{"id":"https://openalex.org/W4386894374","doi":"https://doi.org/10.3390/cryptography7030044","title":"A Novel and Secure Fake-Modulus Based Rabin-\u04e0 Cryptosystem","display_name":"A Novel and Secure Fake-Modulus Based Rabin-\u04e0 Cryptosystem","publication_year":2023,"publication_date":"2023-09-19","ids":{"openalex":"https://openalex.org/W4386894374","doi":"https://doi.org/10.3390/cryptography7030044"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7030044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030044","pdf_url":"https://www.mdpi.com/2410-387X/7/3/44/pdf?version=1695114791","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/3/44/pdf?version=1695114791","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112475163","display_name":"Raghunandan Ramesh","orcid":null},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]},{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Raghunandan Ramesh","raw_affiliation_strings":["Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","Department of Computer Science and Engineering, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","institution_ids":["https://openalex.org/I165831266"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India","institution_ids":["https://openalex.org/I1333540553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050767858","display_name":"Radhakrishna Dodmane","orcid":"https://orcid.org/0000-0002-2622-0082"},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]},{"id":"https://openalex.org/I165831266","display_name":"Nirma University","ror":"https://ror.org/05qkq7x38","country_code":"IN","type":"education","lineage":["https://openalex.org/I165831266"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Radhakrishna Dodmane","raw_affiliation_strings":["Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","Department of Computer Science and Engineering, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","institution_ids":["https://openalex.org/I165831266"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India","institution_ids":["https://openalex.org/I1333540553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044701876","display_name":"Surendra Shetty","orcid":null},"institutions":[{"id":"https://openalex.org/I1333540553","display_name":"Nitte University","ror":"https://ror.org/029nydt37","country_code":"IN","type":"education","lineage":["https://openalex.org/I1333540553"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Surendra Shetty","raw_affiliation_strings":["Department of Master of Computer Applications, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","Department of Master of Computer Applications, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India"],"affiliations":[{"raw_affiliation_string":"Department of Master of Computer Applications, NMAM Institute of Technology, NITTE University, Karnataka 574110, India","institution_ids":["https://openalex.org/I1333540553"]},{"raw_affiliation_string":"Department of Master of Computer Applications, NMAM Institute of Technology-Affiliated to Nitte (Deemed to be University), Karnataka 574110, India","institution_ids":["https://openalex.org/I1333540553"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028450960","display_name":"Ganesh Aithal","orcid":"https://orcid.org/0000-0003-2777-9897"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ganesh Aithal","raw_affiliation_strings":["Department of Computer Science and Engineering, SMVITM, Bantakal 574115, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, SMVITM, Bantakal 574115, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054396197","display_name":"Monalisa Sahu","orcid":"https://orcid.org/0000-0002-6928-7017"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Monalisa Sahu","raw_affiliation_strings":["Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, Amaravati 522503, India"],"affiliations":[{"raw_affiliation_string":"Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, Amaravati 522503, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054697970","display_name":"Ad\u0131tya Kumar Sahu","orcid":"https://orcid.org/0000-0003-4257-0688"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aditya Sahu","raw_affiliation_strings":["Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, Amaravati 522503, India"],"affiliations":[{"raw_affiliation_string":"Amrita School of Computing Amaravati, Amrita Vishwa Vidyapeetham, Amaravati 522503, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5050767858","https://openalex.org/A5054396197","https://openalex.org/A5054697970"],"corresponding_institution_ids":["https://openalex.org/I1333540553","https://openalex.org/I165831266","https://openalex.org/I81556334"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.7889,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.8740588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"7","issue":"3","first_page":"44","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7145247459411621},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6959677934646606},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6371850967407227},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6165332198143005},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5696676969528198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.56270831823349},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4717693626880646},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4408467710018158},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4343975782394409}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7145247459411621},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6959677934646606},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6371850967407227},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6165332198143005},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5696676969528198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56270831823349},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4717693626880646},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4408467710018158},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4343975782394409}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7030044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030044","pdf_url":"https://www.mdpi.com/2410-387X/7/3/44/pdf?version=1695114791","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4113b78a21f2481f8a53fb48be2f7a11","is_oa":true,"landing_page_url":"https://doaj.org/article/4113b78a21f2481f8a53fb48be2f7a11","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 