{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:55:26Z","timestamp":1775055326069,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319962917","type":"print"},{"value":"9783319962924","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96292-4_7","type":"book-chapter","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T14:29:34Z","timestamp":1534170574000},"page":"78-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher"],"prefix":"10.1007","author":[{"given":"Mohammed","family":"Es-Sabry","sequence":"first","affiliation":[]},{"given":"Nabil","family":"El Akkad","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Merras","sequence":"additional","affiliation":[]},{"given":"Abderrahim","family":"Saaidi","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Satori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-45539-6_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 259\u2013274. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_18"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption: analysis of the DES modes of operation. In: Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE (1997)","DOI":"10.1109\/SFCS.1997.646128"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92\u2013111. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053428"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/3-540-48405-1_33","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 1999","author":"M Bellare","year":"1999","unstructured":"Bellare, M., Sahai, A.: Non-malleable encryption: equivalence between two notions, and an indistinguishability-based characterization. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 519\u2013536. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_33"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201898","author":"R Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13\u201325. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055717"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: Proceedings of the 23rd Annual Symposium on Theory of Computing. ACM (1991)","DOI":"10.1145\/103418.103474"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1137\/0217019","volume":"17","author":"J H\u00e5stad","year":"1988","unstructured":"H\u00e5stad, J.: Solving simultaneous modular equations of low degree. SIAM J. Comput. 17(2), 336\u2013341 (1988)","journal-title":"SIAM J. Comput."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"7_CR10","unstructured":"Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudorandom functions. In: Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE (1997)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/3-540-46766-1_35","volume-title":"Advances in Cryptology \u2014 CRYPTO 1991","author":"C Rackoff","year":"1992","unstructured":"Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433\u2013444. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_35"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Stadler","year":"1996","unstructured":"Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 190\u2013199. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_17"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BFb0054019","volume-title":"Public Key Cryptography","author":"Y Tsiounis","year":"1998","unstructured":"Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117\u2013134. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054019"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/07468342.1987.11973000","volume":"18","author":"D Luciano","year":"1987","unstructured":"Luciano, D., Prichett, G.: Cryptology: from caesar ciphers to public-key cryptosystems. Coll. Math. J. 18(1), 2\u201317 (1987)","journal-title":"Coll. Math. J."},{"key":"7_CR15","unstructured":"Savarese, C., Hart, B.: The Caesar Cipher, 15 July 2002"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88403-3","volume-title":"Post-quantum Cryptography","year":"2008","unstructured":"Buchmann, J., Ding, J. (eds.): PQCrypto 2008. LNCS, vol. 5299. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88403-3"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/s00145-007-9001-y","volume":"21","author":"E Barkan","year":"2008","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. J. Cryptol. 21(3), 392\u2013429 (2008)","journal-title":"J. Cryptol."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"7_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"CA Byod","year":"2003","unstructured":"Byod, C.A., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-662-09527-0"},{"issue":"6","key":"7_CR20","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight cryptography implementations. IEEE Des. Test Comput. 24(6), 522\u2013533 (2007). Special Issue on Secure ICs for Secure Embedded Computing","journal-title":"IEEE Des. Test Comput."},{"issue":"11","key":"7_CR21","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TC.2008.80","volume":"57","author":"T Guneysu","year":"2008","unstructured":"Guneysu, T., Kasper, T., Novotny, M., Paar, C., Rupp, A.: Cryptanalysis with COPACOBANA. IEEE Trans. Comput. 57(11), 1498\u20131513 (2008)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"7_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MC.2007.52","volume":"40","author":"J-P Kaps","year":"2007","unstructured":"Kaps, J.-P., Gaubatz, G., Sunar, B.: Cryptography on a speck of dust. Computer 40(2), 38\u201344 (2007)","journal-title":"Computer"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11894063_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S Kumar","year":"2006","unstructured":"Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking ciphers with COPACOBANA \u2013 a cost-optimized parallel code breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 101\u2013118. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11894063_9"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11604938_19","volume-title":"Information Security Applications","author":"CH Lim","year":"2006","unstructured":"Lim, C.H., Korkishko, T.: mCrypton \u2013 a lightweight block cipher for security of low-cost RFID tags and sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243\u2013258. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11604938_19"},{"key":"7_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7","volume-title":"Encyclopedia of Cryptography and Security","author":"B Preneel","year":"2005","unstructured":"Preneel, B.: MDC-2 and MDC-4. In: van Tilborg, H.C.A. (ed.) Encyclopedia of Cryptography and Security. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-23483-7"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3","volume-title":"New Stream Cipher Designs","year":"2008","unstructured":"Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs. LNCS, vol. 4986. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68351-3"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-85893-5_7","volume-title":"Smart Card Research and Advanced Applications","author":"C Rolfes","year":"2008","unstructured":"Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-lightweight implementations for smart devices \u2013 security for 1000 gate equivalents. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 89\u2013103. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85893-5_7"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-44499-8_11","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES 2000","author":"S Trimberger","year":"2000","unstructured":"Trimberger, S., Pang, R., Singh, A.: A 12\u00a0Gbps DES encryptor\/decryptor core in an FPGA. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 156\u2013163. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44499-8_11"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Whiting, D., Housley, R., Ferguson, N.: RFC 3610: counter with CBC-MAC (CCM). Technical report, Corporation for National Research Initiatives, Internet Engineering Task Force, Network Working Group, September 2003","DOI":"10.17487\/rfc3610"},{"issue":"2","key":"7_CR30","first-page":"6","volume":"3","author":"MJ Wiener","year":"1997","unstructured":"Wiener, M.J.: Efficient DES key search: an update. CRYPTOBYTES 3(2), 6\u20138 (1997)","journal-title":"CRYPTOBYTES"},{"issue":"7","key":"7_CR31","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TC.2005.109","volume":"54","author":"T Wollinger","year":"2005","unstructured":"Wollinger, T., Pelzl, J., Paar, C.: Cantor versus Harley: Optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems. IEEE Trans. Comput. 54(7), 861\u2013872 (2005)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C-P Schnorr","year":"1991","unstructured":"Schnorr, C.-P.: Efficient signature generation by smartcards. J. Cryptol. 4, 161\u2013174 (1991)","journal-title":"J. Cryptol."},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-48059-5_2","volume-title":"Cryptographic Hardware and Embedded Systems","author":"A Shamir","year":"1999","unstructured":"Shamir, A.: Factoring Large Numbers with the TWINKLE Device. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 2\u201312. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_2"}],"container-title":["Communications in Computer and Information Science","Big Data, Cloud and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96292-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T06:45:06Z","timestamp":1571726706000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-96292-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319962917","9783319962924"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96292-4_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}