{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275528,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905288","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Key Diffusion Approach for AVK based Cryptosystem"],"prefix":"10.1145","author":[{"given":"Shaligram","family":"Prajapat","sequence":"first","affiliation":[{"name":"Maulana Azad National Institute of Technology (MANIT), Bhopal, India"}]},{"given":"Ramjeevan Singh","family":"Thakur","sequence":"additional","affiliation":[{"name":"Maulana Azad National Institute of Technology (MANIT), Bhopal, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shaligram Prajapat R.S.Thakur \"Optimal key size of the AVK for symmetric key Encryption\" covenant university journal Volume 3 Issue 2 December 2015-12-27 ISSN(Online):2354--3507 ISSN (Print):2354--3566  Shaligram Prajapat R.S.Thakur \"Optimal key size of the AVK for symmetric key Encryption\" covenant university journal Volume 3 Issue 2 December 2015-12-27 ISSN(Online):2354--3507 ISSN (Print):2354--3566"},{"volume-title":"International Journal of Computer & Communication Technology, Vol-3, Issue 3","year":"2012","author":"Prajapat Shaligram","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A.NALLI \"On the Hadamard Product of Fibonacci Q n matrix and Fibonacci Q-n matrix\" International Journal of Contemporary Mathematical Sciences No. 16 753--761 Vol. 1 2006.  A.NALLI \"On the Hadamard Product of Fibonacci Q n matrix and Fibonacci Q-n matrix\" International Journal of Contemporary Mathematical Sciences No. 16 753--761 Vol. 1 2006.","DOI":"10.12988\/ijcms.2006.06075"},{"issue":"5","key":"e_1_3_2_1_4_1","first-page":"241","article-title":"A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography","volume":"8","author":"Bhuyan B.","year":"2008","journal-title":"IJCSNS"},{"key":"e_1_3_2_1_5_1","first-page":"398","article-title":"Time variant approach towards symmetric Key","author":"Prajapat Shaligram","year":"2013","journal-title":"SAI London, IEEE-"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217750"},{"volume-title":"International Journal HIT Transactions on ECCN","author":"Chakrabarti P.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"C.T. Bhunia Application of AVK and selective encryption in improving performance of quantum cryptography and network 2006.  C.T. Bhunia Application of AVK and selective encryption in improving performance of quantum cryptography and network 2006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Matt Blaze et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of Cryptographers and Computer Scientists 1996.  Matt Blaze et al. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security A Report by an Ad Hoc Group of Cryptographers and Computer Scientists 1996.","DOI":"10.21236\/ADA385264"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2005.12.054"},{"key":"e_1_3_2_1_11_1","unstructured":"Maxime Fern\u00e1ndezl Gloria Diazl Alberto Cosmel Irtalis Negr\u00f3nl Priscilla Negr\u00f3nl Alfredo Cryptography: algorithms and security applications The IEEE Computer Society's Student Vol. 8 No. 2 Fall 2008.  Maxime Fern\u00e1ndezl Gloria Diazl Alberto Cosmel Irtalis Negr\u00f3nl Priscilla Negr\u00f3nl Alfredo Cryptography: algorithms and security applications The IEEE Computer Society's Student Vol. 8 No. 2 Fall 2008."},{"first-page":"84","volume-title":"Information and Communication Technologies, 2005. ICICT 2005","author":"Nadeem A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","volume-title":"IJCSMS","volume":"8","author":"Abdul Diaa Salama","year":"2008"},{"issue":"4","key":"e_1_3_2_1_14_1","first-page":"1793","article-title":"Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices","volume":"1","author":"Elminaam D.","year":"2009","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"e_1_3_2_1_15_1","first-page":"2012","article-title":"Implementation of Infrormation Security With Fibonacci-Q matrix","volume":"2249","author":"Prajapat Shaligram","journal-title":"Proceedings of International Conference on International Journal of Electronics Communication and Computer Engineering, ISSN"},{"volume-title":"IRCESM","year":"2014","author":"Prajapat Shaligram","key":"e_1_3_2_1_16_1"},{"volume-title":"Sheldon M. Ross, \"Introduction to Probability models\"","edition":"10","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","first-page":"164","volume-title":"ICCSA 2015","volume":"9159","author":"Prajapat Shaligram","year":"2015"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21410-8_53"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Computing Paradigms(ICCP-2015)","volume":"70","author":"Prajapat Shaligram","year":"2015"},{"key":"e_1_3_2_1_21_1","first-page":"131","volume-title":"Published In: Second International Conference On Advances In Computing, Control And Networking - ACCN 2015 Digital Object Identifier: 10","author":"Prajapat Shaligram","year":"2015"},{"key":"e_1_3_2_1_22_1","volume-title":"Article Published in International Journal of Advanced Computer Science and Applications (IJACSA)","volume":"6","author":"Prajapat Shaligram","year":"2015"},{"volume-title":"ICICSIT","year":"2015","author":"Prajapat Shaligram","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Shaligram Prajapat R.S. Thakur \" Stochastic and markov analysis of AVK based cryptosystem\" IEEE ICCCC-2015 MITM.  Shaligram Prajapat R.S. Thakur \" Stochastic and markov analysis of AVK based cryptosystem\" IEEE ICCCC-2015 MITM."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":24,"alternative-id":["10.1145\/2905055.2905288","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905288","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}