3, p 44 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7030044","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7030044","pdf_url":"https://www.mdpi.com/2410-387X/7/3/44/pdf?version=1695114791","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386894374.pdf","grobid_xml":"https://content.openalex.org/works/W4386894374.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1507896375","https://openalex.org/W2056539738","https://openalex.org/W2104357149","https://openalex.org/W2167989228","https://openalex.org/W2344809880","https://openalex.org/W2516553980","https://openalex.org/W2562853814","https://openalex.org/W2625183243","https://openalex.org/W2735812272","https://openalex.org/W2783750394","https://openalex.org/W2798380028","https://openalex.org/W2900190845","https://openalex.org/W2901602009","https://openalex.org/W2963554541","https://openalex.org/W3003027562","https://openalex.org/W3023495073","https://openalex.org/W3033331518","https://openalex.org/W3175552437","https://openalex.org/W3186214590","https://openalex.org/W3216657397","https://openalex.org/W4205131636","https://openalex.org/W4206197292","https://openalex.org/W4232836212","https://openalex.org/W4312619979","https://openalex.org/W4317825030","https://openalex.org/W4376115708","https://openalex.org/W4377030789","https://openalex.org/W4382722948","https://openalex.org/W4394668712","https://openalex.org/W6761917809","https://openalex.org/W6854139131","https://openalex.org/W6864592911"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W4386242069","https://openalex.org/W4236344152","https://openalex.org/W2936027227","https://openalex.org/W4310649982","https://openalex.org/W4224241849","https://openalex.org/W2011667854","https://openalex.org/W2949316140","https://openalex.org/W1565128838"],"abstract_inverted_index":{"Electronic":[0],"commerce":[1,37,189],"(E-commerce)":[2],"transactions":[3],"require":[4],"secure":[5,35],"communication":[6],"to":[7,33,64,96,121,138,143,152,163,175,213,257,274],"protect":[8],"sensitive":[9,184],"information":[10,185],"such":[11,204],"as":[12,205,279],"credit":[13],"card":[14],"numbers,":[15],"personal":[16],"identification,":[17],"and":[18,24,40,51,82,94,158,180,199,208,240,245],"financial":[19],"data":[20],"from":[21,86],"unauthorized":[22],"access":[23,182],"fraud.":[25],"Encryption":[26],"using":[27,197],"public":[28,47,146,178],"key":[29,48,179],"cryptography":[30,49],"is":[31,54,61,136,150,161,173,195,248,255,271,283],"essential":[32],"ensure":[34],"electronic":[36,188],"transactions.":[38,190],"RSA":[39,81],"Rabin":[41,83,127,263],"cryptosystem":[42,128],"algorithms":[43],"are":[44,211],"widely":[45],"used":[46,137,212],"techniques,":[50],"their":[52],"security":[53,124],"based":[55],"on":[56],"the":[57,66,101,111,123,126,145,153,159,166,171,177,183,215,221,224,227,235,251,262,276],"assumption":[58],"that":[59,109,269],"it":[60,265,270],"computationally":[62],"infeasible":[63],"factorize":[65,144,176],"product":[67],"of":[68,80,113,125,223,229,232,237,243,261],"two":[69],"large":[70],"prime":[71],"numbers":[72],"into":[73],"its":[74],"constituent":[75],"primes.":[76],"However,":[77],"existing":[78],"variants":[79],"cryptosystems":[84],"suffer":[85],"issues":[87],"like":[88],"high":[89],"computational":[90],"complexity,":[91],"low":[92],"speed,":[93],"vulnerability":[95],"factorization":[97],"attacks.":[98],"To":[99,219],"overcome":[100],"issue,":[102],"this":[103],"article":[104],"proposes":[105],"a":[106,131,169,230,258],"new":[107],"method":[108,119],"introduces":[110],"concept":[112],"fake-modulus":[114,132,149],"during":[115,133,156,187],"encryption.":[116],"The":[117,148,191],"proposed":[118,192,216,225,252,277],"aims":[120],"increase":[122],"by":[129],"introducing":[130],"encryption,":[134,157],"which":[135,282],"confuse":[139],"attackers":[140],"who":[141],"attempt":[142],"key.":[147],"added":[151],"original":[154],"modulus":[155],"attacker":[160,172],"unable":[162,174],"distinguish":[164],"between":[165],"two.":[167],"As":[168],"result,":[170],"cannot":[181],"transmitted":[186],"method\u2019s":[193,253],"performance":[194,222],"evaluated":[196],"qualitative":[198],"quantitative":[200],"measures.":[201],"Qualitative":[202],"measures":[203],"visual":[206],"analysis":[207,210,242],"histogram":[209],"evaluate":[214],"system\u2019s":[217],"quality.":[218],"quantify":[220],"method,":[226],"entropy":[228],"number":[231],"occurrences":[233],"for":[234],"pixels":[236],"cipher":[238,246],"text":[239,247],"differential":[241],"plaintext":[244],"used.":[249],"When":[250],"complexity":[254],"compared":[256],"recent":[259],"variant":[260],"cryptosystem,":[264],"can":[266],"be":[267],"seen":[268],"more":[272],"complex":[273],"break":[275],"method\u2014represented":[278],"O(\u0272\u00d7":[280],"\u03c4)":[281],"higher":[284],"than":[285],"Rabin-P":[286],"(O(\u0272))":[287],"algorithms.":[288]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
