{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:07:48Z","timestamp":1754161668488,"version":"3.41.2"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031952951"},{"type":"electronic","value":"9783031952968"}],"license":[{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T00:00:00Z","timestamp":1753833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-95296-8_6","type":"book-chapter","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:16:48Z","timestamp":1753766208000},"page":"62-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection of Transaction Data of Financial Information Systems in Communication Networks Based on Sea80 New Stream Encryption Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8767-2456","authenticated-orcid":false,"given":"G. U.","family":"Juraev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5873-5928","authenticated-orcid":false,"given":"Bozorov","family":"Asqar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2290-5786","authenticated-orcid":false,"given":"Rakhimberdiev","family":"Kuvonchbek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,30]]},"reference":[{"key":"6_CR1","unstructured":"ISO\/IEC 29192\u20133:2012. International standard for lightweight cryptographic methods, ISO\/IEC (2012)"},{"key":"6_CR2","unstructured":"\u0416\u0443\u0440\u0430\u0435\u0432 \u0413.\u0423., \u0418\u043a\u0440\u0430\u043c\u043e\u0432 \u0410.\u0410. \u041f\u0440\u0438\u043d\u0446\u0438\u043f\u044b \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f \u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0441\u0438\u043c\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u044b\u0445 \u043f\u043e\u0442\u043e\u0447\u043d\u044b\u0445 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445. \u0424\u0435\u0440\u0433\u0430\u043d\u0430, 2024. -196 \u0441"},{"volume-title":"New stream cipher designs: the eSTREAM finalists","year":"2008","key":"6_CR3","unstructured":"Robshaw, M., Billet, O. (eds.): New stream cipher designs: the eSTREAM finalists. Springer Berlin Heidelberg, Berlin, Heidelberg (2008)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/11836810_13","volume-title":"Information Security","author":"C De Canni\u00e8re","year":"2006","unstructured":"De Canni\u00e8re, C.: Trivium: a stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., L\u00f3pez, J., M, Backes, S. Gritzalis, B. Preneel, (eds.) Information Security, pp. 171\u2013186. Springer Berlin Heidelberg, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11836810_13"},{"issue":"13","key":"6_CR5","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.3390\/math12132120","volume":"12","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Saymanov, I.: Synthesis of optimal correction functions in the class of disjunctive normal forms. Mathematics 12(13), 2120 (2024). https:\/\/doi.org\/10.3390\/math12132120","journal-title":"Mathematics"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-540-77360-3_3","volume-title":"Selected Areas in Cryptography","author":"A Maximov","year":"2007","unstructured":"Maximov, A., Biryukov, A.: Two trivial attacks on Trivium. In: Adams, C., Miri, A., Wiener, M. (eds.) Selected Areas in Cryptography, pp. 36\u201355. Springer Berlin Heidelberg, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77360-3_3"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.procs.2024.05.078","volume":"237","author":"M Al-Zubaidie","year":"2024","unstructured":"Al-Zubaidie, M., Muhajjar, R.A.: Integrating trustworthy mechanisms to support data and information security in health sensors. Procedia Comput. Sci. 237, 43\u201352 (2024). https:\/\/doi.org\/10.1016\/j.procs.2024.05.078","journal-title":"Procedia Comput. Sci."},{"issue":"14","key":"6_CR8","doi-asserted-by":"publisher","first-page":"6361","DOI":"10.3390\/app14146361","volume":"14","author":"M Al-Zubaidie","year":"2024","unstructured":"Al-Zubaidie, M., Alaa Jebbar, W.: Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment. Appl. Sci. 14(14), 6361 (2024). https:\/\/doi.org\/10.3390\/app14146361","journal-title":"Appl. Sci."},{"key":"6_CR9","unstructured":"\u0417\u0430\u0438\u043a\u0438\u043d \u041e.\u0421., \u041e\u0442\u043f\u0443\u0449\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u0418.\u0412., \u0421\u0435\u043c\u0451\u043d\u043e\u0432 \u0410.\u0410. \u041e\u0446\u0435\u043d\u043a\u0438 \u0441\u0442\u043e\u0439\u043a\u043e\u0441\u0442\u0438 \u0448\u0438\u0444\u0440\u043e\u0432 \u0441\u0435\u043c\u0435\u0439\u0441\u0442\u0432\u0430Trivium \u043a \u043a\u0440\u0438\u043f\u0442\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0443 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Eibach, T., Pilz, E., Volkel, G.: Attacking Bivium using SAT solvers. LNCS 4996, 63\u201376 (2008).","DOI":"10.1007\/978-3-540-79719-7_7"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Soos, M., Nohl, K., Castelluccia, C.: Extending SAT solvers to cryptographic problems. In: LNCS 5584, 244\u2013257 (2009).","DOI":"10.1007\/978-3-642-02777-2_24"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Semenov, A.A., Zaikin, O.S.: Using Monte Carlo method for searching partitionings of hard variants of Boolean satisfiability problem. In: LNCS, vol. 9251, pp. 222\u2013230 (2015).","DOI":"10.1007\/978-3-319-21909-7_21"},{"issue":"1","key":"6_CR13","first-page":"55","volume":"14","author":"AC Lechtaler","year":"2014","unstructured":"Lechtaler, A.C., Cipriano, M., Garcia, E., et al.: Model design for a reduced variant of a Trivium type stream cipher. J. Comput. Sci. Technol. 