{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:45:01Z","timestamp":1725551101809},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_16","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"175-187","source":"Crossref","is-referenced-by-count":5,"title":["A Cryptographic Algorithm Based on Hybrid Cubes"],"prefix":"10.1007","author":[{"given":"Sapiee","family":"Jamel","sequence":"first","affiliation":[]},{"given":"Tutut","family":"Herawan","sequence":"additional","affiliation":[]},{"given":"Mustafa Mat","family":"Deris","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Schneier, B.: Keynote Speaker. In: Hack in the Box Security Conference (HITBC), Kuala Lumpur, Malaysia (2006)","key":"16_CR1"},{"unstructured":"National Institute of Standards(NIST): FIPS Pub 197: Advanced Encryption Standard AES (2001), http:\/\/csrc.nist.gov\/","key":"16_CR2"},{"key":"16_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael : AES \u2013 The Advanced Encryption Standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES \u2013 The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"16_CR4","volume-title":"The Twofish Encryption Algorithm","author":"B. Schneier","year":"1999","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish Encryption Algorithm. John Wiley and Sons, New York (1999)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1007\/3-540-60590-8_22","volume-title":"Fast Software Encryption","author":"S. Vaudenay","year":"1995","unstructured":"Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 286\u2013297. Springer, Heidelberg (1995)"},{"key":"16_CR6","volume-title":"International Conference on Computer Science and Software Engineering","author":"S. Wu","year":"2005","unstructured":"Wu, S., Zhang, Y., Jing, X.: A Novel Encryption Algorithm based on Shifting and Exchanging Rule of Bi-Column Bi-row Circular Queue. In: International Conference on Computer Science and Software Engineerin. IEEE, Los Alamitos (2005)"},{"unstructured":"Wikipedia Web Site, http:\/\/en.wikipedia.org\/wiki\/Magic_cube","key":"16_CR7"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.2307\/3620151","volume":"82","author":"M. Trenkler","year":"1998","unstructured":"Trenkler, M.: Magic Cubes. The Mathematical Gazeete\u00a082, 56\u201361 (1998)","journal-title":"The Mathematical Gazeete"},{"doi-asserted-by":"crossref","unstructured":"Trenkler, M.: A Construction of Magic Cubes. The Mathematical Gazeete, 36\u201341 (2000)","key":"16_CR9","DOI":"10.2307\/3621472"},{"issue":"2","key":"16_CR10","first-page":"105","volume":"12","author":"M. Trenkler","year":"2005","unstructured":"Trenkler, M.: An Algorithm for making Magic Cubes. The \u041fME Journal\u00a012(2), 105\u2013106 (2005)","journal-title":"The \u041fME Journal"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/11582267_24","volume-title":"Advances in Multimedia Information Processing - PCM 2005","author":"J. Shen","year":"2005","unstructured":"Shen, J., Jin, X., Zhou, C.: A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation. In: Ho, Y.-S., Kim, H.-J. (eds.) PCM 2005. LNCS, vol.\u00a03768, pp. 270\u2013280. Springer, Heidelberg (2005)"},{"key":"16_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/11596981_145","volume-title":"Computational Intelligence and Security","author":"L. Zhang","year":"2005","unstructured":"Zhang, L., Shiming, J., Xie, Y., Yuan, Q., Wan, Y., Bao, G.: Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 977\u2013982. Springer, Heidelberg (2005)"},{"unstructured":"Heinz H.: Magic Squares. Magic Stars & Other Patterns, http:\/\/www.geocities.com\/~harveyh\/","key":"16_CR13"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/978-3-642-01970-8_51","volume-title":"ICCS 2009","author":"Snasel","year":"2009","unstructured":"Snasel, Abraham, A., Dvorsky, J., Kromer, P., Platos, J.: Hash Functions Based on Large Quasigroups. In: Allen, G., Nabrzyski, J., Seidel, E., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2009. LNCS, vol.\u00a05544, pp. 521\u2013529. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:35Z","timestamp":1606186235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}