia","sequence":"additional","affiliation":[{"name":"Universidad de Chile,Departamento de Ingenier&#x00E1; El&#x00E9;ctrica,Chile"}]}],"member":"263","reference":[{"key":"ref10","author":"mosleh","year":"2015","journal-title":"Combination of Cryptography and Channel Coding for Wireless Communications"},{"key":"ref11","author":"lubbe","year":"0","journal-title":"Basic Methods of Cryptography"},{"key":"ref12","article-title":"ALGORITMOS DE ENCRIPTACI&#x00D3;N DE CLAVEASIM&#x00C9;TRICA","author":"franchi","year":"2012","journal-title":"Journal de la soci&#x00E9;t&#x00E9; des am&#x00E9;ricanistes"},{"key":"ref13","article-title":"30. Cryptography","author":"forouzan","year":"2007","journal-title":"Data Communications and Networking"},{"key":"ref14","author":"nagarajan","year":"2005","journal-title":"An Automated Analysis of the Security of Quantum Key Distribution"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.06.002"},{"key":"ref16","first-page":"117","author":"koblitz","year":"1998","journal-title":"Elliptic and Hyperelliptic Cryptosystems"},{"key":"ref17","article-title":"A Study of Encryption Algorithms AES, DES and RSA for Security","volume":"13","author":"mahajan","year":"2013","journal-title":"Global Journal of Computer Science and TechnologyNetwork Web & Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SACVLC53127.2021.9652309"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1364\/OE.26.006010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2015.209"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/6\/063027"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2008.4610789"},{"key":"ref7","author":"morales-luna","year":"2015","journal-title":"Hacia comunicaciones seguras de tipo cu&#x00E1;ntico"},{"key":"ref2","article-title":"The improvement of QKD scheme based on BB84 protocol","author":"li","year":"2017","journal-title":"Proceedings - 2016 International Conference on Information System and Artificial Intelligence ISAI 2016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.771"}],"event":{"name":"2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)","location":"Porto, Portugal","start":{"date-parts":[[2022,7,20]]},"end":{"date-parts":[[2022,7,22]]}},"container-title":["2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9907868\/9907893\/09907900.pdf?arnumber=9907900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:56:59Z","timestamp":1667516219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9907900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/csndsp54353.2022.9907900","relation":{},"subject":[],"published":{"date-parts":[[2022,7,20]]}}}