{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:54:19Z","timestamp":1725483259691},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540710776"},{"type":"electronic","value":"9783540710783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-71078-3_3","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T01:41:33Z","timestamp":1178242893000},"page":"79-88","source":"Crossref","is-referenced-by-count":1,"title":["Evolutionary Regular Substitution Boxes"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza de Macedo","family":"Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1_3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J. and Rijmen, V., The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag, 2002."},{"key":"3_CR2_3","unstructured":"National Institute of Standard and Technology, Data Encryption Standard, Federal Information Processing Standards 46, November 1977."},{"key":"3_CR3_3","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"JF Nash","year":"1950","unstructured":"Nash, J.F., Equilibrium points in n-person games, Proceedings of the National Academy of Sciences, vol. 36, pp.48-49, 1950.","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"3_CR4_3","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"JF Nash","year":"1951","unstructured":"Nash, J.F., Non-cooperative game, Annals of Mathematics, vol. 54, no. 2, pp. 286-295, 1951.","journal-title":"Annals of Mathematics"},{"key":"3_CR5_3","unstructured":"Kang, J.S., Yi, O., Hong, D. and Cho, H., Pseudo-randomness of MISTY-type transformations and the block cipher KASUMI, Information Security and Privacy, The 6th Australasian Conference, Lecture Notes in Computer Science, vol. 2119, pp. 60-73, Springer-Verlag, 2001."},{"key":"3_CR6_3","doi-asserted-by":"crossref","unstructured":"Menezes A. J., Van Oorschot, P. C. and Vanstone, S. A., Handbook of Applied Cryptography, CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"3_CR7_3","first-page":"386","volume-title":"Advances in Cryptology","author":"M Matsui","year":"1994","unstructured":"Matsui, M., Linear cryptanalysis method for DES cipher, T. Helleseth (Ed.), Advances in Cryptology, vol. 765, Lecture Notes in Computer Science, pp. 386-397, Springer-Verlag, 1994."},{"key":"3_CR8_3","first-page":"2","volume-title":"Differential Cryptanalysis of DES-like Cryptosystems, Advances of Cryptology","author":"E Biham","year":"1990","unstructured":"Biham, E. and Shamir, A., Differential Cryptanalysis of DES-like Cryptosystems, Advances of Cryptology, vol. 537,pp. 2-21, Springer-Verlag, 1990."},{"key":"3_CR9_3","volume-title":"Walsh Functions and Their Applications","author":"KG Beauchamp","year":"1975","unstructured":"Beauchamp, K. G., Walsh Functions and Their Applications. New York: Academic, 1975."},{"key":"3_CR10_3","unstructured":"Dorigo, M. and Maniezzo, M., Parallel Genetic Algorithms: Introduction and Overview of Current Research, in Parallel Genetic Algorithms, J.Stender (Ed.), IOS Press, 1993."},{"key":"3_CR11_3","first-page":"263","volume-title":"Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes","author":"W Millan","year":"1999","unstructured":"Millan, W., Burnett, L, Cater, G., Clark, J.A. and Dawson, E., Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes, Lecture Notes in Computer Science, vol. 1726, pp. 263-274, Springer-Verlag, 1999."},{"key":"3_CR12_3","doi-asserted-by":"crossref","unstructured":"Clark, J.A., Jacob, J.L. and Stepney, S., The Design of S-Boxes by Simulated Annealing, New Generation Computing, vol. 23, no. 3, pp. 219-231, Ohmsha and Springer, 2005.","DOI":"10.1007\/BF03037656"}],"container-title":["Studies in Computational Intelligence","Computational Intelligence in Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71078-3_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:36:46Z","timestamp":1620016606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71078-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540710776","9783540710783"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71078-3_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}