14(1), 55\u201358 (2014)","journal-title":"J. Comput. Sci. Technol."},{"key":"6_CR14","unstructured":"Lano, J., Mentens, N., Preneel, B., Verbauwhede, I.: Power analysis of synchronous stream ciphers with resynchronization mechanism. In: ECRYPT Workshop, SASC \u2013 The State of the Art of Stream Ciphers, pp. 327\u2013333 (2004)"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Juraev, G., Kuvonchbek, R., Toshpulov, B.: Application fuzzy neural network methods to detect cryptoattacks on financial information systems based on blockchain technology, internet of things, smart spaces, and next generation networks and systems. NEW2AN 2022. In: Lecture Notes in Computer Science, vol. 13772. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-031-30258-9_9.","DOI":"10.1007\/978-3-031-30258-9_9"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-031-30258-9_10","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings","author":"R Kuvonchbek","year":"2023","unstructured":"Kuvonchbek, R.: Method authentication of objects information communication. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15\u201316, 2022, Proceedings, pp. 105\u2013116. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_10"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1201\/9781032684994-120","volume-title":"Artificial Intelligence, Blockchain, Computing and Security Volume 2: Proceedings of the International Conference on Artificial Intelligence, Blockchain, Computing and Security (ICABCS 2023), Gr. Noida, UP, India, 24\u201325 February 2023","author":"G Juraev","year":"2023","unstructured":"Juraev, G., Abdullaev, T.R., Rakhimberdiev, K., Bozorov, A.X.: Mathematical modeling of key generators for bank lending platforms based on blockchain technology. In: Dagur, A., Singh, K., Mehra, P.S., Shukla, D.K. (eds.) Artificial Intelligence, Blockchain, Computing and Security Volume 2: Proceedings of the International Conference on Artificial Intelligence, Blockchain, Computing and Security (ICABCS 2023), Gr. Noida, UP, India, 24\u201325 February 2023, pp. 741\u2013749. CRC Press, London (2023). https:\/\/doi.org\/10.1201\/9781032684994-120"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Rakhimberdiev, K., Bozorov, A., Berdimurodov, M.: Round key generation algorithm used in symmetric block encryption algorithms to ensure the security of economic systems. In: ICFNDS\u201823: Proceedings of the 7th International Conference on Future Networks and Distributed Systems, pp. 548\u2013554, (2023). https:\/\/doi.org\/10.1145\/3644713.3644794","DOI":"10.1145\/3644713.3644794"},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"122","DOI":"10.26577\/JMMCS2024121112","volume":"121","author":"I Saymanov","year":"2024","unstructured":"Saymanov, I.: Logical automatic implementation of steganographic coding algorithms. J. Math. Mech. Comput. Sci. 121(1), 122\u2013131 (2024). https:\/\/doi.org\/10.26577\/JMMCS2024121112","journal-title":"J. Math. Mech. Comput. Sci."},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Bakhtiyorovich Rakhimberdiev, K., Tureniyazova, A., Arziev, A., Sarsenbaeva, H., Bimuratov, D.: Application of cryptographic algorithms in ensuring and improving the security of bank transactions in the digital economy. In: ICFNDS\u201923: Proceedings of the 7th International Conference on Future Networks and Distributed Systems, pp. 503\u2013510 (2023). https:\/\/doi.org\/10.1145\/3644713.3644787","DOI":"10.1145\/3644713.3644787"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.3390\/math12132120","volume":"12","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Saymanov, I.: Synthesis of optimal correction functions in the class of disjunctive normal forms. Mathematics 12, 2120 (2024). https:\/\/doi.org\/10.3390\/math12132120","journal-title":"Mathematics"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.3390\/math12071086","volume":"12","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Saymanov, I., Babadjanov, A., Babadzhanov, A.: Algebraic recognition approach in IoT ecosystem. Mathematics 12, 1086 (2024). https:\/\/doi.org\/10.3390\/math12071086","journal-title":"Mathematics"},{"issue":"1","key":"6_CR23","doi-asserted-by":"publisher","first-page":"37","DOI":"10.26577\/JMMCS202412114","volume":"121","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Berdimurodov, M.: On the minimization of k-valued logic functions in the class of disjunctive normal forms. J. Math. Mech. Comput. Sci. 121(1), 37\u201345 (2024). https:\/\/doi.org\/10.26577\/JMMCS202412114","journal-title":"J. Math. Mech. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95296-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:16:50Z","timestamp":1753766210000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95296-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,30]]},"ISBN":["9783031952951","9783031952968"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95296-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,30]]},"assertion":[{"value":"30 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}