Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1051/itmconf/20257605009
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant challenges remain in practical implementation, scalability, and security vulnerabilities. This study aims to bridge the gap between theory and real-world deployment by developing robust quantum cryptographic protocols that address key challenges such as noise management, side-channel attacks, and Trojan horse attacks. Additionally, we propose an optimized quantum key distribution (QKD) mechanism that ensures secure communication over long distances under realistic conditions. Our research integrates post-quantum cryptography with quantum cryptographic techniques to provide a hybrid security model that is resilient against both classical and quantum computing threats. By leveraging commercially available quantum hardware and advanced randomness extraction methods, this study contributes to the development of scalable, secure, and efficient quantum communication networks. The findings of this research will play a crucial role in advancing secure digital communication systems and fortifying data security in the post-quantum era.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1051/itmconf/20257605009
- OA Status
- diamond
- References
- 4
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4408834478
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4408834478Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1051/itmconf/20257605009Digital Object Identifier
- Title
-
Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum ComputingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-01-01Full publication date if available
- Authors
-
J. Kamalakumari, Ajmeera Kiran, G. S. V. Radha, Yedla Chandini, Mohit Tiwari, V. HemamaliniList of authors in order
- Landing page
-
https://doi.org/10.1051/itmconf/20257605009Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1051/itmconf/20257605009Direct OA link when available
- Concepts
-
Quantum cryptography, Computer science, Cryptography, Quantum computer, Computer security, Post-quantum cryptography, Quantum, Quantum information, Physics, Public-key cryptography, Quantum mechanics, EncryptionTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
4Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4408834478 |
|---|---|
| doi | https://doi.org/10.1051/itmconf/20257605009 |
| ids.doi | https://doi.org/10.1051/itmconf/20257605009 |
| ids.openalex | https://openalex.org/W4408834478 |
| fwci | 0.0 |
| type | article |
| title | Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing |
| biblio.issue | |
| biblio.volume | 76 |
| biblio.last_page | 05009 |
| biblio.first_page | 05009 |
| topics[0].id | https://openalex.org/T10682 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.8945000171661377 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Quantum Computing Algorithms and Architecture |
| topics[1].id | https://openalex.org/T11017 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.7616999745368958 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Chaos-based Image/Signal Encryption |
| topics[2].id | https://openalex.org/T10237 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.7272999882698059 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptography and Data Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C144901912 |
| concepts[0].level | 4 |
| concepts[0].score | 0.8115841746330261 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q471906 |
| concepts[0].display_name | Quantum cryptography |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5622647404670715 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C178489894 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5282396674156189 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[2].display_name | Cryptography |
| concepts[3].id | https://openalex.org/C58053490 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5121731758117676 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q176555 |
| concepts[3].display_name | Quantum computer |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.49012503027915955 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C108277079 |
| concepts[5].level | 4 |
| concepts[5].score | 0.4214555621147156 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q7233576 |
| concepts[5].display_name | Post-quantum cryptography |
| concepts[6].id | https://openalex.org/C84114770 |
| concepts[6].level | 2 |
| concepts[6].score | 0.372750461101532 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q46344 |
| concepts[6].display_name | Quantum |
| concepts[7].id | https://openalex.org/C169699857 |
| concepts[7].level | 3 |
| concepts[7].score | 0.21948516368865967 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q2122243 |
| concepts[7].display_name | Quantum information |
| concepts[8].id | https://openalex.org/C121332964 |
| concepts[8].level | 0 |
| concepts[8].score | 0.20155680179595947 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[8].display_name | Physics |
| concepts[9].id | https://openalex.org/C203062551 |
| concepts[9].level | 3 |
| concepts[9].score | 0.1743488907814026 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[9].display_name | Public-key cryptography |
| concepts[10].id | https://openalex.org/C62520636 |
| concepts[10].level | 1 |
| concepts[10].score | 0.1523112952709198 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[10].display_name | Quantum mechanics |
| concepts[11].id | https://openalex.org/C148730421 |
| concepts[11].level | 2 |
| concepts[11].score | 0.1496909260749817 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[11].display_name | Encryption |
| keywords[0].id | https://openalex.org/keywords/quantum-cryptography |
| keywords[0].score | 0.8115841746330261 |
