{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:34:21Z","timestamp":1769240061465,"version":"3.49.0"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,3,5]],"date-time":"2010-03-05T00:00:00Z","timestamp":1267747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s11227-010-0398-y","type":"journal-article","created":{"date-parts":[[2010,3,4]],"date-time":"2010-03-04T10:04:33Z","timestamp":1267697073000},"page":"216-226","source":"Crossref","is-referenced-by-count":4,"title":["Improving quality of DES S-boxes by cellular automata-based S-boxes"],"prefix":"10.1007","volume":"57","author":[{"given":"Miroslaw","family":"Szaban","sequence":"first","affiliation":[]},{"given":"Franciszek","family":"Seredynski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,5]]},"reference":[{"key":"398_CR1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1007\/0-387-34805-0_56","volume-title":"Advances in cryptology, proceedings of CRYPTO\u201989","author":"C Adams","year":"1990","unstructured":"Adams C, Tavares S (1990) Good S-boxes are easy to find. In: Advances in cryptology, proceedings of CRYPTO\u201989. LNCS, vol 435. Springer, Berlin, pp 612\u2013615"},{"issue":"3","key":"398_CR2","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF03037656","volume":"23","author":"JA Clark","year":"2005","unstructured":"Clark JA, Jacob JL, Stepney S (2005) The design of S-boxes by simulated annealing. New Gener Comput 23(3):219\u2013231","journal-title":"New Gener Comput"},{"key":"398_CR3","first-page":"1","volume-title":"Designing boolean functions for cryptographic applications, contributions to general algebra 12","author":"E Dowson","year":"2000","unstructured":"Dowson E, Millan W, Simpson L (2000) In: Designing boolean functions for cryptographic applications, contributions to general algebra 12. Verlag Johannes Heyn, Klagenfurt, pp 1\u201322"},{"key":"398_CR4","unstructured":"Federal Information Processing Standards Publication, FIPS PUB 46-3, DES. http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf (1999)"},{"issue":"5","key":"398_CR5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H Feistel","year":"1973","unstructured":"Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15\u201323","journal-title":"Sci Am"},{"key":"398_CR6","doi-asserted-by":"crossref","unstructured":"Millan W, Burnett L, Carter G, Clark A, Dawson E (1999) Evolutionary heuristics for finding cryptographically strong S-boxes. In: ICICS\u201999.","DOI":"10.1007\/978-3-540-47942-0_22"},{"issue":"1","key":"398_CR7","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJICA.2007.013404","volume":"1","author":"N Nedjah","year":"2007","unstructured":"Nedjah N, de Macedo Mourelle L (2007) Designing substitution boxes for secure ciphers. Int J Innov Comput Appl 1(1):86\u201391","journal-title":"Int J Innov Comput Appl"},{"key":"398_CR8","series-title":"LNCS","first-page":"478","volume-title":"ACRI\u20192008","author":"M Szaban","year":"2008","unstructured":"Szaban M, Seredynski F (2008) Cryptographically strong S-boxes based on cellular automata. In: ACRI\u20192008. LNCS, vol 5191. Springer, Berlin, pp 478\u2013485"},{"key":"398_CR9","series-title":"LNCS","first-page":"269","volume-title":"PaCT 2009","author":"M Szaban","year":"2009","unstructured":"Szaban M, Seredynski F (2009) Cellular automata-based S-boxes vs. DES S-boxes. In: PaCT 2009. LNCS, vol 5698. Springer, Berlin, pp 269\u2013283"},{"key":"398_CR10","series-title":"LNCS","first-page":"523","volume-title":"Advances in cryptology, Crypto\u201985","author":"AF Webster","year":"1986","unstructured":"Webster AF, Tavares SE (1986) On the design of S-boxes. In: Advances in cryptology, Crypto\u201985. LNCS, vol 218. Springer, Berlin, pp 523\u2013534"},{"key":"398_CR11","series-title":"LNCS","first-page":"429","volume-title":"Crypto\u201985 proceedings","author":"S Wolfram","year":"1986","unstructured":"Wolfram S (1986) Cryptography with cellular automata. In: Crypto\u201985 proceedings. LNCS, vol 218. Springer, Berlin, pp 429\u2013432"},{"key":"398_CR12","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/0020-0190(95)00156-6","volume":"56","author":"A Youssef","year":"1995","unstructured":"Youssef A, Tavares S (1995) Resistance of balanced S-boxes to linear and differential cryptanalysis. Inf Process Lett 56:249\u2013252","journal-title":"Inf Process Lett"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0398-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0398-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0398-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:24:00Z","timestamp":1559370240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0398-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,5]]},"references-count":12,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["398"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0398-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,5]]}}}