{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:16:56Z","timestamp":1743099416371,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_62","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"611-618","source":"Crossref","is-referenced-by-count":0,"title":["Randomness Analysis of Key-Derived S-Boxes"],"prefix":"10.1007","author":[{"given":"Rafael","family":"\u00c1lvarez","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Zamora","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","unstructured":"Adams, C.M., Tavares, S.E.: Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis. In: Proc. 3rd Symposium on State and Progress of Research in Cryptography, pp. 181\u2013190 (1993)"},{"key":"62_CR2","unstructured":"\u00c1lvarez, R., McGuire, G., Zamora, A.: The Tangle Hash Function. Submission to the NIST SHA-3 Competition (2008)"},{"key":"62_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-21323-6_23","volume-title":"Computational Intelligence in Security for Information Systems","author":"R. \u00c1lvarez","year":"2011","unstructured":"\u00c1lvarez, R., Vicent, J.F., Zamora, A.: Improving the Message Expansion of the Tangle Hash Function. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 183\u2013189. Springer, Heidelberg (2011)"},{"key":"62_CR4","unstructured":"\u00c1lvarez, R., McGuire, G.: S-Boxes, APN Functions and Related Codes. In: Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, vol. 23, pp. 49\u201362. IOS Press (2009)"},{"key":"62_CR5","unstructured":"Fuller, J., Millan, W.: On linear redundancy in the AES S-Box. Cryptology ePrint Archive, Report 2002\/111"},{"key":"62_CR6","unstructured":"Fuller, J., Millan, W., Dawson, E.: Multi-objective Optimisation of Bijective S-boxes. In: Congress on Evolutionary Computation, vol.\u00a02, pp. 1525\u20131532 (2004)"},{"key":"62_CR7","unstructured":"The Go Programming Language, \n                    http:\/\/www.golang.org"},{"issue":"11","key":"62_CR8","first-page":"2389","volume":"13","author":"I. Hussain","year":"2011","unstructured":"Hussain, I., Shah, T., Gondal, M.A., Khan, W.A.: Construction of Cryptographically Strong 8x8 S-boxes. World Applied Sciences Journal\u00a013(11), 2389\u20132395 (2011)","journal-title":"World Applied Sciences Journal"},{"key":"62_CR9","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1016\/j.amc.2004.12.043","volume":"170","author":"L. Jing-Mei","year":"2005","unstructured":"Jing-Mei, L., Bao-Dian, W., Xiang-Guo, C., Xin-Mei, W.: Cryptanalysis of Rijndael S-box and improvement. Applied Mathematics and Computation\u00a0170, 958\u2013975 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"62_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ins.2012.02.030","volume":"201","author":"S. Kavut","year":"2012","unstructured":"Kavut, S.: Results on rotation-symmetric S-boxes. Information Sciences\u00a0201, 93\u2013113 (2012)","journal-title":"Information Sciences"},{"issue":"3","key":"62_CR11","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-008-9206-6","volume":"48","author":"A. Klein","year":"2008","unstructured":"Klein, A.: Attacks on the RC4 stream cipher. Designs, Codes and Cryptography\u00a048(3), 269\u2013286 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"62_CR12","unstructured":"Mister, S., Adams, C.: Practical S-Box Design. In: Selected Areas in Cryptography (1996)"},{"issue":"3","key":"62_CR13","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1023\/A:1019991004496","volume":"27","author":"S. Murphy","year":"2002","unstructured":"Murphy, S., Robshaw, M.J.B.: Key-Dependent S-Boxes and Differential Cryptanalysis. Designs, Codes and Cryptography\u00a027(3), 229\u2013255 (2002)","journal-title":"Designs, Codes and Cryptography"},{"key":"62_CR14","unstructured":"Provos, N., Mazeries, D.: Bcrypt Algorithm. USENIX (1999)"},{"key":"62_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Fast Software Encryption","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol.\u00a0809, pp. 191\u2013204. Springer, Heidelberg (1994)"},{"key":"62_CR16","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish encryption algorithm: a 128-bit block cipher. John Wiley & Sons (1999)"},{"issue":"5","key":"62_CR17","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/0020-0190(95)00156-6","volume":"56","author":"A.M. Youssef","year":"1995","unstructured":"Youssef, A.M., Tavares, S.E.: Resistance of Balanced S-boxes to Linear and Differential Cryptanalysis. Information Processing Letters\u00a056(5), 249\u2013252 (1995)","journal-title":"Information Processing Letters"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T15:05:52Z","timestamp":1720710352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_62","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}