| keywords[0].display_name | Quantum cryptography |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5622647404670715 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/cryptography |
| keywords[2].score | 0.5282396674156189 |
| keywords[2].display_name | Cryptography |
| keywords[3].id | https://openalex.org/keywords/quantum-computer |
| keywords[3].score | 0.5121731758117676 |
| keywords[3].display_name | Quantum computer |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.49012503027915955 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/post-quantum-cryptography |
| keywords[5].score | 0.4214555621147156 |
| keywords[5].display_name | Post-quantum cryptography |
| keywords[6].id | https://openalex.org/keywords/quantum |
| keywords[6].score | 0.372750461101532 |
| keywords[6].display_name | Quantum |
| keywords[7].id | https://openalex.org/keywords/quantum-information |
| keywords[7].score | 0.21948516368865967 |
| keywords[7].display_name | Quantum information |
| keywords[8].id | https://openalex.org/keywords/physics |
| keywords[8].score | 0.20155680179595947 |
| keywords[8].display_name | Physics |
| keywords[9].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[9].score | 0.1743488907814026 |
| keywords[9].display_name | Public-key cryptography |
| keywords[10].id | https://openalex.org/keywords/quantum-mechanics |
| keywords[10].score | 0.1523112952709198 |
| keywords[10].display_name | Quantum mechanics |
| keywords[11].id | https://openalex.org/keywords/encryption |
| keywords[11].score | 0.1496909260749817 |
| keywords[11].display_name | Encryption |
| language | en |
| locations[0].id | doi:10.1051/itmconf/20257605009 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210171711 |
| locations[0].source.issn | 2271-2097, 2431-7578 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2271-2097 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | ITM Web of Conferences |
| locations[0].source.host_organization | https://openalex.org/P4310319748 |
| locations[0].source.host_organization_name | EDP Sciences |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319748 |
| locations[0].source.host_organization_lineage_names | EDP Sciences |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ITM Web of Conferences |
| locations[0].landing_page_url | https://doi.org/10.1051/itmconf/20257605009 |
| locations[1].id | pmh:oai:doaj.org/article:ad240ffd22d84581984007224c0bef02 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | ITM Web of Conferences, Vol 76, p 05009 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/ad240ffd22d84581984007224c0bef02 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5098729960 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | J. Kamalakumari |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kamalakumari J |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5087336365 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-3826-4346 |
| authorships[1].author.display_name | Ajmeera Kiran |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ajmeera Kiran |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5045153599 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | G. S. V. Radha |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Gadige Radha |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5116793873 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Yedla Chandini |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Yedla Chandini |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5071185644 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-1836-3451 |
| authorships[4].author.display_name | Mohit Tiwari |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Mohit Tiwari |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5015803301 |
| authorships[5].author.orcid | |
| authorships[5].author.display_name | V. Hemamalini |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Hemamalini V |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1051/itmconf/20257605009 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10682 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.8945000171661377 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Quantum Computing Algorithms and Architecture |
| related_works | https://openalex.org/W3173339789, https://openalex.org/W4288754535, https://openalex.org/W4385627932, https://openalex.org/W2548040793, https://openalex.org/W4312788318, https://openalex.org/W3008265109, https://openalex.org/W3194469932, https://openalex.org/W4312624769, https://openalex.org/W3201289751, https://openalex.org/W3099819669 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1051/itmconf/20257605009 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210171711 |
| best_oa_location.source.issn | 2271-2097, 2431-7578 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2271-2097 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | ITM Web of Conferences |
| best_oa_location.source.host_organization | https://openalex.org/P4310319748 |
| best_oa_location.source.host_organization_name | EDP Sciences |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319748 |
| best_oa_location.source.host_organization_lineage_names | EDP Sciences |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ITM Web of Conferences |
| best_oa_location.landing_page_url | https://doi.org/10.1051/itmconf/20257605009 |
| primary_location.id | doi:10.1051/itmconf/20257605009 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210171711 |
| primary_location.source.issn | 2271-2097, 2431-7578 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2271-2097 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | ITM Web of Conferences |
| primary_location.source.host_organization | https://openalex.org/P4310319748 |
| primary_location.source.host_organization_name | EDP Sciences |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319748 |
