{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:26:35Z","timestamp":1773156395152,"version":"3.50.1"},"reference-count":18,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059643","type":"journal-article","created":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:26Z","timestamp":1750220306000},"page":"3927-3941","source":"Crossref","is-referenced-by-count":1,"title":["Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security"],"prefix":"10.32604","volume":"84","author":[{"given":"Sunil K.","family":"Singh","sequence":"first","affiliation":[]},{"given":"Sudhakar","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Manraj","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Savita","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Razaz Waheeb","family":"Attar","sequence":"additional","affiliation":[]},{"given":"Varsha","family":"Arya","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Alhomoud","sequence":"additional","affiliation":[]},{"given":"Brij B.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"143","article-title":"Intelligent SCADA system","volume":"2","author":"Chauhan","year":"2010","journal-title":"Int J Power Syst Optim Control"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"100089","DOI":"10.1016\/j.csa.2025.100089","article-title":"Advancements in secure quantum communication and robust key distribution techniques for cybersecurity applications","volume":"2","author":"Singh","year":"2025","journal-title":"Cyber Secur Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1002\/sec.698","article-title":"SCADA communication and security issues","volume":"7","author":"Gao","year":"2014","journal-title":"Secur Commun Netw"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"3541","DOI":"10.1109\/TSC.2021.3100323","article-title":"Smooth projective hash function from codes and its applications","volume":"15","author":"Shooshtari","year":"2021","journal-title":"IEEE Trans Serv Comput"},{"key":"ref5","series-title":"Proceedings of the 2002 ASEE Gulf-Southwest Annual Conference","article-title":"Implementation of the RSA algorithm and its cryptanalysis","author":"Kota","year":"2002 Mar 20\u201322"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"7487","DOI":"10.30534\/ijatcse\/2020\/82952020","article-title":"An overview of quantum cryptography and Shor\u2019s algorithm","volume":"9","author":"Ugwuishiwu","year":"2020","journal-title":"Int J Adv Trends Comput Sci Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks","volume":"8","author":"Fernandez-Carames","year":"2020","journal-title":"IEEE Access"},{"key":"ref8","series-title":"2023 International Conference on Information Networking (ICOIN)","first-page":"146","article-title":"Post quantum cryptography: a review of techniques, challenges and standardizations","author":"Bavdekar","year":"2023 Jan 11\u201314"},{"key":"ref9","series-title":"2023 57th Annual Conference on Information Sciences and Systems (CISS)","first-page":"1","article-title":"An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography","author":"Xu","year":"2023 Mar 22\u201324"},{"key":"ref10","series-title":"Modern Electronics Devices and Communication Systems: Select Proceedings of MEDCOM 2021","first-page":"23","article-title":"Post-quantum cryptography: a solution to the challenges of classical encryption algorithms","author":"Sharma","year":"2023"},{"key":"ref11","first-page":"1","article-title":"Design of quantum communication protocols in quantum cryptography","volume":"81","author":"Alhayani","year":"2023","journal-title":"Wirel Pers Commun"},{"key":"ref12","unstructured":"Morimae T, Yamakawa T. One-wayness in quantum cryptography. arXiv:2210.03394. 2022."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1642","DOI":"10.3390\/math10101642","article-title":"A hash-based quantum-resistant designated verifier signature scheme","volume":"10","author":"Thanalakshmi","year":"2022","journal-title":"Mathematics"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1002\/ese3.1130","article-title":"Monitoring of renewable energy systems by IoT-aided SCADA system","volume":"10","author":"Qays","year":"2022","journal-title":"Energy Sci Eng"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"key":"ref16","first-page":"131","author":"Singh","year":"2024","journal-title":"Innovations in modern cryptography"},{"key":"ref17","series-title":"Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing","first-page":"212","article-title":"A fast quantum mechanical algorithm for database search","author":"Grover","year":"1996 May 22\u201324"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1201\/9780429446047","author":"Singh","year":"2021","journal-title":"Linux yourself: concept and programming"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_59643\/TSP_CMC_59643.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:46:48Z","timestamp":1763344008000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059643","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}