{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:59Z","timestamp":1742913599736,"version":"3.40.3"},"publisher-location":"Cham","reference-count":5,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083674"},{"type":"electronic","value":"9783319083681"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08368-1_10","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T21:09:44Z","timestamp":1407964184000},"page":"90-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Analysis of Some Output of RC4 Cryptosystem"],"prefix":"10.1007","author":[{"given":"Kondwani","family":"Thangalimodzi","sequence":"first","affiliation":[]},{"given":"Gift","family":"Khangamwa","sequence":"additional","affiliation":[]},{"given":"Patrick Albert","family":"Chikumba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,14]]},"reference":[{"key":"10_CR1","volume-title":"Cryptography A Primer","author":"AG Konheim","year":"1981","unstructured":"Konheim, A.G.: Cryptography A Primer. Wiley, New York (1981)"},{"key":"10_CR2","unstructured":"Schneier, B.: Schneier on Security. https:\/\/www.schneier.com\/cgi-bin\/mt\/mt-search.cgi?search=RC4"},{"key":"10_CR3","unstructured":"RSA Laboratories. Crypto FAQ. 2007 RSA Security. http:\/\/www.emc.com\/emc-plus\/rsa-labs\/standards-initiatives\/rc4.htm"},{"key":"10_CR4","volume-title":"Cryptography and Network Security Principles and Practices","author":"W Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practices, 3rd edn. Prentice Hall\/Pearson Education Inc., Englewood Cliffs (2003)","edition":"3"},{"key":"10_CR5","unstructured":"Thangalimodzi, K.: Linear Cryptanalysis of RC4. Master of Science, Thesis. Mzuzu University (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08368-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T10:00:14Z","timestamp":1676887214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-08368-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083674","9783319083681"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08368-1_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"14 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}