{"id":"https://openalex.org/W2511445749","doi":"https://doi.org/10.1145/2905055.2905166","title":"Symmetric Cryptography using Multiple Access Circular Queues (MACQ)","display_name":"Symmetric Cryptography using Multiple Access Circular Queues (MACQ)","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2511445749","doi":"https://doi.org/10.1145/2905055.2905166","mag":"2511445749"},"language":"en","primary_location":{"id":"doi:10.1145/2905055.2905166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084221669","display_name":"Sona Phull","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Sona Phull","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh","institution_ids":["https://openalex.org/I4210126505"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038698673","display_name":"Subhranil Som","orcid":"https://orcid.org/0000-0002-1454-7141"},"institutions":[{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Subhranil Som","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, Uttar Pradesh","institution_ids":["https://openalex.org/I4210126505"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084221669"],"corresponding_institution_ids":["https://openalex.org/I4210126505"],"apc_list":null,"apc_paid":null,"fwci":0.835,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.80468894,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7324635982513428},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6895559430122375},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.6484341621398926},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6481547355651855},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.6158234477043152},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5585360527038574},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.5371314883232117},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4672386944293976},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.4563709795475006},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4554273188114166},{"id":"https://openalex.org/keywords/affine-cipher","display_name":"Affine cipher","score":0.4374420940876007},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4117221534252167},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3696659207344055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32464489340782166},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.31592434644699097},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1708621084690094}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7324635982513428},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6895559430122375},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.6484341621398926},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6481547355651855},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.6158234477043152},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5585360527038574},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.5371314883232117},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4672386944293976},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.4563709795475006},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4554273188114166},{"id":"https://openalex.org/C57669260","wikidata":"https://www.wikidata.org/wiki/Q382486","display_name":"Affine cipher","level":5,"score":0.4374420940876007},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4117221534252167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3696659207344055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32464489340782166},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.31592434644699097},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1708621084690094}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2905055.2905166","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2905055.2905166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2020635610","https://openalex.org/W2159270886","https://openalex.org/W2184870945","https://openalex.org/W2212003202","https://openalex.org/W2336424057","https://openalex.org/W2396621248","https://openalex.org/W2507097824","https://openalex.org/W2549762996","https://openalex.org/W2950937815"],"related_works":["https://openalex.org/W2373660491","https://openalex.org/W3005443245","https://openalex.org/W4383551881","https://openalex.org/W2531227589","https://openalex.org/W2156707592","https://openalex.org/W2994366300","https://openalex.org/W2780660191","https://openalex.org/W15269077","https://openalex.org/W4298445129","https://openalex.org/W2963298596"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,23,53,135],"provide":[3],"secure":[4,129,142],"data":[5],"communication":[6],"in":[7,119],"present":[8],"cyber":[9],"space":[10],"world,":[11],"a":[12,17,33,54,124],"stronger":[13],"encryption":[14,138],"technique":[15],"becomes":[16],"necessity":[18],"that":[19,39,100,140],"can":[20],"help":[21,118],"people":[22],"protect":[24],"their":[25],"sensitive":[26],"information":[27,52],"from":[28],"cryptanalyst.":[29],"This":[30,132],"paper":[31,133],"proposes":[32],"novel":[34],"symmetric":[35],"block":[36,130],"cipher":[37,108,122],"algorithm":[38,139],"uses":[40],"multiple":[41],"access":[42],"circular":[43,79],"queues":[44],"(MACQs)":[45],"of":[46,51,65,72,76,78,82],"variable":[47,66],"lengths":[48,67],"for":[49],"diffusion":[50],"greater":[55],"extent.":[56],"The":[57],"keys":[58],"are":[59,91],"randomly":[60],"generated":[61],"and":[62,84,106,128,143],"will":[63,117],"be":[64],"depending":[68],"upon":[69],"the":[70,86,101,104,107,121],"size":[71],"each":[73,94],"MACQ.A":[74],"number":[75],"iterations":[77],"rotations,":[80],"swapping":[81],"elements":[83,90],"XORing":[85],"key":[87,105],"with":[88],"queue":[89],"performed":[92],"on":[93],"MACQ.":[95],"S-box":[96],"is":[97,141],"used":[98],"so":[99],"relationship":[102],"between":[103],"text":[109],"remains":[110],"indeterminate":[111],"or":[112],"obscure.":[113],"These":[114],"operations":[115],"together":[116],"transforming":[120],"into":[123],"much":[125],"more":[126],"complex":[127],"cipher.":[131],"attempt":[134],"propose":[136],"an":[137],"fast.":[144]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
