{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:11:34Z","timestamp":1770891094476,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1109\/ewdts59469.2023.10297088","type":"proceedings-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T17:46:54Z","timestamp":1698947214000},"page":"1-4","source":"Crossref","is-referenced-by-count":10,"title":["Performance and Comparative Analysis of Elliptic Curve Cryptography and RSA"],"prefix":"10.1109","author":[{"given":"Elza","family":"Jintcharadze","sequence":"first","affiliation":[{"name":"Batumi Shota Rustaveli State University,Department of Computer Science,Batumi,Georgia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marina","family":"Abashidze","sequence":"additional","affiliation":[{"name":"Batumi Maritime Academy,Maritime Faculty,Batumi,Georgia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2011.6107841"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_31"},{"key":"ref14","article-title":"An Introduction to Modern Cryptosystems","year":"2003","journal-title":"Andrew Zwicke"},{"key":"ref11","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref10","author":"canteaut","year":"2011","journal-title":"Advanced Linear Cryptanalysis of Block and Stream Ciphers"},{"key":"ref2","author":"d","year":"2018","journal-title":"Mathematics of Public Key Cryptography"},{"key":"ref1","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/e21050504"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS52692.2021.9580978"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.038"},{"key":"ref4","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref3","author":"cohen","year":"2006","journal-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS50664.2020.9224901"},{"key":"ref5","author":"barakat","year":"2018","journal-title":"An Introduction to Cryptography"}],"event":{"name":"2023 IEEE East-West Design & Test Symposium (EWDTS)","location":"Batumi, Georgia","start":{"date-parts":[[2023,9,22]]},"end":{"date-parts":[[2023,9,25]]}},"container-title":["2023 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10296971\/10297023\/10297088.pdf?arnumber=10297088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:30:14Z","timestamp":1701113414000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10297088\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ewdts59469.2023.10297088","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]}}}