{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:48Z","timestamp":1750308528709,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905352","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Modification of Symmetric-Key DES into Efficient Asymmetric-Key DES using RSA"],"prefix":"10.1145","author":[{"given":"Prerna","family":"Mohit","sequence":"first","affiliation":[{"name":"Indian school of mines Dhanbad, Jharkhand"}]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[{"name":"Indian school of mines Dhanbad, Jharkhand"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"B. Schneier . Applied Cryptography , ( third ed.)Wiley, New York 1996 . B. Schneier. Applied Cryptography, (third ed.)Wiley, New York 1996."},{"volume-title":"Design of ElGamal PKC for Encryption of Large Messages. 2nd IEEE International Conference on Computing for Sustainable Global Development,2015","author":"Mohit P.","key":"e_1_3_2_1_2_1","unstructured":"P. Mohit , G. P. Biswas . Design of ElGamal PKC for Encryption of Large Messages. 2nd IEEE International Conference on Computing for Sustainable Global Development,2015 . P. Mohit, G. P. Biswas. Design of ElGamal PKC for Encryption of Large Messages. 2nd IEEE International Conference on Computing for Sustainable Global Development,2015."},{"issue":"6","key":"e_1_3_2_1_3_1","first-page":"464","article-title":"Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques","volume":"3","author":"Singh S.","year":"2013","unstructured":"S. Singh , S. K. Maakar , S. Kumar . Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques . International Journal of Advanced Research in Computer Science and Software Engineering 3 ( 6 ), pp. 464 -- 471 . 2013 . S. Singh, S. K. Maakar, S. Kumar. Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques. International Journal of Advanced Research in Computer Science and Software Engineering 3(6), pp. 464--471. 2013.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2011.27"},{"key":"e_1_3_2_1_5_1","volume-title":"Hardware Implementation of DES Encryption Cracker. Student Conference on Engineering Sciences and Technology","author":"Shahid B.","year":"2005","unstructured":"B. Shahid , H. Tauqeer , M.S. Ilyas . Hardware Implementation of DES Encryption Cracker. Student Conference on Engineering Sciences and Technology , 2005 . B. Shahid, H. Tauqeer, M.S. Ilyas. Hardware Implementation of DES Encryption Cracker. Student Conference on Engineering Sciences and Technology, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.4441"},{"issue":"3","key":"e_1_3_2_1_7_1","article-title":"A Performance Analysis of DES and RSA Cryptography","volume":"2","author":"Singh S.","year":"2013","unstructured":"S. Singh , K. Sunil , S. K. Maakar , S. Kumar . A Performance Analysis of DES and RSA Cryptography . International Journal of Emerging Trends and Technology in Computer Science , volume 2 , Issue 3 , 2013 . S. Singh, K. Sunil, S. K. Maakar, S. Kumar. A Performance Analysis of DES and RSA Cryptography. International Journal of Emerging Trends and Technology in Computer Science, volume 2, Issue 3, 2013.","journal-title":"International Journal of Emerging Trends and Technology in Computer Science"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICM-02.2002.1161506"},{"key":"e_1_3_2_1_9_1","first-page":"2326","volume-title":"Cryptanalysis of Four-Round DES Based on Genetic Algorithm. International Conference on Wireless Communications Networking and Mobile Computing, Issue 21-25","author":"Song J.","year":"2007","unstructured":"J. Song , H. Zhang , Q. Meng , Z. Wang . Cryptanalysis of Four-Round DES Based on Genetic Algorithm. International Conference on Wireless Communications Networking and Mobile Computing, Issue 21-25 , pp. 2326 -- 2329 , 2007 . J. Song, H. Zhang, Q. Meng, Z. Wang. Cryptanalysis of Four-Round DES Based on Genetic Algorithm. International Conference on Wireless Communications Networking and Mobile Computing, Issue 21-25, pp. 2326--2329, 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"7th International Multi-Conference on Systems, Signals and Devices","author":"Alani M. M.","year":"2010","unstructured":"M. M. Alani . DES96 - Improved DES Security . 7th International Multi-Conference on Systems, Signals and Devices , 2010 . M. M. Alani. DES96 - Improved DES Security. 7th International Multi-Conference on Systems, Signals and Devices, 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"A Brute Force Search of DES Keyspace","author":"Curtin M.","year":"1998","unstructured":"M. Curtin , J. Dolske . A Brute Force Search of DES Keyspace . 1998 . M. Curtin, J. Dolske. A Brute Force Search of DES Keyspace. 1998."},{"key":"e_1_3_2_1_12_1","series-title":"May 1998","volume-title":"Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O\u00e2\u0102&Zacute;Reilly.","author":"Foundation Electronic Frontier","unstructured":"Electronic Frontier Foundation : Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O\u00e2\u0102&Zacute;Reilly. ( May 1998 ) Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design. O\u00e2\u0102&Zacute;Reilly. (May 1998)"},{"key":"e_1_3_2_1_13_1","series-title":"the series LNCS pp","volume-title":"Experience Using a Low-Cost FPGA Design to Crack DES Keys. Cryptographic Hardware and Embedded Systems - CHES","author":"Clayton R.","year":"2002","unstructured":"R. Clayton , M. Bond . Experience Using a Low-Cost FPGA Design to Crack DES Keys. Cryptographic Hardware and Embedded Systems - CHES , Volume 2523 of the series LNCS pp . 579--592 2002 . R.Clayton, M. Bond. Experience Using a Low-Cost FPGA Design to Crack DES Keys. Cryptographic Hardware and Embedded Systems - CHES, Volume 2523 of the series LNCS pp. 579--592 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_15_1","volume-title":"4th IEEE International Symposium on Spread Spectrum Techniques and Applications Proceedings","author":"Han S.","year":"1996","unstructured":"S. Han , H. Heang-Soo Oh , J. Park . The improved Data Encryption Standard (DES) Algorithm . 4th IEEE International Symposium on Spread Spectrum Techniques and Applications Proceedings , 1996 . S. Han, H. Heang-Soo Oh, J. Park. The improved Data Encryption Standard (DES) Algorithm. 4th IEEE International Symposium on Spread Spectrum Techniques and Applications Proceedings, 1996."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39059-3_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WMSVM.2010.48"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:55:49Z","timestamp":1750272949000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":17,"alternative-id":["10.1145\/2905055.2905352","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905352","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}