{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:12:45Z","timestamp":1750824765205,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644189"},{"type":"electronic","value":"9783319644196"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64419-6_57","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T02:42:00Z","timestamp":1502851320000},"page":"453-456","source":"Crossref","is-referenced-by-count":0,"title":["A Stream Cipher for Real Time Applications"],"prefix":"10.1007","author":[{"given":"M.","family":"Venkatesulu","sequence":"first","affiliation":[]},{"given":"M.","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Arul Jothi, S., Venkatesulu, M.: Symmetric key cryptosystem based on randomized block cipher. In: 5th International Conference on Future Information Technology, 21\u201323 May 2010, Busan, South Korea, pp. 1\u20135. Future Tech (2010)","DOI":"10.1109\/FUTURETECH.2010.5482692"},{"issue":"9","key":"57_CR2","first-page":"1","volume":"49","author":"SA Jothi","year":"2012","unstructured":"Jothi, S.A., Venkatesulu, M.: A generalized key scheme in a block cipher algorithm and its cryptanalysis. Int. J. Comput. Appl. 49(9), 1\u20136 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"57_CR3","first-page":"26","volume":"2","author":"JS Arul","year":"2012","unstructured":"Arul, J.S., Venkatesulu, M.: Encryption quality and performance analysis of GKSBC algorithm. J. Inf. Eng. Appl. 2(10), 26\u201334 (2012)","journal-title":"J. Inf. Eng. Appl."},{"issue":"7","key":"57_CR4","first-page":"190","volume":"63","author":"JS Arul","year":"2013","unstructured":"Arul, J.S., Venkatesulu, M.: A new approach to randomized key in the symmetric block cipher encryption algorithm. Jokull J. 63(7), 190\u2013199 (2013)","journal-title":"Jokull J."},{"issue":"4","key":"57_CR5","first-page":"557","volume":"112","author":"N Radha","year":"2013","unstructured":"Radha, N., Venkatesulu, M.: Performance of block ciphers in real-time multimedia applications. Eur. J. Sci. Res. 112(4), 557\u2013563 (2013)","journal-title":"Eur. J. Sci. Res."},{"key":"57_CR6","unstructured":"Radha, N., Venkatesulu, M.: A complete binary tree structure block cipher for real-time multimedia. In: IEEE Technically Co-sponsored Science and Information Conference, pp. 346\u2013352 (2013)"},{"issue":"6","key":"57_CR7","doi-asserted-by":"crossref","first-page":"994","DOI":"10.3844\/jcssp.2012.994.1000","volume":"8","author":"N Radha","year":"2012","unstructured":"Radha, N., Venkatesulu, M.: A chaotic block cipher for real-time multimedia. J. Comput. Sci. 8(6), 994\u20131000 (2012)","journal-title":"J. Comput. Sci."},{"issue":"1","key":"57_CR8","first-page":"20","volume":"27","author":"N Radha","year":"2014","unstructured":"Radha, N., Venkatesulu, M.: Permutation induced shuffling based block cipher for real-time applications. Malays. J. Comput. Sci. 27(1), 20\u201334 (2014)","journal-title":"Malays. J. Comput. Sci."},{"issue":"9","key":"57_CR9","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.3844\/jcssp.2012.1541.1546","volume":"8","author":"SP Vidhya","year":"2012","unstructured":"Vidhya, S.P., Venkatesulu, M.: A block cipher for multimedia content protection with random substitution using binary tree traversal. J. Comput. Sci. 8(9), 1541\u20131546 (2012)","journal-title":"J. Comput. Sci."},{"key":"57_CR10","unstructured":"Vidhya, S.P., Venkatesulu, M.: A block cipher for multimedia encryption using chaotic maps for key generation. In: Proceedings of International Conference, Advances in Information Technology and Mobile Computing (AIM-2013), pp. 277\u2013282. Elsevier Science and Technology (2013)"},{"issue":"9","key":"57_CR11","first-page":"404","volume":"63","author":"SP Vidhya","year":"2013","unstructured":"Vidhya, S.P., Venkatesulu, M.: A secure image content transmission using discrete chaotic chaotic maps. Jokull J. 63(9), 404\u2013418 (2013)","journal-title":"Jokull J."},{"key":"57_CR12","doi-asserted-by":"crossref","unstructured":"Vidhya, S.P., Venkatesulu, M.: A block cipher based on boolean matrices using bit level operations. In: Proceedings of IEEE\/ACIS International Conference on Computer and Information Science, pp. 59\u201363 (2014)","DOI":"10.1109\/ICIS.2014.6912108"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science and Discrete Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64419-6_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:57:56Z","timestamp":1750805876000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64419-6_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644189","9783319644196"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64419-6_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}