{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:38:45Z","timestamp":1725529125815},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004049"},{"type":"electronic","value":"9783642004056"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00405-6_34","type":"book-chapter","created":{"date-parts":[[2009,3,7]],"date-time":"2009-03-07T04:50:05Z","timestamp":1236401405000},"page":"325-334","source":"Crossref","is-referenced-by-count":7,"title":["Security Enhancement in Data Encryption Standard"],"prefix":"10.1007","author":[{"given":"Jatin","family":"Verma","sequence":"first","affiliation":[]},{"given":"Sunita","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"34_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSPEC.1979.6368157","volume":"16","author":"M.E. Hellman","year":"1979","unstructured":"Hellman, M.E.: DES will be totally insecure with ten years. IEEE Spectrum\u00a016(7), 32\u201339 (1979)","journal-title":"IEEE Spectrum"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MCOM.1978.1089771","volume":"16","author":"R.M. Davis","year":"1978","unstructured":"Davis, R.M.: The Data Encryption Standard in Perspective. IEEE Communications Magazine\u00a016, 5\u20139 (1978)","journal-title":"IEEE Communications Magazine"},{"key":"34_CR3","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, New York (1996)"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/3-540-48071-4_34","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"E. Biham","year":"1993","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 487\u2013496. Springer, Heidelberg (1993)"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology\u00a04, 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Heys, H.: A Tutorial on Linear and Differential Cryptanalysis. Technical Report, United States Military Academy, vol. XXVI(3) (2002)","DOI":"10.1080\/0161-110291890885"},{"key":"34_CR7","unstructured":"Daley, W.M.: Data Encryption Standard. FIPS Pub. 46, U.S, National Bureau of Standards, Washington DC (1977)"},{"issue":"3","key":"34_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D. Coppersmith","year":"1994","unstructured":"Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM Research Journal\u00a038(3), 243\u2013250 (1994)","journal-title":"IBM Research Journal"},{"issue":"5","key":"34_CR9","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/5.4441","volume":"76","author":"M.E. Smld","year":"1988","unstructured":"Smld, M.E., Branstad, D.K.: The Data Encryption Standard: Past and Future. Proc. of IEEE\u00a076(5), 550\u2013559 (1988)","journal-title":"Proc. of IEEE"},{"key":"34_CR10","volume-title":"Cryptography- Theory and Practice","author":"D. Stinson","year":"2002","unstructured":"Stinson, D.: Cryptography- Theory and Practice. CRC Press, Boca Raton (2002)"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/ISSSTA.1996.563518","volume-title":"4th IEEE International Symposium on Spread Spectrum Techniques and Applications","author":"S. Han","year":"1996","unstructured":"Han, S., Oh, H., Park, J.: The improved Data Encryption Standard (DES) Algorithm. In: 4th IEEE International Symposium on Spread Spectrum Techniques and Applications, vol.\u00a03, pp. 1310\u20131314. IEEE Press, Los Alamitos (1996)"}],"container-title":["Communications in Computer and Information Science","Information Systems, Technology and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00405-6_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T10:10:18Z","timestamp":1558174218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00405-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642004049","9783642004056"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00405-6_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}