{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:01Z","timestamp":1775745301455,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,23]]},"DOI":"10.1145\/3745812.3745888","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T13:55:58Z","timestamp":1756821358000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparing Quantum-Resistant Cryptographic Algorithms for Securing Next-Generation Communications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4159-9094","authenticated-orcid":false,"given":"Satish Shankarrao","family":"Banait","sequence":"first","affiliation":[{"name":"School of Compter Science &amp; Engg. Sandip University, Sandip University, Nashik., Nashik, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4455-6775","authenticated-orcid":false,"given":"Komal Baburao","family":"Umare","sequence":"additional","affiliation":[{"name":"Electronics and Communication Engineering, National Institute of Technology Warangal Telangana, Warangal, Telangana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9872-0833","authenticated-orcid":false,"given":"Madhumay","family":"Sen","sequence":"additional","affiliation":[{"name":"Computer Science and Applications, Vivekananda Global university, Jaipur, Rajasthan, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4752-7884","authenticated-orcid":false,"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, SR University, Warangal, Telangana, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5474-6826","authenticated-orcid":false,"given":"Parikshit N.","family":"Mahalle","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence and Data Science, Vishwakarma Institute of Technology, Pune, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9870-7076","authenticated-orcid":false,"given":"Jambi Ratna Raja","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Genba Sopanrao Moze College of Engineering, Pune, Maharashtra, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,9,2]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.57"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2831199"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3264628"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140518"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11052082"},{"key":"e_1_3_3_1_7_2","volume-title":"How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits","author":"Gidney M.","year":"2019","unstructured":"Gidney and M. Eker\u00e5, \u201cHow to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,\u201d 2019, arXiv: 1905.09749."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2981239"},{"key":"e_1_3_3_1_9_2","volume-title":"Survey on Fully Homomorphic Encryption, Theory, and Applications. Proc","author":"Marcolla C.","year":"2022","unstructured":"Marcolla, C.; Sucasas, V.; Manzano, M.; Bassoli, R.; Fitzek, F.H.P.; Aaraj, N.; Marcolla, C. Survey on Fully Homomorphic Encryption, Theory, and Applications. Proc. IEEE 2022, 110, 1572\u20131609."},{"key":"e_1_3_3_1_10_2","first-page":"2524","volume-title":"International Conference on Computational Intelligence - ICCI 2021","author":"Mrunal Girhepunje","year":"2021","unstructured":"Mrunal Girhepunje, Simran Jain, Triveni Ramteke, Nikhil P. Wyawahare, Prashant Khobragade and Sampada Wazalwar, \"Proposed Crowd Counting system and Social Distance Analyzer for Pandemic Situation\", International Conference on Computational Intelligence - ICCI 2021, 27-28 December 2021, ISSN 2524-7573."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-022-04623-2"},{"key":"e_1_3_3_1_14_2","first-page":"15","volume-title":"NIST Nat. Inst. Standards Technol. Nat. Cybersecurity","author":"Barker M.","year":"2021","unstructured":"W. Barker, M. Souppaya, and W. Newhouse, \u2018\u2018Migration to postquantum cryptography,\u2019\u2019 NIST Nat. Inst. Standards Technol. Nat. Cybersecurity, Center Excellence, Gaithersburg, MD, USA, Tech. Rep., 2021, pp. 1\u201315. Accessed: Feb. 12, 2024."},{"key":"e_1_3_3_1_15_2","volume-title":"The PQC Migration Handbook","author":"Attema J.","year":"2023","unstructured":"T. Attema, J. Duarte, V. Dunning, M. Lequesne, W. V. D. Schoot, and M. Stevens. (2023). The PQC Migration Handbook. The Netherlands National Communications Security Agency."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2018.2851741"},{"key":"e_1_3_3_1_17_2","volume-title":"A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography","author":"Dam D.-T.","year":"2023","unstructured":"Dam, D.-T.; Tran, T.-H.; Hoang, V.-P.; Pham, C.-K.; Hoang, T.-T. A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography 2023, 7, 40."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2023.103277"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.21.040501"}],"event":{"name":"ICIMMI 2024: 6th INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT & MACHINE INTELLIGENCE","location":"Jaipur RJ India","acronym":"ICIMMI 2024"},"container-title":["Proceedings of the 6th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3745812.3745888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T16:18:06Z","timestamp":1756829886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3745812.3745888"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":19,"alternative-id":["10.1145\/3745812.3745888","10.1145\/3745812"],"URL":"https:\/\/doi.org\/10.1145\/3745812.3745888","relation":{},"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"2025-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}