{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:14:24Z","timestamp":1763388864198,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637215","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:21:09Z","timestamp":1383088869000},"page":"460-465","source":"Crossref","is-referenced-by-count":6,"title":["Ciphers based on special graphs"],"prefix":"10.1109","author":[{"given":"P. L. K.","family":"Priyadarsini","sequence":"first","affiliation":[]},{"given":"Ramakalyan","family":"Ayyagari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ranks and Structure of Graphs","year":"1995","author":"peeters","key":"19"},{"journal-title":"Hadamard Matrix from MathWorld A Wolfram Web Resource Accessed","year":"0","author":"weisstein","key":"22"},{"key":"17","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1023\/A:1026479210284","article-title":"Binary codes of strongly regular graphs, designs","volume":"17","author":"haemers","year":"1999","journal-title":"Codes and Cryptography"},{"key":"23","volume":"2007","author":"haemers","year":"2007","journal-title":"Strongly regular graphs with maximal energy"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022438616684"},{"journal-title":"Parameters of Strongly Regular Graphs","year":"2013","key":"24"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22670-0_10"},{"journal-title":"Strongly Regular Graphs","year":"0","author":"cameron","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2008.11.006"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"journal-title":"On Extremal Graph Theory for Directed Graphs and Its Applications to Information Security","year":"0","author":"ustimenko","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004376"},{"journal-title":"Introduction to Graph Theory","year":"1999","author":"west","key":"21"},{"key":"3","first-page":"70","author":"mittenthal","year":"2007","journal-title":"Sequencings and Directed Graphs with Applications to Cryptography"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/18.568714"},{"journal-title":"Denial Cryptography Based on Graph Theory","year":"2004","author":"gideon","key":"2"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2006","author":"stallings","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IMCSIT.2008.4747255"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s10958-007-0453-2"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020686216463"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45624-4_29","article-title":"CRYPTIM: Graphs as tools for symmetric encryption","volume":"2227","author":"ustimenko","year":"2001","journal-title":"Lecture Notes in Comput Sci"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69733-6_23"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.5488\/CMP.11.2.347"},{"key":"8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.55630\/sjc.2007.1.131-156","article-title":"On graph-based cryptography and symbolic computations","volume":"1","author":"ustimenko","year":"2007","journal-title":"Serdica Journal of Computing"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637215.pdf?arnumber=6637215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T19:20:14Z","timestamp":1688584814000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637215","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}