{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:56:55Z","timestamp":1743065815919},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_27","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"314-325","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Binary Playfair Algorithm Using a 4\u00d74 Playfair Key Matrix"],"prefix":"10.1007","author":[{"given":"Saswati","family":"Mukherjee","sequence":"first","affiliation":[]},{"given":"Matangini","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Ayan","family":"Lahiri","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Playfair Cipher, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Playfair_cipher\n                    \n                    \n                   (October 21, 2011)"},{"issue":"5","key":"27_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.5120\/2213-2814","volume":"17","author":"K. Ravindra Babu","year":"2011","unstructured":"Ravindra Babu, K., Uday Kumar, S., Vinay Babu, A., Aditya, I.V.N.S., Komuraiah, P.: An Extension to Traditional Playfair Cryptographic Method. International Journal of Computer Application\u00a017(5), 34\u201337 (2011)","journal-title":"International Journal of Computer Application"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Srivastava, S.S., Gupta, N.: Security aspects of the Extended Playfair cipher. In: International Conference on Communication Systems and Network Technologies, pp. 144\u2013147 (2011)","DOI":"10.1109\/CSNT.2011.37"},{"issue":"5","key":"27_CR4","doi-asserted-by":"crossref","first-page":"597","DOI":"10.7763\/IJCTE.2009.V1.96","volume":"1","author":"V. Umakanta Sastry","year":"2009","unstructured":"Umakanta Sastry, V., Ravi Shankar, N., Durga Bhavani, S.: A Modified Playfair Cipher Involving Interweaving and Iteration. International Journal of Computer Theory and Engineering\u00a01(5), 597\u2013601 (2009)","journal-title":"International Journal of Computer Theory and Engineering"},{"issue":"5","key":"27_CR5","doi-asserted-by":"crossref","first-page":"592","DOI":"10.7763\/IJCTE.2009.V1.95","volume":"1","author":"V. Umakanta Sastry","year":"2009","unstructured":"Umakanta Sastry, V., Ravi Shankar, N., Durga Bhavani, S.: A Modified Playfair for a Large Block of Plaintext. International Journal of Computer Theory and Engineering\u00a01(5), 592\u2013596 (2009)","journal-title":"International Journal of Computer Theory and Engineering"},{"issue":"28","key":"27_CR6","first-page":"25","volume":"1","author":"K. Ravindra Babu","year":"2010","unstructured":"Ravindra Babu, K., Udaya Kumar, S., Vinaya Babu, A., Reddy, T.: A Block Cipher Generation Using Color Substitution. International Journal of Computer Applications (0975 - 8887)\u00a01(28), 25\u201327 (2010)","journal-title":"International Journal of Computer Applications (0975 - 8887)"},{"issue":"3","key":"27_CR7","first-page":"129","volume":"8","author":"M. Sabry","year":"2010","unstructured":"Sabry, M., Hashem, M., Nazmy, T., Khalifa, M.E.: A DNA and Amino Acids-Based Implementation of Playfair Cipher. (IJCSIS) International Journal of Computer Science and Information Security\u00a08(3), 129\u2013136 (2010)","journal-title":"(IJCSIS) International Journal of Computer Science and Information Security"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Murali, P., Senthilkumar, G.: Modified Version of Playfair Cipher using Linear Feedback Shift Register. In: 2009 International Conference on Information Management and Engineering, pp. 488\u2013490 (2009)","DOI":"10.1109\/ICIME.2009.86"},{"issue":"5","key":"27_CR9","first-page":"280","volume":"10","author":"F. Saeed","year":"2010","unstructured":"Saeed, F., Rashid, M.: Integrating Classical Encryption with Modern Technique. IJCSNS International Journal of Computer 280 Science and Network Security\u00a010(5), 280\u2013285 (2010)","journal-title":"IJCSNS International Journal of Computer 280 Science and Network Security"},{"key":"27_CR10","unstructured":"Mondal, U.K., Mandal, S.N., PalChoudhury, J.: A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature. 2009 International Journal of Computer Science and Network Security\u00a08(8) (August 2008)"},{"key":"27_CR11","unstructured":"Bishop, D.: Introduction to cryptography with Java applets (2005)"},{"key":"27_CR12","unstructured":"Stallings, W.: Cryptography and network security: principles and practice, 5th edn. Prentice Hall International (2010)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:00:33Z","timestamp":1620129633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}