{"id":"https://openalex.org/W4396852329","doi":"https://doi.org/10.1145/3647444.3647853","title":"Cryptographic algorithm development and application for encryption and decryption","display_name":"Cryptographic algorithm development and application for encryption and decryption","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4396852329","doi":"https://doi.org/10.1145/3647444.3647853"},"language":"en","primary_location":{"id":"doi:10.1145/3647444.3647853","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078220553","display_name":"Rahul Pitale","orcid":"https://orcid.org/0009-0005-3466-7342"},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rahul Ravindra Pitale","raw_affiliation_strings":["Computer Engineering, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070244196","display_name":"Kapil Tajane","orcid":"https://orcid.org/0000-0002-6289-2193"},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kapil Dinkarrao Tajane","raw_affiliation_strings":["Computer Engineering, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Engineering, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097982365","display_name":"Prathamesh Bhagwat Mahajan","orcid":"https://orcid.org/0009-0005-6002-2169"},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Prathamesh Bhagwat Mahajan","raw_affiliation_strings":["Computer Department, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Department, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097955576","display_name":"Nishita Sharad Nehate","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nishita Sharad Nehate","raw_affiliation_strings":["Computer Department, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Department, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097982366","display_name":"Apeksha Jagdish Mulimani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Apeksha Jagdish Mulimani","raw_affiliation_strings":["Computer Department, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Department, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5097927718","display_name":"Devarsh Sandeep Lokhande","orcid":"https://orcid.org/0009-0000-1006-919X"},"institutions":[{"id":"https://openalex.org/I4210130463","display_name":"Chhattisgarh Dental College & Research Institute","ror":"https://ror.org/02v72sd52","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210130463"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devarsh Sandeep Lokhande","raw_affiliation_strings":["Computer Department, Pimpri Chinchwad College of Engineering, India"],"affiliations":[{"raw_affiliation_string":"Computer Department, Pimpri Chinchwad College of Engineering, India","institution_ids":["https://openalex.org/I4210130463"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078220553"],"corresponding_institution_ids":["https://openalex.org/I4210130463"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22775659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7142902612686157},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6862301826477051},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6382442712783813},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.466880738735199},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.37575098872184753},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3381151258945465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24674367904663086}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7142902612686157},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6862301826477051},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6382442712783813},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.466880738735199},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.37575098872184753},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3381151258945465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24674367904663086}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3647444.3647853","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3647444.3647853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1489021826","https://openalex.org/W1980920861","https://openalex.org/W2002873465","https://openalex.org/W2132653450","https://openalex.org/W2140514778","https://openalex.org/W2162334018","https://openalex.org/W2335588581","https://openalex.org/W2604772494","https://openalex.org/W2935593561","https://openalex.org/W2953462189","https://openalex.org/W3015224408","https://openalex.org/W3033440598","https://openalex.org/W3049097090","https://openalex.org/W3155559132","https://openalex.org/W3167970718","https://openalex.org/W4200451139","https://openalex.org/W6645617849","https://openalex.org/W6728620615","https://openalex.org/W6782054923"],"related_works":["https://openalex.org/W2977762426","https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W87530933","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Abstract\u2014Cryptographic":[0],"algorithms":[1,32,63,114,136,168],"are":[2],"used":[3,150],"to":[4,151,169],"maintain":[5],"the":[6,12,21,39,57,74,78,93,110,128,132,146,156,184],"data":[7,25,44,172],"confidentiality":[8,40],"and":[9,18,41,48,59,67,87,98,137,142,155,165,189],"integrity.":[10],"In":[11,105],"era":[13],"of":[14,23,43,61,73,81,95,134,159],"ubiquitous":[15],"digital":[16,175],"communication":[17],"information":[19],"exchange,":[20],"security":[22],"sensitive":[24,171],"has":[26],"become":[27],"a":[28,34,174],"paramount":[29],"concern.":[30],"Cryptographic":[31],"play":[33],"vital":[35],"role":[36],"in":[37,101,140,173],"ensuring":[38],"integrity":[42],"by":[45,182],"facilitating":[46],"encryption":[47,66,85,141],"decryption":[49,68],"processes.":[50],"This":[51,125],"paper":[52,75,107],"presents":[53],"an":[54],"exploration":[55],"into":[56,77],"development":[58],"application":[60],"cryptographic":[62,113,135,160,167],"for":[64],"robust":[65],"purposes.":[69],"The":[70],"first":[71],"section":[72],"delves":[76],"foundational":[79],"principles":[80,188],"cryptography,":[82],"elucidating":[83],"various":[84],"techniques":[86],"their":[88,138],"historical":[89],"evolution.":[90],"It":[91,144],"highlights":[92,145],"significance":[94],"algorithmic":[96],"complexity":[97],"key":[99],"management":[100],"achieving":[102],"secure":[103],"communication.":[104],"this":[106],"we":[108],"discuss":[109],"eight":[111],"known":[112],"namely,":[115],"DES,":[116],"3-DES,":[117],"RSA,":[118],"AES,":[119],"IDEA,":[120],"Blowfish":[121],"algorithm,":[122],"Homomorphic":[123],"encryption.":[124],"document":[126],"summarizes":[127],"complex":[129],"interaction":[130,185],"between":[131,186],"creation":[133],"use":[139,166],"decryption.":[143],"constantly":[147],"evolving":[148],"methods":[149],"thwart":[152],"new":[153],"attacks":[154],"dynamic":[157],"nature":[158],"research.":[161],"Stakeholders":[162],"can":[163],"choose":[164],"protect":[170],"environment":[176],"that":[177],"is":[178],"becoming":[179],"more":[180],"interconnected":[181],"understanding":[183],"theoretical":[187],"actual":[190],"execution.":[191]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
