{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:07Z","timestamp":1773950647332,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811064265","type":"print"},{"value":"9789811064272","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_39","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"485-494","source":"Crossref","is-referenced-by-count":2,"title":["High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE"],"prefix":"10.1007","author":[{"given":"Rajdeep","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Runa","family":"Seth","sequence":"additional","affiliation":[]},{"given":"J. K.","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"39_CR1","unstructured":"An Approach Towards Development of Efficient Encryption Techniques, Ph.D. (Science) thesis, Department of Computer Science and Applications, University of North Bengal, India (2005)"},{"key":"39_CR2","unstructured":"Authentication of PCSs with Triangular Encryption Technique. In: Proceedings of 6th Philippine Computing Science Congress, PCSC 2006, Ateneo de Manila University, Manila, Philippine, 28\u201329 March 2006"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Mihaljevic, M.J., Imai, H.: A stream cipher design based on embedding of random bits. In: International Symposium on Information Theory and its Applications, ISITA2008, Auckland, New Zealand, 7\u201310 December 2008. ieeexplore.ieee.org","DOI":"10.1109\/ISITA.2008.4895641"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L.: Public key cryptography, Internet Kiosk, June 1996. ieeexplore.ieee.org","DOI":"10.1109\/2.507642"},{"key":"39_CR5","unstructured":"Chakraborty, R., Seth, R., Mandal, J.K.: An FPGA based block cipher through recursive positional substitution on prime-nonprime of cluster (RPSPNC). Published & presented in 3rd international conference on microelectronics, circuits and systems, MICRO 2016, 9\u201310 July 2016, Science City, Kolkata, West Bengal, India, pp. 96\u2013101. IEEE, CCSN, EDS, Kolkata (2016). ISBN 978-93-80813-45-5. Organized and sponsored by Maulana Abul Kalam Azad University of Technology (MAKAUT) formerly West Bengal University of Technology (WBUT)"},{"key":"39_CR6","unstructured":"Forouzan, B.A.: Cryptography and Network Security, Special Indian Edition 2007. Tata Mc-Graw-Hill. ISBN 13: 978-0-07-066046-5, ISBN 10: 0-07-066046-8"},{"key":"39_CR7","unstructured":"Sarkar, A., Mandal, J.K.: Cryptanalysis of key exchange method in wireless communication (CKE). Int. J. Netw. Secur. (IJNS) (2015). ISSN 1816 \u2013 3548 [Online]; 1816 \u2013 353X [Print]. (Accepted). Indexed by: SCOPUS, DBLP, SCImago, SciVerse, Engineering Village, Ei Compendex, Summon by Serial Solutions, SCImago, EBSCO, DOAJ, Google Scholar etc."},{"key":"39_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-81-322-2250-7_31","volume-title":"Information Systems Design and Intelligent Applications","author":"J Goswami (Ghosh)","year":"2015","unstructured":"Goswami (Ghosh), J., Paul, M.: A symmetric key cryptographic technique based on frame rotation of an even ordered square matrix. In: Mandal, J.K., Satapathy, S.C., Sanyal, M.K., Sarkar, P.P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 339, pp. 319\u2013328. Springer, New Delhi (2015). doi: 10.1007\/978-81-322-2250-7_31"},{"issue":"1","key":"39_CR9","first-page":"10","volume":"4","author":"R Chakraborty","year":"2015","unstructured":"Chakraborty, R., Mandal, J.K.: Secure encryption technique (SET): a private key crypto system. Int. J. Multidiscipl. Cryptol. Inf. Secur. (IJMCIS) 4(1), 10\u201313 (2015). ISSN 2320-2610, (January\u2013February 2015 issue)","journal-title":"Int. J. Multidiscipl. Cryptol. Inf. Secur. (IJMCIS)"},{"key":"39_CR10","unstructured":"Sareen, S., Mandal, J.K., Pal, T.: Image encryption using genetic algorithms. In: IEEE Seventh International Joint Conference on Computational Sciences and Optimization, CSO 2014, Beijing, China, 4\u20136 July 2014 (2014)"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:08:04Z","timestamp":1570126084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}