{"id":"https://openalex.org/W2062443410","doi":"https://doi.org/10.1145/1980022.1980195","title":"On the information security using Fibonacci series","display_name":"On the information security using Fibonacci series","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2062443410","doi":"https://doi.org/10.1145/1980022.1980195","mag":"2062443410"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980195","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059396097","display_name":"Balasaheb Tarle","orcid":"https://orcid.org/0000-0001-9656-7834"},"institutions":[{"id":"https://openalex.org/I878213199","display_name":"Savitribai Phule Pune University","ror":"https://ror.org/044g6d731","country_code":"IN","type":"education","lineage":["https://openalex.org/I878213199"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. S. Tarle","raw_affiliation_strings":["Pune University, Pune (MS), India"],"affiliations":[{"raw_affiliation_string":"Pune University, Pune (MS), India","institution_ids":["https://openalex.org/I878213199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004300659","display_name":"Gend Lal Prajapati","orcid":"https://orcid.org/0000-0002-9893-5263"},"institutions":[{"id":"https://openalex.org/I138272832","display_name":"Devi Ahilya Vishwavidyalaya","ror":"https://ror.org/05c2p1f98","country_code":"IN","type":"education","lineage":["https://openalex.org/I138272832"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G. L. Prajapati","raw_affiliation_strings":["IET-DAVV, Indore (MP), India","IET, DAVV, Indore, MP, India"],"affiliations":[{"raw_affiliation_string":"IET-DAVV, Indore (MP), India","institution_ids":["https://openalex.org/I138272832"]},{"raw_affiliation_string":"IET, DAVV, Indore, MP, India","institution_ids":["https://openalex.org/I138272832"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5059396097"],"corresponding_institution_ids":["https://openalex.org/I878213199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.1026234,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"791","last_page":"791"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8606600165367126},{"id":"https://openalex.org/keywords/fibonacci-number","display_name":"Fibonacci number","score":0.8096157312393188},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7805185914039612},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6000711917877197},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.5597065091133118},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4633365869522095},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.44899222254753113},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4489556550979614},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4276212453842163},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41197001934051514},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3836343288421631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3240099847316742},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12450876832008362},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.08321648836135864}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8606600165367126},{"id":"https://openalex.org/C173734053","wikidata":"https://www.wikidata.org/wiki/Q47577","display_name":"Fibonacci number","level":2,"score":0.8096157312393188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7805185914039612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6000711917877197},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.5597065091133118},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4633365869522095},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.44899222254753113},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4489556550979614},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4276212453842163},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41197001934051514},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3836343288421631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3240099847316742},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12450876832008362},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.08321648836135864},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980195","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W1505014760","https://openalex.org/W1527701244","https://openalex.org/W1571529518","https://openalex.org/W1593713025","https://openalex.org/W2079415843","https://openalex.org/W2134657075"],"related_works":["https://openalex.org/W4387191618","https://openalex.org/W2756423716","https://openalex.org/W4243621294","https://openalex.org/W1993945719","https://openalex.org/W3181603331","https://openalex.org/W4240313302","https://openalex.org/W4387429380","https://openalex.org/W2995433735","https://openalex.org/W3006478348","https://openalex.org/W2911121780"],"abstract_inverted_index":{"Now":[0],"a":[1],"day":[2],"information":[3,21],"security":[4],"becomes":[5],"complex":[6],"and":[7,51,101,114,121],"more":[8],"important":[9,15],"problem.":[10],"Encryption/decryption":[11],"can":[12,59],"be":[13],"an":[14],"tool":[16],"to":[17,33],"help":[18],"in":[19,110],"improving":[20],"security.":[22],"In":[23,55],"this":[24,56],"paper":[25],"work,":[26],"I":[27],"developed":[28],"techniques":[29],"for":[30,49],"securing":[31],"data":[32],"avoid":[34],"hacking":[35],"as":[36,38,47],"well":[37],"providing":[39],"the":[40,78,132],"user":[41],"with":[42,90],"some":[43],"additional":[44],"features":[45],"such":[46],"key":[48,81],"integrity":[50],"validation":[52],"of":[53,63,77,98],"user.":[54],"technique":[57],"one":[58],"secure":[60],"any":[61],"type":[62],"files":[64,97],"using":[65],"Fibonacci":[66,91,105,129],"series.":[67],"The":[68,75,103,125],"proposed":[69],"encryption/decryption":[70,93,106,130],"algorithm":[71,107],"is":[72,108,131],"loss-less,":[73],"key-dependent.":[74],"performance":[76],"popular":[79],"symmetric":[80,135],"algorithms":[82],"including":[83],"DES,":[84],"3DES,":[85],"AES,":[86],"Blowfish,":[87],"are":[88],"compared":[89,122],"Series":[92],"by":[94],"encrypting":[95],"input":[96],"varying":[99],"contents":[100],"sizes.":[102],"present":[104],"implemented":[109],"C":[111],"sharp":[112],"language,":[113],"tested":[115],"on":[116],"two":[117],"different":[118],"Intel":[119],"processors":[120],"its":[123],"performance.":[124],"results":[126],"reveal":[127],"that":[128],"fastest":[133],"among":[134],"algorithms.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
