{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:47Z","timestamp":1725490547509},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540746256"},{"type":"electronic","value":"9783540746263"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74626-3_38","type":"book-chapter","created":{"date-parts":[[2007,8,25]],"date-time":"2007-08-25T15:26:52Z","timestamp":1188055612000},"page":"403-414","source":"Crossref","is-referenced-by-count":1,"title":["Evolutionary Design of Resilient Substitution Boxes: From Coding to Hardware Implementation"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza","family":"de Macedo Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","volume-title":"Walsh Functions and Their Applications","author":"K.G. Beauchamp","year":"1975","unstructured":"Beauchamp, K.G.: Walsh Functions and Their Applications. Academic, New York (1975)"},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"},{"issue":"3","key":"38_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF03037656","volume":"23","author":"J.A. Clark","year":"2005","unstructured":"Clark, J.A., Jacob, J.L., Stepney, S.: The Design of S-Boxes by Simulated Annealing. New Generation Computing\u00a023(3), 219\u2013231 (2005)","journal-title":"New Generation Computing"},{"key":"38_CR4","volume-title":"Parallel Genetic Algorithms","author":"M. Dorigo","year":"1993","unstructured":"Dorigo, M., Maniezzo, M.: Parallel Genetic Algorithms: Introduction and Overview of Current Research. In: Stender, J. (ed.) Parallel Genetic Algorithms, IOS Press, Amsterdam (1993)"},{"key":"38_CR5","volume-title":"Practical genetic algorithms","author":"R.L. Haupt","year":"1998","unstructured":"Haupt, R.L., Haupt, S.E.: Practical genetic algorithms. John Wiley, Chichester (1998)"},{"key":"38_CR6","unstructured":"Kwan, M.: Reducing the gate count of bitslice DES (2000), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"38_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/978-3-540-47942-0_22","volume-title":"Information and Communication Security","author":"W. Millan","year":"1999","unstructured":"Millan, W., Burnett, L., Cater, G., Clark, J.A., Dawson, E.: Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. In: Varadharajan, V., Mu, Y. (eds.) Information and Communication Security. LNCS, vol.\u00a01726, pp. 263\u2013274. Springer, Heidelberg (1999)"},{"issue":"1","key":"38_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/43.559336","volume":"16","author":"J. Monteiro","year":"1997","unstructured":"Monteiro, J., Devadas, D., Gosh, A., Keutzer, K., White, J.: Estimation of average switching activity in combinational logic circuits using symbolic simulation. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems\u00a016(1), 121\u2013127 (1997)","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"38_CR11","unstructured":"National Institute of Standard and Technology, Data Encryption Standard, Federal Information Processing Standards 46 (November 1977)"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1073\/pnas.36.1.48","volume":"36","author":"J.F. Nash","year":"1950","unstructured":"Nash, J.F.: Equilibrium points in n-person games. Proceedings of the National Academy of Sciences\u00a036, 48\u201349 (1950)","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"2","key":"38_CR13","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J.N. Nash","year":"1951","unstructured":"Nash, J.N.: Non-cooperative game. Annals of Mathematics\u00a054(2), 286\u2013295 (1951)","journal-title":"Annals of Mathematics"},{"key":"38_CR14","series-title":"Electrical Engineering Series","volume-title":"Fundamentals of digital systems design","author":"V.T. Rhyne","year":"1973","unstructured":"Rhyne, V.T.: Fundamentals of digital systems design. Electrical Engineering Series. Prentice-Hall, Englewood Cliffs (1973)"},{"issue":"4","key":"38_CR15","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shanon","year":"1949","unstructured":"Shanon, C.E.: Communication theory of secrecy systems. Bell Sys. Tech. J.\u00a028(4), 656\u2013715 (1949)","journal-title":"Bell Sys. Tech. J."}],"container-title":["Lecture Notes in Computer Science","Evolvable Systems: From Biology to Hardware"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74626-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T01:49:21Z","timestamp":1550886561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74626-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540746256","9783540746263"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74626-3_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}