{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:50:32Z","timestamp":1729612232210,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/uemcon.2016.7777842","type":"proceedings-article","created":{"date-parts":[[2016,12,12]],"date-time":"2016-12-12T20:35:39Z","timestamp":1481574939000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["RASS \u2014 A concurrency based bitwise symmetric key cryptographic algorithm"],"prefix":"10.1109","author":[{"given":"Abhriya","family":"Roy","sequence":"first","affiliation":[]},{"given":"Ronit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Saptarshi","family":"De","sequence":"additional","affiliation":[]},{"given":"Shalini","family":"Guha","sequence":"additional","affiliation":[]},{"given":"Sukalyan","family":"Goswami","sequence":"additional","affiliation":[]},{"given":"Ratan Kumar","family":"Basak","sequence":"additional","affiliation":[]},{"given":"Bipasha","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Souvik","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Amrin","family":"Zaman","sequence":"additional","affiliation":[]},{"given":"Sucheta","family":"Nag","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.5120\/11507-7224","article-title":"A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security","volume":"67","author":"singh","year":"2013","journal-title":"International Journal of Computer Applications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCE.2014.7086640"},{"key":"ref12","article-title":"Analysis in Symmetric and Asymmetric Cryptology Algorithm","volume":"4","author":"mathur","year":"0","journal-title":"International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5120\/7626-0687"},{"key":"ref14","article-title":"Bit Level Symmetric Key Encryption Algorithm (BLSKEA-1) Version-1","volume":"3","author":"nath","year":"2015","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2011.020709"},{"journal-title":"Practical Framework for Contract-based Concurrent Object-oriented Programming","year":"0","author":"nienaltowski","key":"ref4"},{"journal-title":"Introduction to Modern Cryptography","year":"0","author":"bellare","key":"ref3"},{"key":"ref6","article-title":"Format Preserving Encryption using Feistel Cipher","author":"vidhya","year":"0","journal-title":"International Conference on Research Trends in Computer Technologies(ICRTCT-2013) Proceedings published in International Journal of Computer Applications&#x00AE; (IJCA)"},{"key":"ref5","article-title":"Bitwise Operations Based Encryption and Decryption","volume":"3","author":"naveen kumar","year":"2011","journal-title":"International Journal on Computer Science and Engineering (IJCSE)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2011.6151539"},{"journal-title":"Hill cipher and Modular Linear Algebra","year":"1999","author":"eisenberg","key":"ref7"},{"journal-title":"Crypto 101 II","year":"0","author":"van houtven","key":"ref2"},{"key":"ref1","article-title":"Data Encryption Techniques for Dependable and Secure Cloud Computing","volume":"1","author":"kaushik","year":"0","journal-title":"2014 IJIRT"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEMR.2014.7043664"}],"event":{"name":"2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","start":{"date-parts":[[2016,10,20]]},"location":"New York City, NY, USA","end":{"date-parts":[[2016,10,22]]}},"container-title":["2016 IEEE 7th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7763653\/7777798\/07777842.pdf?arnumber=7777842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T08:50:24Z","timestamp":1568623824000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7777842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/uemcon.2016.7777842","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}