{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:28:59Z","timestamp":1743002939178,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371684"},{"type":"electronic","value":"9783642371691"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37169-1_16","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T14:03:46Z","timestamp":1364306626000},"page":"161-171","source":"Crossref","is-referenced-by-count":5,"title":["Quasigroup Representation of Some Feistel and Generalized Feistel Ciphers"],"prefix":"10.1007","author":[{"given":"Aleksandra","family":"Mileva","sequence":"first","affiliation":[]},{"given":"Smile","family":"Markovski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-44983-3_4","volume-title":"Selected Areas in Cryptography","author":"K. Aoki","year":"2001","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 39\u201356. Springer, Heidelberg (2001)"},{"key":"16_CR2","unstructured":"Adams, C.M., Tavares, S.E.: Designing S-boxes for Ciphers Resistant to Differential Cryptanalysis. In: 3rd Symposium on State and Progress of Research in Cryptography, Rome, Italy, pp. 181\u2013190 (1993)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-57332-1_3","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"L. Brown","year":"1993","unstructured":"Brown, L., Kwan, M., Pieprzyk, J., Seberry, J.: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. In: Imai, H., Rivest, R.L., Matsumoto, T. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 36\u201350. Springer, Heidelberg (1993)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-02620-1_6","volume-title":"Information Security and Privacy","author":"J. Choy","year":"2009","unstructured":"Choy, J., Chew, G., Khoo, K., Yap, H.: Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol.\u00a05594, pp. 73\u201389. Springer, Heidelberg (2009)"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s12095-011-0042-6","volume":"3","author":"J. Choy","year":"2011","unstructured":"Choy, J., Chew, G., Khoo, K., Yap, H.: Cryptographic Properties and Applications of a Generalized Unbalnced Feistel Network Structure. Cryptography and Communications\u00a03(3), 141\u2013164 (2011) (revised version)","journal-title":"Cryptography and Communications"},{"key":"16_CR6","unstructured":"CRYPTREC report 2002, Archive (2003), \n                    http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/doc\/c02e_report2.pdf"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-540-79104-1_29","volume-title":"Information Security Practice and Experience","author":"D. Gligoroski","year":"2008","unstructured":"Gligoroski, D., Andova, S., Knapskog, S.J.: On the Importance of the Key Separation Principle for Different Modes of Operation. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol.\u00a04991, pp. 404\u2013418. Springer, Heidelberg (2008)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Denes, J., Keedwell, A.D.: Latin squares: New developments in the theory and applications. Elsevier science publishers (1991)","DOI":"10.1016\/S0167-5060(08)70969-5"},{"key":"16_CR9","unstructured":"Diffie, W., Ledin, G. (trans.): SMS4 encryption algorithm for wireless networks. Cryptology ePrint Archive, Report 2008\/329 (2008)"},{"issue":"1-2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/BF01222262","volume":"35","author":"A.B. Evans","year":"1989","unstructured":"Evans, A.B.: Orthomorphism Graphs of Groups. Journal of Geometry\u00a035(1-2), 66\u201374 (1989)","journal-title":"Journal of Geometry"},{"issue":"5","key":"16_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H. Feistel","year":"1973","unstructured":"Feistel, H.: Cryptography and computer privacy. Scientific American\u00a0228(5), 15\u201323 (1973)","journal-title":"Scientific American"},{"key":"16_CR12","unstructured":"International Standard - ISO\/IEC 18033-3, Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (2005)"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BFb0052335","volume-title":"Fast Software Encryption","author":"M. Kwan","year":"1997","unstructured":"Kwan, M.: The Design of the ICE Encryption Algorithm. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 69\u201382. Springer, Heidelberg (1997)"},{"key":"16_CR14","unstructured":"NBS FIPS PUB 46: Data Encryption Standard. National Bureau of Standards, U.S. Department of Commerce (1977)"},{"key":"16_CR15","unstructured":"NESSIE-New European Schemes for Signatures, Integrity, and Encryption, final report of European project IST-1999-12324, Version 0.15, Archive (April 19, 2004), \n                    https:\/\/www.cosic.esat.kuleuven.be\/nessie\/Bookv015.pdf"},{"key":"16_CR16","unstructured":"Markovski, S., Gligoroski, D., Andova, S.: Using quasigroups for one-one secure encoding. In: VIII Conf. Logic and Computer Science, LIRA 1997, Novi Sad, Serbia, pp. 157\u2013162 (1997)"},{"key":"16_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/BFb0052334","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"1997","unstructured":"Matsui, M.: New block encryption algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 54\u201368. Springer, Heidelberg (1997)"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","first-page":"476","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"R.C. Merkle","year":"1991","unstructured":"Merkle, R.C.: Fast Software Encryption Functions. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 476\u2013500. Springer, Heidelberg (1991)"},{"key":"16_CR19","unstructured":"Mihajloska, H., Gligoroski, D.: Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4. In: SECURWARE 2012, Rome, Italy (2012)"},{"key":"16_CR20","unstructured":"Mileva, A., Markovski, S.: Shapeless quasigroups derived by Feistel orthomorphisms. Glasnik Matematicki (accepted for printing)"},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"321","DOI":"10.4153\/CJM-1957-039-3","volume":"9","author":"A. Sade","year":"1957","unstructured":"Sade, A.: Quasigroups automorphes par le groupe cyclique. Canadian Journal of Mathematics\u00a09, 321\u2013335 (1957)","journal-title":"Canadian Journal of Mathematics"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). In: Fast Software Encryption, Cambridge Security Workshop Proceedings, pp. 191\u2013204. Springer (1994)","DOI":"10.1007\/3-540-58108-1_24"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/0-387-34805-0_42","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Zheng","year":"1990","unstructured":"Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 461\u2013480. Springer, Heidelberg (1990)"}],"container-title":["Advances in Intelligent Systems and Computing","ICT Innovations 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37169-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T19:37:45Z","timestamp":1676576265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-37169-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371684","9783642371691"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37169-1_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}