| primary_location.source.host_organization_lineage_names | EDP Sciences |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ITM Web of Conferences |
| primary_location.landing_page_url | https://doi.org/10.1051/itmconf/20257605009 |
| publication_date | 2025-01-01 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4391948471, https://openalex.org/W4376167111, https://openalex.org/W4408615424, https://openalex.org/W4391095008 |
| referenced_works_count | 4 |
| abstract_inverted_index.a | 5, 103, 149 |
| abstract_inverted_index.By | 117 |
| abstract_inverted_index.an | 75 |
| abstract_inverted_index.as | 4, 63 |
| abstract_inverted_index.by | 52 |
| abstract_inverted_index.in | 12, 33, 152, 162 |
| abstract_inverted_index.is | 108 |
| abstract_inverted_index.of | 15, 134, 144 |
| abstract_inverted_index.on | 23 |
| abstract_inverted_index.to | 43, 101, 131 |
| abstract_inverted_index.we | 73 |
| abstract_inverted_index.Our | 92 |
| abstract_inverted_index.The | 142 |
| abstract_inverted_index.and | 26, 37, 49, 68, 113, 123, 137, 158 |
| abstract_inverted_index.era | 14 |
| abstract_inverted_index.for | 8 |
| abstract_inverted_index.gap | 46 |
| abstract_inverted_index.has | 2 |
| abstract_inverted_index.key | 60, 78 |
| abstract_inverted_index.the | 13, 45, 132, 163 |
| abstract_inverted_index.This | 40 |
| abstract_inverted_index.aims | 42 |
| abstract_inverted_index.both | 111 |
| abstract_inverted_index.data | 160 |
| abstract_inverted_index.era. | 165 |
| abstract_inverted_index.long | 87 |
| abstract_inverted_index.over | 86 |
| abstract_inverted_index.play | 148 |
| abstract_inverted_index.role | 151 |
| abstract_inverted_index.such | 62 |
| abstract_inverted_index.that | 58, 82, 107 |
| abstract_inverted_index.this | 128, 145 |
| abstract_inverted_index.will | 147 |
| abstract_inverted_index.with | 97 |
| abstract_inverted_index.(QKD) | 80 |
| abstract_inverted_index.While | 18 |
| abstract_inverted_index.horse | 70 |
| abstract_inverted_index.model | 106 |
| abstract_inverted_index.noise | 64 |
| abstract_inverted_index.study | 41, 129 |
| abstract_inverted_index.under | 89 |
| abstract_inverted_index.Trojan | 69 |
| abstract_inverted_index.bridge | 44 |
| abstract_inverted_index.hybrid | 104 |
| abstract_inverted_index.remain | 32 |
| abstract_inverted_index.robust | 54 |
| abstract_inverted_index.secure | 10, 84, 154 |
| abstract_inverted_index.theory | 48 |
| abstract_inverted_index.Quantum | 0 |
| abstract_inverted_index.address | 59 |
| abstract_inverted_index.against | 110 |
| abstract_inverted_index.between | 47 |
| abstract_inverted_index.crucial | 150 |
| abstract_inverted_index.digital | 155 |
| abstract_inverted_index.emerged | 3 |
| abstract_inverted_index.ensures | 83 |
| abstract_inverted_index.focuses | 22 |
| abstract_inverted_index.propose | 74 |
| abstract_inverted_index.provide | 102 |
| abstract_inverted_index.quantum | 16, 55, 77, 98, 114, 121, 139 |
| abstract_inverted_index.secure, | 136 |
| abstract_inverted_index.setups, | 29 |
| abstract_inverted_index.systems | 157 |
| abstract_inverted_index.advanced | 124 |
| abstract_inverted_index.attacks, | 67 |
| abstract_inverted_index.attacks. | 71 |
| abstract_inverted_index.ensuring | 9 |
| abstract_inverted_index.existing | 19 |
| abstract_inverted_index.findings | 143 |
| abstract_inverted_index.hardware | 122 |
| abstract_inverted_index.methods, | 127 |
| abstract_inverted_index.research | 20, 93, 146 |
| abstract_inverted_index.security | 38, 105, 161 |
| abstract_inverted_index.threats. | 116 |
| abstract_inverted_index.advancing | 153 |
| abstract_inverted_index.available | 120 |
| abstract_inverted_index.classical | 112 |
| abstract_inverted_index.computing | 115 |
| abstract_inverted_index.distances | 88 |
| abstract_inverted_index.efficient | 138 |
| abstract_inverted_index.mechanism | 81 |
| abstract_inverted_index.networks. | 141 |
| abstract_inverted_index.optimized | 76 |
| abstract_inverted_index.practical | 34 |
| abstract_inverted_index.primarily | 21 |
| abstract_inverted_index.protocols | 57 |
| abstract_inverted_index.realistic | 90 |
| abstract_inverted_index.resilient | 109 |
| abstract_inverted_index.scalable, | 135 |
| abstract_inverted_index.challenges | 31, 61 |
| abstract_inverted_index.computing. | 17 |
| abstract_inverted_index.deployment | 51 |
| abstract_inverted_index.developing | 53 |
| abstract_inverted_index.extraction | 126 |
| abstract_inverted_index.fortifying | 159 |
| abstract_inverted_index.frameworks | 25 |
| abstract_inverted_index.integrates | 94 |
| abstract_inverted_index.leveraging | 118 |
| abstract_inverted_index.randomness | 125 |
| abstract_inverted_index.real-world | 50 |
| abstract_inverted_index.techniques | 100 |
| abstract_inverted_index.technology | 7 |
| abstract_inverted_index.conditions. | 91 |
| abstract_inverted_index.contributes | 130 |
| abstract_inverted_index.development | 133 |
| abstract_inverted_index.management, | 65 |
| abstract_inverted_index.significant | 30 |
| abstract_inverted_index.small-scale | 27 |
| abstract_inverted_index.theoretical | 24 |
| abstract_inverted_index.commercially | 119 |
| abstract_inverted_index.cryptography | 1, 96 |
| abstract_inverted_index.distribution | 79 |
| abstract_inverted_index.experimental | 28 |
| abstract_inverted_index.post-quantum | 95, 164 |
| abstract_inverted_index.scalability, | 36 |
| abstract_inverted_index.side-channel | 66 |
| abstract_inverted_index.Additionally, | 72 |
| abstract_inverted_index.communication | 11, 85, 140, 156 |
| abstract_inverted_index.cryptographic | 56, 99 |
| abstract_inverted_index.revolutionary | 6 |
| abstract_inverted_index.implementation, | 35 |
| abstract_inverted_index.vulnerabilities. | 39 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.03746341 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |