{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:40:01Z","timestamp":1739997601150,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_25","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"284-295","source":"Crossref","is-referenced-by-count":0,"title":["Encryption Methods for Restricted Data Limited in Value Range"],"prefix":"10.1007","author":[{"given":"Yuji","family":"Suga","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"NIST Federal Information Processing Standards Publication 197, Advanced Encryption Standard, AES (2001)"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36492-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 47\u201361. Springer, Heidelberg (2003)"},{"key":"25_CR3","unstructured":"ISO\/IEC 15444-1:2004 \u2014 ITU-T Rec. T.800, JPEG 2000, image coding system: Core coding system (2000)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Taubinan, D.: Eiiibcclded Block Codirig in JPEG-2000. In: Proc. of IEEE International Conference on Image Processing, vol.\u00a02, pp. 33\u201336 (2000)","DOI":"10.1109\/ICIP.2000.899218"},{"key":"25_CR5","unstructured":"ISO\/IEC JTC 1\/SC 29\/WG 1 N 3412 (2004)"},{"issue":"11","key":"25_CR6","first-page":"839","volume":"J90-A","author":"K. Iwamura","year":"2007","unstructured":"Iwamura, K., Hayashi, J.: Encryption Scheme without generating marker codes for JPEG 2000 image. The Transactions of the Institute of Electronics, Information and Communication Engineers\u00a0J90-A(11), 839\u2013850 (2007)","journal-title":"The Transactions of the Institute of Electronics, Information and Communication Engineers"},{"key":"25_CR7","unstructured":"ISO\/IEC 15948:2003, Portable Network Graphics (PNG): Functional specification"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","volume-title":"Selected Areas in Cryptography (SAC 2009)","author":"M. Bellare","year":"2009","unstructured":"Bellare, M., Ristenpart, T.: Format-Preserving Encryption. In: Rijmen, V. (ed.) SAC 2009. LNCS, vol.\u00a05867, pp. 295\u2013312. Springer, Heidelberg (2009)"},{"key":"25_CR9","unstructured":"NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation (2001)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:14:08Z","timestamp":1739996048000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}