{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:38:25Z","timestamp":1776879505946,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T00:00:00Z","timestamp":1684886400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,24]]},"DOI":"10.1145\/3607720.3607721","type":"proceedings-article","created":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T17:14:08Z","timestamp":1699895648000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["From Pre-Quantum to Post-Quantum RSA"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9127-5947","authenticated-orcid":false,"given":"Sandeep","family":"Joshi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1830-0661","authenticated-orcid":false,"given":"Amit Kumar","family":"Bairwa","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering (AIML), Manipal University Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6713-9347","authenticated-orcid":false,"given":"Anton Pavlovich","family":"Pljonkin","sequence":"additional","affiliation":[{"name":"Department of Information Security of Telecommunication Systems, Southern Federal University, Russian Federation"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2610-393X","authenticated-orcid":false,"given":"Pradumn","family":"Garg","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0742-999X","authenticated-orcid":false,"given":"Kshitij","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, India"}]}],"member":"320","published-online":{"date-parts":[[2023,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-33052020000400558"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2021.03.003"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.024"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/LO.2016.7549845"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PICST47496.2019.9061293"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2016.7883094"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103063"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECDS.2017.8390120"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.012332"},{"key":"e_1_3_2_1_10_1","volume-title":"Vishnu Vardhan and A. V. N. Krishna. Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. 2016 6th International Advanced Computing Conference: 556-562","year":"2016","unstructured":"Ms. 2016 . V. Padmavathi, B . Vishnu Vardhan and A. V. N. Krishna. Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. 2016 6th International Advanced Computing Conference: 556-562 . (2016). Ms. 2016. V. Padmavathi, B. Vishnu Vardhan and A. V. N. Krishna. Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. 2016 6th International Advanced Computing Conference: 556-562. (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICREST.2019.8644342"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073638"},{"key":"e_1_3_2_1_13_1","volume-title":"Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Statista","author":"Schwandt F","year":"2016","unstructured":"F Schwandt . 2016. Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Statista ( 2016 ). F Schwandt. 2016. Internet of things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). Statista (2016)."},{"key":"e_1_3_2_1_14_1","volume-title":"2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). 3701\u20133704","author":"Sharma Amita","year":"2016","unstructured":"Amita Sharma and Deepshikha Sharma . 2016 . Big data protection via neural and quantum cryptography . In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). 3701\u20133704 . Amita Sharma and Deepshikha Sharma. 2016. Big data protection via neural and quantum cryptography. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom). 3701\u20133704."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2988380"},{"key":"e_1_3_2_1_16_1","unstructured":"Robert\u00a0S. Sutor. 2019. Dancing with qubits: How quantum computing works and how it can change the world. Packt.  Robert\u00a0S. Sutor. 2019. Dancing with qubits: How quantum computing works and how it can change the world. Packt."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2017.7918912"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2014.2381460"}],"event":{"name":"NISS 2023: The 6th International Conference on Networking, Intelligent Systems & Security","location":"Larache Morocco","acronym":"NISS 2023"},"container-title":["Proceedings of the 6th International Conference on Networking, Intelligent Systems &amp; Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607721","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607720.3607721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:29Z","timestamp":1750178189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607720.3607721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,24]]},"references-count":18,"alternative-id":["10.1145\/3607720.3607721","10.1145\/3607720"],"URL":"https:\/\/doi.org\/10.1145\/3607720.3607721","relation":{},"subject":[],"published":{"date-parts":[[2023,5,24]]},"assertion":[{"value":"2023-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}