{"id":"https://openalex.org/W4415389060","doi":"https://doi.org/10.1002/spy2.70124","title":"Secure Encryption Over Eisenstein\u2013Jacobi Integers From w$$ w $$\u2010Cyclic Codes","display_name":"Secure Encryption Over Eisenstein\u2013Jacobi Integers From w$$ w $$\u2010Cyclic Codes","publication_year":2025,"publication_date":"2025-10-20","ids":{"openalex":"https://openalex.org/W4415389060","doi":"https://doi.org/10.1002/spy2.70124"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70124","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70124","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051978794","display_name":"Murat G\u00fczeltepe","orcid":"https://orcid.org/0000-0002-2089-5660"},"institutions":[{"id":"https://openalex.org/I103703290","display_name":"Sakarya University","ror":"https://ror.org/04ttnw109","country_code":"TR","type":"education","lineage":["https://openalex.org/I103703290"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Murat G\u00fczeltepe","raw_affiliation_strings":["Department of Mathematics Sakarya University  Sakarya Turkey"],"raw_orcid":"https://orcid.org/0000-0002-2089-5660","affiliations":[{"raw_affiliation_string":"Department of Mathematics Sakarya University  Sakarya Turkey","institution_ids":["https://openalex.org/I103703290"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ersel Alkan","orcid":null},"institutions":[{"id":"https://openalex.org/I103703290","display_name":"Sakarya University","ror":"https://ror.org/04ttnw109","country_code":"TR","type":"education","lineage":["https://openalex.org/I103703290"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ersel Alkan","raw_affiliation_strings":["Department of Mathematics Sakarya University  Sakarya Turkey"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics Sakarya University  Sakarya Turkey","institution_ids":["https://openalex.org/I103703290"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051978794"],"corresponding_institution_ids":["https://openalex.org/I103703290"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15114525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7208999991416931},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5838000178337097},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5231000185012817},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47029998898506165},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4577000141143799},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.44999998807907104},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4383000135421753},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41670000553131104},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.3630000054836273}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7208999991416931},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5838000178337097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5629000067710876},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5465999841690063},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5231000185012817},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47029998898506165},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4577000141143799},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.44999998807907104},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4383000135421753},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41670000553131104},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.3630000054836273},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.34599998593330383},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3294999897480011},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3248000144958496},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3167000114917755},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.314300000667572},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.310699999332428},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.30480000376701355},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30469998717308044},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.288100004196167},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2840999960899353},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.2685999870300293},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.26440000534057617},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.2614000141620636},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.257099986076355},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70124","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70124","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8814874032","display_name":null,"funder_award_id":"125R211","funder_id":"https://openalex.org/F4320322626","funder_display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu"}],"funders":[{"id":"https://openalex.org/F4320322626","display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","ror":"https://ror.org/04w9kkr77"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1992546115","https://openalex.org/W2103398070","https://openalex.org/W2159245467","https://openalex.org/W2327377566","https://openalex.org/W2566390621","https://openalex.org/W4248289108","https://openalex.org/W4249700805","https://openalex.org/W4281918876","https://openalex.org/W4300349690"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Ensuring":[1],"secure":[2],"communication":[3],"in":[4],"the":[5,24,80,124,161,188],"digital":[6],"era":[7],"is":[8,60],"of":[9,113],"paramount":[10],"importance.":[11],"This":[12,185,196],"study":[13],"introduces":[14],"a":[15,38,168],"novel":[16],"encryption":[17,121,136,175,210],"model":[18,125,163,191],"that":[19,79,199],"combines":[20],"\u2010cyclic":[21,48,156],"codes":[22,157,202],"with":[23,100,192,203],"one\u2010time":[25,45],"pad":[26],"(OTP)":[27],"method":[28,36],"over":[29,41,158],"Eisenstein\u2013Jacobi":[30,42,114,159],"integers,":[31,43,160],"achieving":[32],"information\u2010theoretic":[33],"security.":[34,184],"The":[35,110],"constructs":[37],"finite":[39],"ring":[40],"generates":[44],"keys":[46,53,107],"from":[47],"codewords,":[49],"and":[50,86,95,106,120,133,150,172,208,217],"uses":[51],"these":[52,165],"to":[54,89,141,155],"encrypt":[55],"messages,":[56],"guaranteeing":[57],"each":[58,70],"key":[59,118,148,170],"used":[61],"only":[62],"once.":[63],"Multiple":[64],"plausible":[65],"ciphertexts":[66],"are":[67,138],"produced":[68],"for":[69,127],"plaintext,":[71],"making":[72,123],"unauthorized":[73],"decryption":[74],"infeasible.":[75],"Key":[76],"findings":[77],"show":[78],"scheme":[81],"provides":[82],"high":[83],"computational":[84],"efficiency":[85],"robust":[87],"resistance":[88,213],"cryptographic":[90],"attacks,":[91],"outperforming":[92],"existing":[93],"code\u2010based":[94,135],"public\u2010key":[96],"systems.":[97],"Security":[98],"scales":[99],"prime":[101],"selection,":[102],"as":[103],"longer":[104],"codewords":[105],"increase":[108],"protection.":[109],"algebraic":[111],"structure":[112],"integers":[115],"enables":[116],"efficient":[117],"generation":[119],"operations,":[122],"suitable":[126],"critical":[128],"security":[129],"applications.":[130],"Existing":[131],"OTP":[132,154,190,204],"cyclic":[134,180,201],"systems":[137],"typically":[139],"limited":[140],"binary":[142],"fields":[143],"or":[144],"specific":[145],"rings,":[146],"constraining":[147],"diversity":[149],"scalability.":[151],"By":[152],"extending":[153],"proposed":[162,189],"overcomes":[164],"limitations,":[166],"providing":[167,212],"larger":[169],"space":[171],"more":[173],"complex":[174],"structure.":[176],"Code\u2010based":[177],"encryption,":[178],"including":[179],"codes,":[181],"offers":[182],"quantum\u2010resistant":[183],"feature":[186],"aligns":[187],"post\u2010quantum":[193],"cryptography":[194],"(PQC).":[195],"work":[197],"demonstrates":[198],"combining":[200],"creates":[205],"an":[206],"unbreakable":[207],"practical":[209],"framework,":[211],"against":[214],"both":[215],"conventional":[216],"quantum":[218],"attacks.":[219]},"counts_by_year":[],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-22T00:00:00"}
