{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:57:35Z","timestamp":1725843455510},"publisher-location":"Singapore","reference-count":5,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_61","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T04:57:57Z","timestamp":1450328277000},"page":"425-430","source":"Crossref","is-referenced-by-count":1,"title":["Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure"],"prefix":"10.1007","author":[{"given":"Keonwoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Ku-Young","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"61_CR1","unstructured":"Bellare, M., Rogaway, P., Spies, T.: The FFX Mode of Operation for Format-Preserving Encryption, Draft 1.1, NIST, February 2010"},{"key":"61_CR2","unstructured":"Bellare, M., Rogaway, P., Spies, T.: Addendum to \u201cThe FFX Mode of Operation for Format-Preserving Encryption\u201d: A parameter collection for enciphering strings of arbitrary radix and length, Draft 1.0, NIST, September 2010"},{"key":"61_CR3","unstructured":"Vance, J.: VAES3 scheme for FFX: An addendum to \u201cThe FFX Mode of Operation for Format-Preserving Encryption\u201d: A parameter collection for encipher strings of arbitrary radix with subkey operation to lengthen life of the enciphering key, Draft 1.0, NIST, May 2011"},{"key":"61_CR4","unstructured":"Brier, E., Peyrin, T., Stern, J.: BPS: a Format-Preserving Encryption Proposal"},{"key":"61_CR5","unstructured":"NIST Special Publication 800-38G Draft: Recommendation for Block Cipher Modes of Operation\u2014Methods for Format-Preserving Encryption, July 2013"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:18:28Z","timestamp":1559348308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_61","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}