{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:20Z","timestamp":1750220900330,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T00:00:00Z","timestamp":1575590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,6]]},"DOI":"10.1145\/3374587.3374597","type":"proceedings-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T18:16:31Z","timestamp":1583345791000},"page":"33-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of An Effective Cryptographic Algorithm Using Random Matrix Shared Key"],"prefix":"10.1145","author":[{"given":"Mohammed Nasir","family":"Uddin","sequence":"first","affiliation":[{"name":"Dept. of CSE, Jagannath University, Dhaka, Bangladesh"}]},{"given":"Syada Tasmia","family":"Alvi","sequence":"additional","affiliation":[{"name":"Dept. of CSE, Jagannath University, Dhaka, Bangladesh"}]},{"given":"Rakib","family":"Hossen","sequence":"additional","affiliation":[{"name":"Dept. of CSE, Jagannath University, Dhaka, Bangladesh"}]},{"given":"Abdus","family":"Samad","sequence":"additional","affiliation":[{"name":"Dept. of CSE, Jagannath University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"issue":"6","key":"e_1_3_2_1_1_1","first-page":"376","article-title":"Key generation using genetic algorithm for image encryption","volume":"7","author":"Soni A.","year":"2013","unstructured":"A. Soni and S. Agarwal , \" Key generation using genetic algorithm for image encryption ,\" International Journal of Computer Science and Mobile Computing , vol. 7 , no. 6 , pp. 376 -- 383 , 2013 . A. Soni and S. Agarwal, \"Key generation using genetic algorithm for image encryption,\" International Journal of Computer Science and Mobile Computing, vol. 7, no. 6, pp. 376--383, 2013.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Symmetric key algorithm using vernam ci-pher:vsa","volume":"3","author":"Pawar B. K.","year":"2016","unstructured":"B. K. Pawar and S. S. Hatkar ., \" Symmetric key algorithm using vernam ci-pher:vsa ,\" International Conference on Inventive Computation Technologies(ICICT) , vol. 3 , pp. 1 -- 5 , 2016 . B. K. Pawar and S. S. Hatkar., \"Symmetric key algorithm using vernam ci-pher:vsa,\" International Conference on Inventive Computation Technologies(ICICT), vol. 3, pp. 1--5, 2016.","journal-title":"International Conference on Inventive Computation Technologies(ICICT)"},{"issue":"16","key":"e_1_3_2_1_3_1","article-title":"A novel symmetric key cryptog-raphy using multiple random secret keys","volume":"80","author":"Chakravarthy A. S. N.","year":"2013","unstructured":"A. S. N. Chakravarthy and T. Anjikumar , \" A novel symmetric key cryptog-raphy using multiple random secret keys ,\" International Journal of ComputerApplications , vol. 80 , no. 16 , 2013 . A. S. N. Chakravarthy and T. Anjikumar, \"A novel symmetric key cryptog-raphy using multiple random secret keys,\" International Journal of ComputerApplications, vol. 80, no. 16, 2013.","journal-title":"International Journal of ComputerApplications"},{"key":"e_1_3_2_1_4_1","first-page":"629","article-title":"A fast and secure encryption algorithm formessage communication","author":"Paul A. J.","year":"2007","unstructured":"A. J. Paul , V. Paul , and P. Mythili , \" A fast and secure encryption algorithm formessage communication ,\" IET-UK International Conference on Informationand Communication Technology in Electrical Sciences , pp. 629 -- 634 , 2007 . A. J.Paul, V. Paul, and P. Mythili, \"A fast and secure encryption algorithm formessage communication,\" IET-UK International Conference on Informationand Communication Technology in Electrical Sciences, pp. 629--634, 2007.","journal-title":"IET-UK International Conference on Informationand Communication Technology in Electrical Sciences"},{"key":"e_1_3_2_1_5_1","article-title":"Performance evaluation of new encryption algorithmswith emphasis on probabilistic encryption time stamp in network security","volume":"5","author":"Bala S.","year":"2015","unstructured":"S. Bala and V. Arora ,\" Performance evaluation of new encryption algorithmswith emphasis on probabilistic encryption time stamp in network security ,\" International Journal of Advanced Research in Computer Science and Software Engineering , vol. 5 , 2015 . S. Bala and V. Arora,\" Performance evaluation of new encryption algorithmswith emphasis on probabilistic encryption time stamp in network security,\" International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, 2015.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_3_2_1_6_1","unstructured":"A.V.N. KRISHNA \" Performance evaluation of new encryption algorithms with emphasis on probabilistic encryption time stamp in network security \" 2009.  A.V.N. KRISHNA \" Performance evaluation of new encryption algorithms with emphasis on probabilistic encryption time stamp in network security \" 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"Cryptography and network security, [","author":"Forouzan B. A.","year":"2010","unstructured":"B. A. Forouzan and D. Mukhopadhyay ,\" Cryptography and network security, [ second edition], mcgraw hill education private limited,\" 2010 . B. A. Forouzan and D. Mukhopadhyay,\" Cryptography and network security, [second edition], mcgraw hill education private limited,\" 2010."},{"key":"e_1_3_2_1_8_1","unstructured":"R. E. Klima and N. P.Sigmon \"Cryptology classical and modern with maplets.\"  R. E. Klima and N. P.Sigmon \"Cryptology classical and modern with maplets.\""},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bell Systems Technical Journal 1948 28 Communication theory of secrecy systems","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_10_1","unstructured":"\" Java program for letter frequency analysis.\" [Online]. Available: https:\/\/prestobear.com\/2017\/03\/java-program-letter-frequency-analysis  \" Java program for letter frequency analysis.\" [Online]. Available: https:\/\/prestobear.com\/2017\/03\/java-program-letter-frequency-analysis"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2015.7282273"},{"key":"e_1_3_2_1_12_1","volume-title":"COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS","author":"Palanisamy AL., Dr. V.","year":"2012","unstructured":"Jeeva, AL., Dr. V. Palanisamy and K. Kanagaram . COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS . 2012 . Jeeva, AL., Dr. V. Palanisamy and K. Kanagaram. COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS. 2012."},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"127","article-title":"Comparative Analysis of Cryptographic Algorithms","volume":"1","author":"Hercigonja Zoran","year":"2016","unstructured":"Zoran Hercigonja ,\" Comparative Analysis of Cryptographic Algorithms ,\" International Journal of Digital Technology and Economy, Algebra University College , vol. 1 ( 2 ), pages 127 -- 134 , December , 2016 Zoran Hercigonja,\" Comparative Analysis of Cryptographic Algorithms,\" International Journal of Digital Technology and Economy, Algebra University College, vol. 1(2), pages 127--134, December, 2016","journal-title":"International Journal of Digital Technology and Economy, Algebra University College"}],"event":{"name":"CSAI2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Normal IL USA","acronym":"CSAI2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374587.3374597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:44Z","timestamp":1750203884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374587.3374597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,6]]},"references-count":13,"alternative-id":["10.1145\/3374587.3374597","10.1145\/3374587"],"URL":"https:\/\/doi.org\/10.1145\/3374587.3374597","relation":{},"subject":[],"published":{"date-parts":[[2019,12,6]]},"assertion":[{"value":"2020-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}