{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:34:24Z","timestamp":1762875264679},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_21","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:37:49Z","timestamp":1258079869000},"page":"280-291","source":"Crossref","is-referenced-by-count":20,"title":["TWIS \u2013 A Lightweight Block Cipher"],"prefix":"10.1007","author":[{"given":"Shri Kant","family":"Ojha","sequence":"first","affiliation":[]},{"given":"Naveen","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Kritika","family":"Jain","sequence":"additional","affiliation":[]},{"family":"Sangeeta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A. Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L.: A Survey of Lightweight Cryptography Implementations, Copublished by the IEEE CS and the IEEE CASS, 0740-7475\/07\/. IEEE, Los Alamitos (2007)","DOI":"10.1109\/MDT.2007.4343586"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D. Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-57332-1_5","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"K. Kim","year":"1993","unstructured":"Kim, K.: Construction of DES-like S-Box based on Boolean Functions satisfying the SAC. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 59\u201372. Springer, Heidelberg (1993)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-74619-5_13","volume-title":"Fast Software Encryption","author":"G. Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol.\u00a04593, pp. 196\u2013210. Springer, Heidelberg (2007)"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1023\/B:MONE.0000048556.51292.31","volume":"10","author":"N. Sklavos","year":"2005","unstructured":"Sklavos, N., Moldovyan, N.A., Koufopavlou, O.: High Speed Networking Security:Design and Implementation of Two New DDP-Based Ciphers. Mobile Networks and Applications\u00a010, pp. 219\u2013231. Springer, Heidelberg (2005)","journal-title":"Mobile Networks and Applications"},{"key":"21_CR7","unstructured":"Scheiner, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-bit Block Cipher. In: Counterpane System, Berkeley, California (1998)"},{"key":"21_CR8","unstructured":"Soumez, M., Doganaksoy, T.A., Calik, C.: Detailed Statistical Analysis of Synchronous Stream Ciphers. In: SASC 2006: Stream Cipher Revisited (2006)"},{"issue":"2","key":"21_CR9","first-page":"243","volume":"8","author":"S. Tripathy","year":"2009","unstructured":"Tripathy, S., Nandi, S.: LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption. International Journal of Network Security\u00a08(2), 243\u2013252 (2009)","journal-title":"International Journal of Network Security"},{"key":"21_CR10","unstructured":"The 128-bit Block Cipher CLEFIA: Algorithm Specification. On-line document, 2007. Sony Corporation (2007)"},{"key":"21_CR11","unstructured":"The 128-bit Block Cipher CLEFIA: Design Rationale. Revision 1.0, 2007. Sony Corporation (2007)"},{"key":"21_CR12","unstructured":"NIST Special Publication 800-22. A Statistical Test for Random and Pseudorandom Number Generators for Cryptographic Application [EB\/OL].[2001-05-15] (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:34:41Z","timestamp":1606167281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}