{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T12:02:22Z","timestamp":1748606542265},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_22","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"263-274","source":"Crossref","is-referenced-by-count":37,"title":["Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes"],"prefix":"10.1007","author":[{"given":"W.","family":"Millan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Burnett","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G.","family":"Carter","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Clark","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Dawson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-48071-4_19","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Carlet","year":"1993","unstructured":"Carlet, C.: Partially-Bent Functions. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 280\u2013291. Springer, Heidelberg (1993)"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1080\/0161-119691884807","volume":"20","author":"A. Clark","year":"1996","unstructured":"Clark, A., Dawson, E., Bergen, H.: Combinatorial Optimisation and the Knapsack Cipher. Cryptologia\u00a020(1), 85\u201393 (1996)","journal-title":"Cryptologia"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BFb0053732","volume-title":"Information Security and Privacy","author":"W. Millan","year":"1998","unstructured":"Millan, W.: How to Improve the Nonlinearity of Bijective S-boxes. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 181\u2013192. Springer, Heidelberg (1998)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/BFb0054148","volume-title":"Heuristic Design of Crypto- graphically Strong Balanced Boolean Functions","author":"W. Millan","year":"1998","unstructured":"Millan, W., Clark, A., Dawson, E.: Heuristic design of cryptographically strong balanced boolean functions. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol.\u00a01403, pp. 489\u2013499. Springer, Heidelberg (1998)"},{"unstructured":"Millan, W., Clark, A., Dawson, E.: Smart Hill Climbing Finds Better Boolean Functions. In: Workshop on Selected Areas of Cryptology, SAC 1997, Proceedings, pp. 50\u201363 (1997)","key":"22_CR7"},{"unstructured":"NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Data Encryption Standard U.S. Department of Commerce FIPS Publication 46 (January 1977)","key":"22_CR8"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-47555-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"K. Nyberg","year":"1993","unstructured":"Nyberg, K.: On the Construction of Highly Nonlinear Permutations. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 92\u201398. Springer, Heidelberg (1993)"},{"unstructured":"Zhang, X.-M., Zheng, Y.: Difference Distribution Table of a Regular Substitution Box. In: Workshop on Selected Areas in Cryptology, SAC 1996, Proceedings, pp. 57\u201360 (1996)","key":"22_CR10"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T16:59:22Z","timestamp":1553273962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}