{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:33Z","timestamp":1725550893942},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_44","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T15:11:44Z","timestamp":1270048304000},"page":"269-275","source":"Crossref","is-referenced-by-count":3,"title":["Encryption Algorithm for Block Ciphers Based on Programmable Cellular Automata"],"prefix":"10.1007","author":[{"given":"Abhishek","family":"Ray","sequence":"first","affiliation":[]},{"given":"Debasis","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","volume-title":"A new kind of science","author":"S. Wolfram","year":"2002","unstructured":"Wolfram, S.: A new kind of science. Wolfram Media, Inc., Champaign (2002)"},{"key":"44_CR2","unstructured":"Adamatzky, A., Alonso-Sanz, R., Lawniczak, A., Martinez, G.J., Morita, K.: In: Worsch, T. (ed.) AUTOMATA-2008 Theory and Application of Cellular Automata (2008)"},{"key":"44_CR3","volume-title":"Cryptography and Network Security","author":"A. Kahata","year":"2008","unstructured":"Kahata, A.: Cryptography and Network Security, 2nd edn. Tata Mc-graw hill, New York (2008)","edition":"2"},{"key":"44_CR4","volume-title":"Cryptography and Network Security","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security, 3rd edn. Prentice-Hall, Englewood Cliffs (2003)","edition":"3"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/BF03037658","volume":"23","author":"M. Seredynski","year":"2005","unstructured":"Seredynski, M., Bouvary, P.: Block Cipher Based on Reversible Cellular Automata. New Generation Computing\u00a023, 245\u2013258 (2005)","journal-title":"New Generation Computing"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Kundu, A., Pal, A.R., Sarkar, T., Banarjee, M., Guha, S.K., Mukhopadhayay, D.: Comparative Study on Null Boundary and Periodic Boundary Neighbourhood Mulriple Attractor Cellular Automata for Classification. In: IEEE 2008 (2008)","DOI":"10.1109\/ICDIM.2008.4746805"},{"key":"44_CR7","first-page":"51","volume":"1","author":"P. Guan","year":"1987","unstructured":"Guan, P.: Cellular Automaton Public Key Cryptosystem. Complex system\u00a01, 51\u201356 (1987)","journal-title":"Complex system"},{"key":"44_CR8","first-page":"429","volume-title":"Cryptography with cellular Automata","author":"S. Wolfram","year":"1985","unstructured":"Wolfram, S.: Cryptography with cellular Automata, pp. 429\u2013432. Springer, Heidelberg (1985)"},{"issue":"2","key":"44_CR9","first-page":"243","volume":"8","author":"S. Tripathy","year":"2009","unstructured":"Tripathy, S., Nandi, S.: LCASE: Lightweight Cellular Au- tomata Based on Symmetric Key Encryption. International Journal of Network Security\u00a08(2), 243\u2013252 (2009)","journal-title":"International Journal of Network Security"},{"key":"44_CR10","volume-title":"Additive Cellular Automata Theory and Applications","author":"P. Pal Chaudhuri","year":"1997","unstructured":"Pal Chaudhuri, P., Roy Chowdhury, D., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata Theory and Applications, vol.\u00a01. IEEE Computer Society Press, USA (1997)"},{"key":"44_CR11","unstructured":"Ganguly, N.: Cellular Automata Evolution: Theory and Applications in Pattern Classification. PhD thesis, B. E. College (2003)"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Anghelescu, P., Ionita, S., Safron, E.: Block Encryption Using Hybrid Additive Cellular Automata. In: 7th International conference on Hybrid Intelligent Systems, IEEE 2007 (2007)","DOI":"10.1109\/ICHIS.2007.4344040"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:51:44Z","timestamp":1606168304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}