{"id":"https://openalex.org/W2810455513","doi":"https://doi.org/10.1109/icssa.2017.20","title":"Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms","display_name":"Software Application to Evaluate the Complexity Theory of the RSA and Elliptic Curves Asymmetric Algorithms","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2810455513","doi":"https://doi.org/10.1109/icssa.2017.20","mag":"2810455513"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icssa.2017.20","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050875876","display_name":"Wendy Ayala","orcid":null},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Wendy Ayala","raw_affiliation_strings":["Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016435353","display_name":"Walter Fuertes","orcid":"https://orcid.org/0000-0001-9427-5766"},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Walter Fuertes","raw_affiliation_strings":["Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022915323","display_name":"Fernando Gal\u00e1rraga","orcid":null},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Fernando Galarraga","raw_affiliation_strings":["Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045093092","display_name":"Hern\u00e1n Aules","orcid":null},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Hernan Aules","raw_affiliation_strings":["Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018344676","display_name":"Theofilos Toulkeridis","orcid":"https://orcid.org/0000-0003-1903-7914"},"institutions":[{"id":"https://openalex.org/I118946981","display_name":"Escuela Polit\u00e9cnica del Ej\u00e9rcito","ror":"https://ror.org/05j136930","country_code":"EC","type":"education","lineage":["https://openalex.org/I118946981"]}],"countries":["EC"],"is_corresponding":false,"raw_author_name":"Theofilos Toulkeridis","raw_affiliation_strings":["Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Universidad de las Fuerzas Armadas ESPE, Sangolqui, Ecuador","institution_ids":["https://openalex.org/I118946981"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.628955,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":63,"max":71},"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"93"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-signature-algorithm","display_name":"Digital Signature Algorithm","score":0.5684731}],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.9346308},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7676776},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6628872},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5991739},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.58557105},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.568824},{"id":"https://openalex.org/C202424057","wikidata":"https://www.wikidata.org/wiki/Q1224829","display_name":"Digital Signature Algorithm","level":4,"score":0.5684731},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.50285643},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37013245},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33042902},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33027226},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2683546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10871336},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10587761},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icssa.2017.20","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1481666073","https://openalex.org/W1495643041","https://openalex.org/W1539005835","https://openalex.org/W1567573409","https://openalex.org/W174168647","https://openalex.org/W2174972060","https://openalex.org/W2187723762","https://openalex.org/W2276593619","https://openalex.org/W2324502852","https://openalex.org/W2497720745","https://openalex.org/W2589961044","https://openalex.org/W2591523650","https://openalex.org/W2620252398","https://openalex.org/W2793291118","https://openalex.org/W2799517554","https://openalex.org/W2943243489","https://openalex.org/W3119083229","https://openalex.org/W366318972","https://openalex.org/W4241634156","https://openalex.org/W4250394487","https://openalex.org/W52389305"],"related_works":["https://openalex.org/W4387407403","https://openalex.org/W4319302742","https://openalex.org/W4255730851","https://openalex.org/W4249541918","https://openalex.org/W4226182343","https://openalex.org/W3213981908","https://openalex.org/W2998969597","https://openalex.org/W2392378177","https://openalex.org/W2391691397","https://openalex.org/W2130871907"],"abstract_inverted_index":{"In":[0,72],"the":[1,14,31,55,84,103,110,125,130,135,160,188,191,210],"current":[2],"study,":[3],"we":[4,202],"performed":[5],"a":[6,51,74,182,205],"quantitative":[7],"evaluation":[8],"of":[9,42,87,99,109,115,139,145,169,187,190],"digital":[10,38,44,147],"signature":[11,45,148],"algorithms":[12,46,86,149],"between":[13],"asymmetric":[15,43,146],"cryptographic":[16],"scheme":[17],"RSA":[18,58,126],"(Rivest,":[19],"Shamir,":[20],"and":[21,23,59,81,90,105,137,150,164],"Adleman)":[22],"ECDSA":[24,60,128],"(Elliptic":[25],"Curve":[26],"Digital":[27],"Signature":[28],"Algorithm)":[29],"with":[30,68,83,102,129],"purpose":[32],"to":[33,54,123],"limit":[34],"or":[35,127],"block":[36],"illegal":[37],"interferences.":[39],"Mathematical":[40],"foundations":[41],"have":[47,61,93,118,153,178,203],"been":[48,62,79,119,154,179],"analyzed,":[49],"giving":[50],"special":[52],"focus":[53],"mentioned":[56],"algorithms.":[57],"coded":[63],"in":[64,121],"Java":[65,75,111],"Development":[66],"Environment,":[67],"their":[69],"respective":[70,85],"libraries.":[71],"addition,":[73],"software":[76],"application":[77],"has":[78],"designed":[80],"implemented":[82],"key":[88],"generation":[89],"verification.":[91],"We":[92],"used":[94,204],"Scrum":[95],"by":[96],"articulating":[97],"each":[98],"its":[100],"phases":[101],"architecture":[104],"extensible":[106],"security":[107],"elements":[108],"platform.":[112],"Thus,":[113],"all":[114],"these":[116,200],"processes":[117],"applied,":[120],"order":[122],"establish":[124],"most":[131],"suitable":[132],"characteristics":[133],"for":[134],"performance":[136],"confidentiality":[138],"transmitted":[140],"information.":[141],"The":[142,175],"own":[143],"standards":[144],"elliptic":[151],"curves":[152],"taken":[155],"into":[156],"account,":[157],"so":[158],"that":[159],"comparison":[161],"appears":[162],"adequate":[163],"produces":[165],"data":[166],"that,":[167],"besides":[168],"being":[170],"measurable,":[171],"are":[172],"also":[173],"sustainable.":[174],"results":[176],"obtained":[177,194],"visualized":[180],"through":[181],"statistical":[183],"process":[184],"as":[185],"products":[186],"determination":[189],"response":[192],"times":[193],"during":[195],"this":[196],"process.":[197],"To":[198],"verify":[199],"results,":[201],"mathematical":[206],"validation,":[207],"based":[208],"on":[209],"Least":[211],"Squares":[212],"method.":[213]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2810455513","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-12-10T02:09:47.840872","created_date":"2018-07-10"}