{"id":"https://openalex.org/W1982520173","doi":"https://doi.org/10.1145/2393216.2393291","title":"An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection","display_name":"An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection","publication_year":2012,"publication_date":"2012-10-26","ids":{"openalex":"https://openalex.org/W1982520173","doi":"https://doi.org/10.1145/2393216.2393291","mag":"1982520173"},"language":"en","primary_location":{"id":"doi:10.1145/2393216.2393291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055719956","display_name":"N. Sasirekha","orcid":"https://orcid.org/0000-0001-5093-2867"},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"N. Sasirekha","raw_affiliation_strings":["Karpagam University, Coimbatore, Tamilnadu, Inida"],"affiliations":[{"raw_affiliation_string":"Karpagam University, Coimbatore, Tamilnadu, Inida","institution_ids":["https://openalex.org/I65220239"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114017676","display_name":"M. Hemalatha","orcid":null},"institutions":[{"id":"https://openalex.org/I65220239","display_name":"Karpagam Academy of Higher Education","ror":"https://ror.org/00ssvzv66","country_code":"IN","type":"education","lineage":["https://openalex.org/I65220239"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Hemalatha","raw_affiliation_strings":["Karpagam University, Coimbatore, Tamilnadu, India"],"affiliations":[{"raw_affiliation_string":"Karpagam University, Coimbatore, Tamilnadu, India","institution_ids":["https://openalex.org/I65220239"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055719956"],"corresponding_institution_ids":["https://openalex.org/I65220239"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06956571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"444","last_page":"451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7441538572311401},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7205299735069275},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6186985373497009},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49520960450172424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49519529938697815},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4673624038696289},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4512091279029846},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.42407771944999695},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4152466356754303},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4001771807670593},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.21654203534126282},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1437338888645172},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1155901849269867}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7441538572311401},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7205299735069275},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6186985373497009},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49520960450172424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49519529938697815},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4673624038696289},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4512091279029846},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.42407771944999695},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4152466356754303},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4001771807670593},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21654203534126282},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1437338888645172},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1155901849269867}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2393216.2393291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2393216.2393291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6800000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W102661697","https://openalex.org/W130272139","https://openalex.org/W795010554","https://openalex.org/W1538510258","https://openalex.org/W1567046609","https://openalex.org/W1568378017","https://openalex.org/W1588312135","https://openalex.org/W1596808060","https://openalex.org/W1775358224","https://openalex.org/W1798077826","https://openalex.org/W1882297107","https://openalex.org/W1976794609","https://openalex.org/W1989449504","https://openalex.org/W2006618996","https://openalex.org/W2037326373","https://openalex.org/W2043534315","https://openalex.org/W2048331933","https://openalex.org/W2071083629","https://openalex.org/W2101302656","https://openalex.org/W2115820978","https://openalex.org/W2132869471","https://openalex.org/W2150889871","https://openalex.org/W2158708874","https://openalex.org/W2290820041","https://openalex.org/W2619610430","https://openalex.org/W2760015695","https://openalex.org/W2914849365","https://openalex.org/W4230613327","https://openalex.org/W6604257466","https://openalex.org/W6611649150","https://openalex.org/W6667217422"],"related_works":["https://openalex.org/W2566302615","https://openalex.org/W2184870945","https://openalex.org/W2361619969","https://openalex.org/W2387840805","https://openalex.org/W2389178160","https://openalex.org/W3181603331","https://openalex.org/W2144246620","https://openalex.org/W198693115","https://openalex.org/W2564633714","https://openalex.org/W4243621294"],"abstract_inverted_index":{"Software":[0],"security":[1,32,81],"has":[2,103],"become":[3],"one":[4],"of":[5,9,25,53,71,110,149,161,183,212],"the":[6,31,50,54,64,72,96,108,125,142,150,165,169,181,184,203,210,213,219,230],"active":[7],"areas":[8],"research":[10],"due":[11],"to":[12,61,90,198],"various":[13,83],"cyber":[14],"threats":[15,28,42,66,98],"and":[16,38,67,99,133,194,222,225],"attacks":[17],"that":[18,229],"can":[19],"be":[20,91],"very":[21,92],"dangerous.":[22],"A":[23],"majority":[24],"these":[26],"software":[27,41,65,74,97,111,118],"directly":[29],"affects":[30],"aspects":[33],"such":[34,43],"as":[35,44],"confidentiality,":[36],"integrity":[37],"accessibility.":[39],"These":[40],"reverse":[45],"engineering,":[46],"tampering,":[47],"etc.,":[48],"exploit":[49],"authenticated":[51],"data":[52,152],"software.":[55],"Various":[56],"techniques":[57,76],"have":[58],"been":[59],"developed":[60],"deal":[62],"with":[63,202],"attacks.":[68,84,100],"But,":[69,172],"most":[70],"existing":[73],"protection":[75,119],"do":[77],"not":[78,177],"provide":[79],"reliable":[80],"against":[82],"Recently,":[85],"Cryptographic":[86],"approaches":[87],"are":[88],"found":[89],"effective":[93],"in":[94,107,167,179],"handling":[95],"Code":[101],"encryption":[102,121,135,139,141,175,215],"received":[104],"much":[105],"attention":[106],"field":[109],"security.":[112],"This":[113,128],"paper":[114],"proposes":[115],"a":[116,131],"novel":[117,132],"code":[120],"scheme":[122],"based":[123,217],"on":[124,218],"index":[126],"table.":[127,144],"approach":[129,189,216,232],"uses":[130,190],"efficient":[134,178],"technique":[136],"called":[137],"quasigroup":[138,204],"for":[140],"indexed":[143],"It":[145],"provides":[146,233],"least":[147],"resemblance":[148],"original":[151,170],"when":[153],"encrypted.":[154],"Quasigroups":[155],"effectively":[156],"produce":[157],"an":[158],"astronomical":[159],"number":[160],"keys":[162],"which":[163],"confuses":[164],"hackers":[166],"identifying":[168],"data.":[171],"quasi":[173],"group":[174],"is":[176,227],"diffusing":[180],"statistics":[182],"plain":[185],"text.":[186],"Hence,":[187],"this":[188],"chained":[191],"Hadamard":[192],"transforms":[193],"Number":[195],"Theoretic":[196],"Transforms":[197],"introduce":[199],"diffusion":[200],"along":[201],"transformation.":[205],"The":[206],"experimental":[207],"results":[208],"evaluate":[209],"performance":[211],"proposed":[214,231],"time":[220],"cost":[221,224],"space":[223],"it":[226],"observed":[228],"significant":[234],"results.":[235]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
