{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:57:54Z","timestamp":1725868674753},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319484280"},{"type":"electronic","value":"9783319484297"}],"license":[{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-48429-7_13","type":"book-chapter","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T09:32:59Z","timestamp":1476869579000},"page":"133-145","source":"Crossref","is-referenced-by-count":0,"title":["S-boxes Cryptographic Properties from a Statistical Angle"],"prefix":"10.1007","author":[{"given":"Anna","family":"Grocholewska-Czury\u0142o","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,20]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"crossref","first-page":"401","DOI":"10.2478\/v10006-010-0030-6","volume":"20","author":"K Bucholc","year":"2010","unstructured":"Bucholc, K., Chmiel, K., Grocholewska-Czury\u0142o, A., Idzikowska, E., Janicka-Lipska, I., Stok\u0142osa, J.: Scalable PP-1 block cipher. Int. J. Appl. Math. Comput. Sci. 20(2), 401\u2013411 (2010)","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"issue":"3\u20134","key":"13_CR2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.3233\/FI-2012-627","volume":"114","author":"K Chmiel","year":"2012","unstructured":"Chmiel, K., Grocholewska-Czury\u0142o, A., Stok\u0142osa, J.: Evaluation of PP-1 cipher resistance against differential and linear cryptanalysis in comparison to a DES-like cipher. Fundamenta Informaticae 114(3\u20134), 239\u2013269 (2012)","journal-title":"Fundamenta Informaticae"},{"key":"13_CR3","unstructured":"Bucholc K., Chmiel K., Grocholewska-Czury\u0142o A., Stok\u0142osa J.: PP-2\u00a0block cipher. In: Hof, H.-J., Westphall, C. (eds.) SECURWARE 2013: The Seventh International Conference on Emerging Security Information, Systems and Technologies, Curran Associates, Inc., RedHook, NY, pp.162\u2013168 (2013). http:\/\/www.thinkmind.org\/download.php?articleid=securware_2013_7_30_30142"},{"issue":"3","key":"13_CR4","first-page":"11","volume":"12","author":"T Bilski","year":"2012","unstructured":"Bilski, T., Bucholc, K., Grocholewska-Czury\u0142o, A., Stok\u0142osa, J.: Paramiterized hash functions. Ann. UMCS Informatica AI 12(3), 11\u201324 (2012). Cryptography and Data Protection","journal-title":"Ann. UMCS Informatica AI"},{"issue":"5B","key":"13_CR5","first-page":"304","volume":"16","author":"A Grocholewska-Czury\u0142o","year":"2007","unstructured":"Grocholewska-Czury\u0142o, A.: Generating strong S-boxes based on inverse mapping without any linear redundancy. Polish J. Environ. Stud. 16(5B), 304\u2013330 (2007)","journal-title":"Polish J. Environ. Stud."},{"issue":"2","key":"13_CR6","first-page":"37","volume":"11","author":"A Grocholewska-Czury\u0142o","year":"2011","unstructured":"Grocholewska-Czury\u0142o, A.: Cryptographic properties of modified AES-like S-boxes. Ann. UMCS Informatica AI 11(2), 37\u201348 (2011). Cryptography and data protection","journal-title":"Ann. UMCS Informatica AI"},{"key":"13_CR7","unstructured":"Doganaksoy A., Ege B., Kocak O. and Sulak F.: Cryptographic Randomness Testing of Block Ciphers and Hash Functions. http:\/\/eprint.iacr.org\/2010\/564"},{"key":"13_CR8","unstructured":"Caelli W., Dawson E., Nielsen N., and Gustafson H.: CRYPT\u2013X statistical package manual, measuring the strength of stream and block ciphers. https:\/\/eprint.iacr.org\/2010\/611"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Soto, J., Bassham, L.: Randomness testing of the advanced encryption standard finalist candidates. In: NIST IR 6483, National Institute of Standards and Technology (1999)","DOI":"10.6028\/NIST.IR.6483"},{"key":"13_CR10","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/0024-3795(85)90192-2","volume":"67","author":"G Marsaglia","year":"2016","unstructured":"Marsaglia, G., Tsay, L.: Matrices and the structure of random number sequences. Linear Algebra Appl. 67, 147\u2013156 (2016)","journal-title":"Linear Algebra Appl."},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/978-3-540-85912-3_3","volume-title":"Sequences and Their Applications - SETA 2008","author":"M S\u00f6nmez Turan","year":"2008","unstructured":"S\u00f6nmez Turan, M., \u00c7al\u0131k, \u00c7., Saran, N.B., Do\u011fanaksoy, A.: New distinguishers based on random mappings against stream ciphers. In: Golomb, S.W., Parker, M.G., Pott, A., Winterhof, A. (eds.) SETA 2008. LNCS, vol. 5203, pp. 30\u201341. Springer, Heidelberg (2008)"}],"container-title":["Advances in Intelligent Systems and Computing","Hard and Soft Computing for Artificial Intelligence, Multimedia and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48429-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T19:34:39Z","timestamp":1601148879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48429-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,20]]},"ISBN":["9783319484280","9783319484297"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48429-7_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,20]]}}}