{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:15:49Z","timestamp":1743016549865,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_37","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T20:22:53Z","timestamp":1309206173000},"page":"427-436","source":"Crossref","is-referenced-by-count":1,"title":["A New Stream Cipher Using Natural Numbers Based on Conventional Encryption Techniques: MINNSC"],"prefix":"10.1007","author":[{"given":"Rajendra","family":"Hegadi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","volume-title":"Apostal: Introduction to Analytic Number Theory","author":"M. Tom","year":"1976","unstructured":"Tom, M.: Apostal: Introduction to Analytic Number Theory. Springer, Heidelberg (1976)"},{"key":"37_CR2","volume-title":"A Course in Number Theory and Cryptography","author":"N.. Koblitz","year":"2002","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography. Springer, New York (2002)"},{"key":"37_CR3","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practices. PHI (2004)"},{"issue":"1","key":"37_CR4","first-page":"371","volume":"7","author":"R. Hegadi","year":"2007","unstructured":"Hegadi, R., Nagaraj, M., Patil, S.S.: Encryption and Decryption Process using Composite Numbers. International Journal of Computer Science and Network Security, IJCSNS\u00a07(1), 371\u2013377 (2007)","journal-title":"International Journal of Computer Science and Network Security, IJCSNS"},{"key":"37_CR5","unstructured":"Robshaw, M.J.B.: Stream Ciphers. Technical Report TR-701, version 2.0, RSA Laboratories (1995)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Pal, J.K. Mandal, J. K., Gupta, S.: Composite Transposition Substitution Chaining Based Cipher Technique. ADCOM, pp433-439 (2008)","DOI":"10.1109\/ADCOM.2008.4760485"},{"key":"37_CR7","unstructured":"Zhang, Y.-P., Sun, J., Zhang, X.: A stream Cipher Algorithm based on conventional Encryption Techniques. In: CCECE, pp. 649\u2013652 (2004)"},{"issue":"4","key":"37_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Types of Cryptanalytic Att acks Using Related Keys. Journal of Cryptology\u00a07(4), 229\u2013246 (1994)","journal-title":"Journal of Cryptology"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Pal, S.K., Sumitra: Development of Efficient Algorithms for Quasigroup Generation & Encryption. In: IEEE International Advance Computing Conference-IACC, pp. 940\u2013945 (2009)","DOI":"10.1109\/IADCC.2009.4809141"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T08:16:13Z","timestamp":1560327373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}