{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:11:33Z","timestamp":1725909093286},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319569901"},{"type":"electronic","value":"9783319569918"}],"license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-56991-8_48","type":"book-chapter","created":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T03:57:16Z","timestamp":1503374236000},"page":"658-671","source":"Crossref","is-referenced-by-count":0,"title":["Elastic Serial Substitution Box for Block Ciphers with Integrated Hash Function Generation"],"prefix":"10.1007","author":[{"given":"K. B.","family":"Jithendra","sequence":"first","affiliation":[]},{"given":"T. K.","family":"Shahana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"48_CR2","volume-title":"Cryptography and Network Security, Principles and Practices","author":"W Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security, Principles and Practices. Prentice Hall, Upper Saddle River (2006)"},{"issue":"1","key":"48_CR3","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/BF00203967","volume":"3","author":"C Adams","year":"1990","unstructured":"Adams, C., Tavares, S.: The structured design of good S Boxes. J. Cryptol. 3(1), 27\u201341 (1990)","journal-title":"J. Cryptol."},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Cobas, J., Brugos, J.: Complexity \u2013theoretical approaches to the design and analysis of cryptographical Boolean functions. In: Computer Aided Systems Theory, EUROCAST 2005. LNCS. Springer, Germany (2005)","DOI":"10.1007\/11556985_44"},{"key":"48_CR5","unstructured":"Webster, A., Tavares, S.: On the design of S Boxes. In: Advances in Cryptology, CRYPT0 1985. LNCS, vol. 218. Springer (1985)"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Dawson, M., Tavares, S.: An expanded set of S Box design criteria based on information theory and its relation to differential-like attacks. In: Advances in Cryptology, EUROCRYPT 1991. LNCS vol. 547. Springer (1991)","DOI":"10.1007\/3-540-46416-6_30"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Sivabalan, M., Tavares, S., Peppard, L.: On the design of SP networks from an information theoretic point of view. In: Advances in Cryptology, CRYPTO 1992. LNCS, vol. 740. Springer (1993)","DOI":"10.1007\/3-540-48071-4_18"},{"key":"48_CR8","volume-title":"Cryptography and Network Security, Principles and Practice","author":"W Stallings","year":"2011","unstructured":"Stallings, W.: Cryptography and Network Security, Principles and Practice, 5th edn. Prentice Hall, Noida (2011)","edition":"5"},{"key":"48_CR9","unstructured":"Preneel, B.: The state of cryptographic hash functions. In: Proceedings of EUROCRYPT 1996. Springer (1996)"},{"key":"48_CR10","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.cose.2008.11.006","volume":"28","author":"PP Deepthi","year":"2009","unstructured":"Deepthi, P.P., Sathidevi, P.S.: Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. Elsevier Comput. Secur. 28, 229\u2013241 (2009)","journal-title":"Elsevier Comput. Secur."},{"key":"48_CR11","volume-title":"Cryptography and Security","author":"CK Shyamala","year":"2011","unstructured":"Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security. Wiley India Pvt ltd, New Delhi (2011)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56991-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,22]],"date-time":"2017-08-22T04:18:52Z","timestamp":1503375532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56991-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"ISBN":["9783319569901","9783319569918"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56991-8_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}