{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:28:03Z","timestamp":1736486883097,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_21","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"309-324","source":"Crossref","is-referenced-by-count":18,"title":["High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive"],"prefix":"10.1007","author":[{"given":"Chetan Nanjunda","family":"Mathur","sequence":"first","affiliation":[]},{"given":"Karthik","family":"Narayan","sequence":"additional","affiliation":[]},{"given":"K. P.","family":"Subbalakshmi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"Algorithmic Coding Theory","author":"E.R. Berlekamp","year":"1968","unstructured":"Berlekamp, E.R.: Algorithmic Coding Theory, ch.\u00a07. McGraw-Hill, New York (1968)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/BFb0052237","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"T.A. Berson","year":"1997","unstructured":"Berson, T.A.: Failure of the McEliece Public-Key Cryptosystem under Message-Resend and Related-Message Attack. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 213\u2013220. Springer, Heidelberg (1997)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-46766-1_11","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"E. Biham","year":"1992","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 156\u2013171. Springer, Heidelberg (1992)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 487\u2013496. Springer, Heidelberg (1993)"},{"key":"21_CR5","unstructured":"Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Ph.D. thesis, K.U.Leuven (1995)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L.R., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45325-3_20","volume-title":"Cryptography and Coding","author":"J. Daemen","year":"2001","unstructured":"Daemen, J., Rijmen, V.: The Wide Trail Design Strategy. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, Springer, Heidelberg (2001)"},{"key":"21_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Feistel, H.: Cryptography and Computer Privacy \u00a0228(5), 15\u201323 (1973)","DOI":"10.1038\/scientificamerican0573-15"},{"key":"21_CR10","unstructured":"FIPS: Specification for the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001)"},{"key":"21_CR11","unstructured":"Gilbert, H., Minier, M.: A Collision Attack on 7 Rounds of Rijndael. In: AES Candidate Conference, pp. 230\u2013241 (2000)"},{"issue":"15","key":"21_CR12","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1016\/S0140-3664(97)00129-1","volume":"20","author":"W. Godoy","year":"1997","unstructured":"Godoy, W., Periera, D.: A proposal of a cryptography algorithm with techniques of error correction. Computer Communications\u00a020(15), 1374\u20131380 (1997)","journal-title":"Computer Communications"},{"key":"21_CR13","unstructured":"Hwang, T., Rao, T.: Secret Error-Correcting Codes (SECC). In: Advances in Cryptography - Crypto 1988 (1988)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-45661-9_9","volume-title":"Fast Software Encryption","author":"L.R. Knudsen","year":"2002","unstructured":"Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol.\u00a02365, p. 112. Springer, Heidelberg (2002)"},{"key":"21_CR15","unstructured":"Lucks, S.: Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. In: AES Candidate Conference, pp. 215\u2013229 (2000)"},{"key":"21_CR16","unstructured":"Mathur, C.N., Narayan, K., Subbalakshmi, K.: High Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient Block Ciphers. In: 2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN), Globecom (2005)"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 1\u201311. Springer, Heidelberg (1994)"},{"key":"21_CR18","unstructured":"McEliece, R.: A Publick Key Cryptosystem Based on Algebraic Codes. In: DNS Progress Reports 42-44, NASA Jet Propulsion Labaratory (1978)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Mushkin, M., Bar-David, I.: Capacity and coding for the Gilbert-Elliot channels. IEEE Transactions on Information Theory\u00a035, 1277\u20131290","DOI":"10.1109\/18.45284"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Nanjunda, C., Haleem, M., Chandramouli, R.: Robust Encryption for Secure Image Transmission over Wireless Channels. In: ICC 2005, IEEE International Conference on Communications, Seoul, Korea, May 16-20 (2005)","DOI":"10.1109\/ICC.2005.1494554"},{"key":"21_CR21","unstructured":"Narayan, K.: On the Design of Secure Error Resilient Diffusion Layers for Block Ciphers. Master\u2019s thesis, Steven Institute Of Technology, Hoboken, New Jersey (2005)"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-48285-7_6","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K.: Differentially Uniform Mappings for Cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 55\u201364. Springer, Heidelberg (1994)"},{"key":"21_CR23","unstructured":"Stinson, D.: Cryptography: Theory and Practice, 2nd edn. CRC\/C&H (2002)"},{"key":"21_CR24","unstructured":"van Tilborg, H.: Coding theory at work in cryptology and vice versa (1998)"},{"key":"21_CR25","volume-title":"Error control systems for digital communication and storage","author":"S.B. Wicker","year":"1995","unstructured":"Wicker, S.B.: Error control systems for digital communication and storage. Prentice-Hall, Inc., Upper Saddle River (1995)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T18:25:54Z","timestamp":1736447154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11767480_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}