{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:42Z","timestamp":1740172902210,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T00:00:00Z","timestamp":1675468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T00:00:00Z","timestamp":1675468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00464-3","type":"journal-article","created":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T10:03:12Z","timestamp":1675504992000},"page":"213-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attacks on the simple substitution cipher with the calculation of their reliability"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7578-6923","authenticated-orcid":false,"given":"A. V.","family":"Babash","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,4]]},"reference":[{"key":"464_CR1","unstructured":"Banks., M.J.: A search-based tool for the automated cryptanalysis of classical ciphers. 5th May 2008. https:\/\/www.researchgate.net\/"},{"key":"464_CR2","unstructured":"Shneier, B.: Applied Cryptography, 2nd edn. Protocols, Algorthms, and Source Code in C (cloth). ISBN: 0471128457, Publication Date: 01\/01\/96"},{"key":"464_CR3","doi-asserted-by":"crossref","unstructured":"van Tilborg, H.C.A.: Encyclopedia of Cryptography and Security. Springer (2005)","DOI":"10.1007\/0-387-23483-7"},{"key":"464_CR4","unstructured":"Ferguson, N., Shneier, B.: Practical Cryptography (2003). rizkia.staff.telkomuniversity.ac.id"},{"key":"464_CR5","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2015","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Taylor & Francis Group LLC (2015)","edition":"2"},{"key":"464_CR6","unstructured":"van Tilborg, H.C.A.: Fundamentals of Cryptology. A Professional Reference and Interactive Tutorial. Kluwer Academic Publishers, Boston, Dordrecht, London (1999)"},{"key":"464_CR7","unstructured":"https:\/\/www.forensicfocus.com\/articles\/a-forensic-analysis-of-the-windows-registry\/"},{"key":"464_CR8","unstructured":"https:\/\/www.slideshare.net\/somutripathi\/computer-forensics-windows-registry\/"},{"key":"464_CR9","unstructured":"https:\/\/alphapedia.ru\/w\/Block_cipher\/"},{"key":"464_CR10","volume-title":"Cryptography","author":"AV Babash","year":"2002","unstructured":"Babash, A.V., Shankin, G.P.: Cryptography. Solon-Press (2002)"},{"issue":"4","key":"464_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"464_CR12","doi-asserted-by":"crossref","unstructured":"Chase, L., Rosenfeld, R., Ward, W.: Error-responsive modifications to speech recognizers: negative n-grams. In: Third International Conference on Spoken Language Processing, Yokohama (1994)","DOI":"10.21437\/ICSLP.1994-221"},{"key":"464_CR13","volume-title":"The Theory of Partitions","author":"GE Andrews","year":"1976","unstructured":"Andrews, G.E.: The Theory of Partitions. Addison-Wesley Publishing Company (1976)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00464-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00464-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00464-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T18:11:29Z","timestamp":1713463889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00464-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,4]]},"references-count":13,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["464"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00464-3","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,2,4]]},"assertion":[{"value":"16 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}