{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:27:01Z","timestamp":1742952421572,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_24","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"299-312","source":"Crossref","is-referenced-by-count":0,"title":["Security Assessment of Cryptographic Algorithms"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Niemiec","sequence":"first","affiliation":[]},{"given":"Maciej","family":"Francikiewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"issue":"18","key":"24_CR1","doi-asserted-by":"crossref","first-page":"3481","DOI":"10.1002\/sec.1272","volume":"8","author":"T Kurek","year":"2015","unstructured":"Kurek, T., Lason, A., Niemiec, M.: First step towards preserving the privacy of cloud-based IDS security policies. Secur. Commun. Netw. 8(18), 3481\u20133491 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Zhao, K., Ge, L.: A survey on the Internet of Things security. In: IX International Conference on Computational Intelligence and Security, Leshan (2013)","DOI":"10.1109\/CIS.2013.145"},{"key":"24_CR3","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/978-3-642-30721-8_30","volume":"287","author":"N Stoianov","year":"2012","unstructured":"Stoianov, N., Uruena, M., Niemiec, M., Machnik, P., Maestro, G.: Security infrastructures: towards the INDECT system security. Multimed. Commun. Serv. Secur. 287, 304\u2013315 (2012)","journal-title":"Multimed. Commun. Serv. Secur."},{"key":"24_CR4","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"24_CR5","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W Stallings","year":"2005","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices. Prentice Hall, Upper Saddle River (2005)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Niemiec M., Machowski.: A new symmetric block cipher based on key-dependent S-boxes. In: IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg (2012)","DOI":"10.1109\/ICUMT.2012.6459712"},{"key":"24_CR7","unstructured":"Sadowski, A.: Wybrane zagadnienia kryptologii i ochrony informacji. Helion (1999)"},{"key":"24_CR8","unstructured":"NIST SP-800-22: A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology (NIST) (2000)"},{"key":"24_CR9","unstructured":"McCaffrey, J.: Test Run - Implementing the National Institute of Standards and Technology Tests of Randomness Using C (2013). https:\/\/msdn.microsoft.com\/enus\/magazine\/dn520240.aspx"},{"key":"24_CR10","first-page":"147","volume":"6","author":"H Gustafson","year":"1992","unstructured":"Gustafson, H., Dawson, E., Pettitt, A.N.: Strict key avalanche criterion. Aust. J. Comb. 6, 147\u2013153 (1992)","journal-title":"Aust. J. Comb."},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11681878_10","volume-title":"Theory of Cryptography","author":"Y Dodis","year":"2006","unstructured":"Dodis, Y., Puniya, P.: On the relation between the ideal cipher and the random oracle models. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 184\u2013206. Springer, Heidelberg (2006). doi: 10.1007\/11681878_10"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:14:00Z","timestamp":1569968040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}