{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T03:47:58Z","timestamp":1725940078991},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319725499"},{"type":"electronic","value":"9783319725505"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72550-5_9","type":"book-chapter","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T02:03:07Z","timestamp":1515636187000},"page":"82-94","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers"],"prefix":"10.1007","author":[{"given":"Hamijah","family":"Mohd. Rahman","sequence":"first","affiliation":[]},{"given":"Nureize","family":"Arbaiy","sequence":"additional","affiliation":[]},{"given":"Chuah Chai","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Annual Cryptology Conference, pp. 631\u2013648. Springer, Berlin, Heidelberg (2010)","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"9_CR2","unstructured":"Bakhtiari, M., Maarof, M.A.: An efficient stream cipher algorithm for data encryption. Int. J. Comput. Sci. Issues 8(3) (2011)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Yun, J., Park, K.W., Shin, Y., Kim, H.D.: An efficient stream cipher for resistive RAM. IEICE Electron. Express 14(7), 20170179\u201320170179 (2017)","DOI":"10.1587\/elex.14.20170179"},{"issue":"8","key":"9_CR4","doi-asserted-by":"crossref","first-page":"1601","DOI":"10.1140\/epjst\/e2014-02185-y","volume":"223","author":"G Vidal","year":"2014","unstructured":"Vidal, G., Baptista, M.S., Mancini, H.: A fast and light stream cipher for smartphones. Eur. Phys. J. Spec. Top. 223(8), 1601\u20131610 (2014)","journal-title":"Eur. Phys. J. Spec. Top."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Chuah, C.W., Dawson, E., Simpson, L.: Key derivation function: the SCKDF scheme. In: IFIP International Information Security Conference, pp. 125\u2013138. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-39218-4_10"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS \u201993, pp. 62\u201373. ACM Press (1993)","DOI":"10.1145\/168588.168596"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Chuah, C.W., Dawson, E., Nieto, J.M.G., Simpson, L.: A framework for security analysis of key derivation functions. In: International Conference on Information Security Practice and Experience, pp. 199\u2013216. Springer, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-29101-2_14"},{"issue":"1","key":"9_CR8","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: Another attack on A5\/1. IEEE Trans. Inf. Theory 49(1), 284\u2013289 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Lee, Y., Jeong, K., Sung, J., Hong, S.: Related-key chosen IV attacks on Grain-v1 and Grain-128. In: Australasian Conference on Information Security and Privacy, pp. 321\u2013335. Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-70500-0_24"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Quedenfeld, F.M., Wolf, C.: Advanced algebraic attack on Trivium. In: International Conference on Mathematical Aspects of Computer and Information Sciences, pp. 268\u2013282. Springer International Publishing (2015)","DOI":"10.1007\/978-3-319-32859-1_23"},{"key":"9_CR11","unstructured":"A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester. IACR Cryptol. ePrint Archive 780 (2013)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Al Maliky, S.B.S., Jawad, S.F.: Fuzzy logic-based security evaluation of stream cipher. In: Multidisciplinary Perspectives in Cryptology and Information Security, pp. 157\u2013178. IGI Global (2014)","DOI":"10.4018\/978-1-4666-5808-0.ch006"},{"issue":"2","key":"9_CR13","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.ijpe.2011.04.018","volume":"132","author":"A Azadegan","year":"2011","unstructured":"Azadegan, A., Porobic, L., Ghazinoory, S., Samouei, P., Kheirkhah, A.S.: Fuzzy logic in manufacturing: a review of literature and a specialized application. Int. J. Prod. Econ. 132(2), 258\u2013270 (2011)","journal-title":"Int. J. Prod. Econ."},{"issue":"1","key":"9_CR14","first-page":"13","volume":"1","author":"K Goztepe","year":"2012","unstructured":"Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13\u201319 (2012)","journal-title":"Int. J. Inf. Secur. Sci."},{"issue":"8","key":"9_CR15","first-page":"13","volume":"4","author":"H Sallam","year":"2015","unstructured":"Sallam, H.: Cyber security risk assessment using multi fuzzy inference system. IJEIT 4(8), 13\u201319 (2015)","journal-title":"IJEIT"},{"key":"9_CR16","unstructured":"Bhusari, K.P., Kale, S.G.: Intrusion detection in wireless network using fuzzy rules. Virus 10 (11)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Mohammed, S.A., Sadkhan, S.B.: Block cipher security evaluation based on fuzzy logic. In: 2013 International Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE), pp. 169\u2013173. IEEE (2013)","DOI":"10.1109\/ICECCPCE.2013.6998756"},{"key":"9_CR18","unstructured":"Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic: Theory and Applications (1996)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Sumathi, S., Paneerselvam, S.: Computational Intelligence Paradigms: Theory and Application Using MATLAB. CRC Press (2010)","DOI":"10.1201\/9781439809037"},{"issue":"1","key":"9_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"EH Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man Mach. Stud. 7(1), 1\u201313 (1975)","journal-title":"Int. J. Man Mach. Stud."},{"key":"9_CR21","volume-title":"A Mamdani Type Fuzzy Logic Controller","author":"I Iancu","year":"2012","unstructured":"Iancu, I.: A Mamdani Type Fuzzy Logic Controller. INTECH Open Access Publisher, Rijeka (2012)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Mendel, J.M.: Fuzzy logic system for engineering: a tutorial. IEEE Trans. Fuzzy Syst. (1995)","DOI":"10.1109\/5.364485"},{"key":"9_CR23","volume-title":"An Overview of eSTREAM Ciphers","author":"P Mukherjee","year":"2013","unstructured":"Mukherjee, P.: An Overview of eSTREAM Ciphers. Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72550-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T03:12:12Z","timestamp":1570590732000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72550-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319725499","9783319725505"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72550-5_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}