{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:18:10Z","timestamp":1742937490531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319196435"},{"type":"electronic","value":"9783319196442"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19644-2_15","type":"book-chapter","created":{"date-parts":[[2015,5,28]],"date-time":"2015-05-28T18:15:39Z","timestamp":1432836939000},"page":"173-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis of Simplified-AES Using Intelligent Agent"],"prefix":"10.1007","author":[{"given":"Rania","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Ashraf","family":"Bhery","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1080\/0161-110391891838","volume":"27","author":"MA Musa","year":"2003","unstructured":"Musa, M.A., Schaefer, E.R., Wedig, S.: A simplified AES algorithm and its linear and differential cryptanalyses. Cryptologia 27(2), 148\u2013177 (2003)","journal-title":"Cryptologia"},{"key":"15_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"15_CR3","unstructured":"Wooldridge, M.: An Introduction to MultiAgent Systems. 1 edn. John Wiley & Sons, Chichester (2002)"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1017\/S0269888900008122","volume":"10","author":"M Wooldridge","year":"1995","unstructured":"Wooldridge, M., jennings, N.R.: Intelligent agents: theory and practice. Knowl. Eng. Rev. 10(2), 115\u2013152 (1995)","journal-title":"Knowl. Eng. Rev."},{"key":"15_CR5","unstructured":"Russel, S., Norving, P.: Artificial Intelligence-A Modern Approach, 2nd ED. Prentice Hall, Upper saddle river (2003)"},{"issue":"7","key":"15_CR6","first-page":"257","volume":"7","author":"SD Mansoori","year":"2007","unstructured":"Mansoori, S.D., Bizaki, H.K.: On the vulnerability of simplified aes algorithm against linear cryptanalysis. Int. J. Comp. Sci. Netw. Secur. 7(7), 257\u2013263 (2007)","journal-title":"Int. J. Comp. Sci. Netw. Secur."},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1080\/01611190903185328","volume":"33","author":"S Simmons","year":"2009","unstructured":"Simmons, S.: Algebraic cryptanalysis of simplified AES. Cryptologia 33(4), 305\u2013314 (2009)","journal-title":"Cryptologia"},{"issue":"2","key":"15_CR8","doi-asserted-by":"publisher","first-page":"117","DOI":"10.14429\/dsj.62.778","volume":"62","author":"ML Valarmathi","year":"2012","unstructured":"Valarmathi, M.L., Vimalathithan, R.: Cryptanalysis of simplified-aes using particle swarm optimisation. Defence Sci. J. 62(2), 117\u2013121 (2012)","journal-title":"Defence Sci. J."},{"key":"15_CR9","unstructured":"Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill Company, Boston (2007)"},{"issue":"7","key":"15_CR10","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/12.508323","volume":"45","author":"C Paar","year":"1996","unstructured":"Paar, C.: A new architecture for a parallel finite field multiplier with low complexity based on composite fields. IEEE Trans. Comput. 45(7), 856\u2013861 (1996)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Tseitin, G.S.: On the complexity of derivation in the propositional calculus. In Slisenko, A.O., (ed.) Studies in Constructive Mathematics and Mathematical Logic, Part II, pp. 115\u2013125. Springer, New York (1970)","DOI":"10.1007\/978-1-4899-5327-8_25"},{"key":"15_CR12","first-page":"70","volume":"47","author":"P Christof","year":"1998","unstructured":"Christof, P., Fleischmann, P., Roelse, P.: Efficient multiplier architectures for galois fields. IEEE Trans. Comput. 47, 70\u2013162 (1998)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Cook, S.A.: The complexity of theorem proving procedures. In: Proceedings of the Third Annual ACM Symposium on the Theory of Computing, pp. 151\u2013158. ACM (1971)","DOI":"10.1145\/800157.805047"},{"key":"15_CR14","volume-title":"Handbook of Satisfiability","author":"A Biere","year":"2009","unstructured":"Biere, A., Heule, M., Van Maaren, H., Walsh, T.: Handbook of Satisfiability. IOS Press, Amsterdam (2009)"},{"key":"15_CR15","volume-title":"Jess in Action: Java Rule-Based Systems","author":"EF Hill","year":"2003","unstructured":"Hill, E.F.: Jess in Action: Java Rule-Based Systems. Manning Publications Co., Greenwich (2003)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Argelich, J., Li, C.-M., Many\u00e0 F., Planes, J.: The first and second Max-SAT evaluations. Journal on Satisfiability, Boolean Modeling and Computation 4, 251\u2013278 (2008)","DOI":"10.3233\/SAT190047"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19644-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T12:33:56Z","timestamp":1675859636000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19644-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319196435","9783319196442"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19644-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}