{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:26Z","timestamp":1725551606739},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_16","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"217-227","source":"Crossref","is-referenced-by-count":0,"title":["CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks"],"prefix":"10.1007","author":[{"given":"Debdeep","family":"Mukhopadhyay","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abhishek","family":"Chaudhary","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arvind","family":"Nebhnani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dipanwita","family":"RoyChowdhury","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"TIA Telecommunications Industry\u00a0Association, Common Cryptographic Algorithms, Revision D.1, Publication Version (September 13 2003), \n                  \n                    http:\/\/ftp.tiaonline.org\/TR-45\/TR45AHAG\/Public\/ComCryptAlgD1.pdf"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/BFb0052260","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"D. Wagner","year":"1997","unstructured":"Wagner, D., Schneier, B., Kelsey, J.: Cryptanalysis of the Cellular Message Encryption Algorithm. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 526\u2013537. Springer, Heidelberg (1997)"},{"key":"16_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)"},{"key":"16_CR4","unstructured":"Rijmen, V.: Efficient Implementation of the Rijndael Sbox, \n                  \n                    http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael"},{"key":"16_CR5","unstructured":"Keys, H.M.: A Tutorial on Linear and Differential Cryptanalysis, \n                  \n                    http:\/\/www.engr.mun.ca\/~howard\/PAPERS\/ldc_tutorial.ps"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:58Z","timestamp":1619506318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/11593980_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}