{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:09:53Z","timestamp":1750392593081,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319608150"},{"type":"electronic","value":"9783319608167"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60816-7_37","type":"book-chapter","created":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T05:42:40Z","timestamp":1497937360000},"page":"305-312","source":"Crossref","is-referenced-by-count":2,"title":["Cryfa: A Tool to Compact and Encrypt FASTA Files"],"prefix":"10.1007","author":[{"given":"Diogo","family":"Pratas","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Hosseini","sequence":"additional","affiliation":[]},{"given":"Armando J.","family":"Pinho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,21]]},"reference":[{"issue":"3","key":"37_CR1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.tig.2007.12.007","volume":"24","author":"ER Mardis","year":"2008","unstructured":"Mardis, E.R.: The impact of next-generation sequencing technology on genetics. Trends Genet. 24(3), 133\u2013141 (2008)","journal-title":"Trends Genet."},{"key":"37_CR2","doi-asserted-by":"crossref","first-page":"6","DOI":"10.4103\/2153-3539.175793","volume":"7","author":"A Schlosberg","year":"2016","unstructured":"Schlosberg, A.: Data security in genomics: a review of australian privacy requirements and their relation to cryptography in data storage. J. Pathol. Inform. 7, 6 (2016)","journal-title":"J. Pathol. Inform."},{"issue":"19","key":"37_CR3","doi-asserted-by":"crossref","first-page":"2527","DOI":"10.1093\/bioinformatics\/bts467","volume":"28","author":"MH Mohammed","year":"2012","unstructured":"Mohammed, M.H., Dutta, A., Bose, T., Chadaram, S., Mande, S.S.: DELIMINATE - a fast and efficient method for loss-less compression of genomic sequences. Bioinformatics 28(19), 2527\u20132529 (2012)","journal-title":"Bioinformatics"},{"issue":"4","key":"37_CR4","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1007\/s12038-012-9230-6","volume":"37","author":"T Bose","year":"2012","unstructured":"Bose, T., Mohammed, M.H., Dutta, A., Mande, S.S.: BIND-an algorithm for loss-less compression of nucleotide sequence data. J. Biosci. 37(4), 785\u2013789 (2012)","journal-title":"J. Biosci."},{"key":"37_CR5","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1093\/bioinformatics\/btt594","volume":"30","author":"AJ Pinho","year":"2013","unstructured":"Pinho, A.J., Pratas, D.: MFCompress: a compression tool for fasta and multi-fasta data. Bioinformatics 30, 117\u2013118 (2013)","journal-title":"Bioinformatics"},{"issue":"1","key":"37_CR6","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1186\/s12859-015-0709-7","volume":"16","author":"G Benoit","year":"2015","unstructured":"Benoit, G., Lemaitre, C., Lavenier, D., Drezen, E., Dayris, T., Uricaru, R., Rizk, G.: Reference-free compression of high throughput sequencing data with a probabilistic de bruijn graph. BMC Bioinformatics 16(1), 288 (2015)","journal-title":"BMC Bioinformatics"},{"issue":"1","key":"37_CR7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1186\/s12859-016-0932-x","volume":"17","author":"M Kim","year":"2016","unstructured":"Kim, M., Zhang, X., Ligo, J.G., Farnoud, F., Veeravalli, V.V., Milenkovic, O.: MetaCRAM: an integrated pipeline for metagenomic taxonomy identification and compression. BMC Bioinformatics 17(1), 94 (2016)","journal-title":"BMC Bioinformatics"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Cao, M.D., Dix, T.I., Allison, L., Mears, C.: A simple statistical algorithm for biological sequence compression. In: Proceedings of the Data Compression Conference, DCC-2007, Snowbird, Utah, pp. 43\u201352, March 2007","DOI":"10.1109\/DCC.2007.7"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Pratas, D., Pinho, A.J., Ferreira, P.: Efficient compression of genomic sequences. In: Proceedings of the Data Compression Conference, DCC-2016, Snowbird, Utah, pp. 231\u2013240, March 2016","DOI":"10.1109\/DCC.2016.60"},{"issue":"4","key":"37_CR10","doi-asserted-by":"crossref","first-page":"56","DOI":"10.3390\/info7040056","volume":"7","author":"M Hosseini","year":"2016","unstructured":"Hosseini, M., Pratas, D., Pinho, A.J.: A survey on data compression methods for biological sequences. Information 7(4), 56 (2016)","journal-title":"Information"},{"key":"37_CR11","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael. EC (1999)"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"A Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D., Nikoli\u0107, I.: Distinguisher and related-key attack on the full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 231\u2013249. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03356-8_14"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Ashokkumar, C., Giri, R.P., Menezes, B.: Highly efficient algorithms for AES key retrieval in cache access attacks. In: IEEE European Symposium on Security and Privacy (EuroS&P), 261\u2013275. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.29"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Gullasch, D., Bangerter, E., Krenn, S.: Cache games-bringing access-based cache attacks on AES to practice. In: IEEE Symposium on Security and Privacy, pp. 490\u2013505. IEEE (2011)","DOI":"10.1109\/SP.2011.22"},{"issue":"2","key":"37_CR15","first-page":"15","volume":"8","author":"VK Keerthi","year":"2016","unstructured":"Keerthi, V.K., et al.: Taxonomy of SSL\/TLS attacks. Int. J. Comput. Netw. Inf. Secur. 8(2), 15 (2016)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"37_CR16","first-page":"49","volume":"2013","author":"C Meyer","year":"2013","unstructured":"Meyer, C., Schwenk, J.: Lessons learned from previous SSL\/TLS attacks-a brief chronology of attacks and weaknesses. IACR Cryptology ePrint Archive 2013, 49 (2013)","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"7","key":"37_CR17","doi-asserted-by":"crossref","first-page":"e1001091","DOI":"10.1371\/journal.pbio.1001091","volume":"9","author":"D Church","year":"2011","unstructured":"Church, D., Deanna, M., Schneider, V., et al.: Modernizing reference genome assemblies. PLoS Biol. 9(7), e1001091 (2011)","journal-title":"PLoS Biol."},{"issue":"11","key":"37_CR18","doi-asserted-by":"crossref","first-page":"7002","DOI":"10.1109\/TIT.2012.2207880","volume":"58","author":"C Bouillaguet","year":"2012","unstructured":"Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P.A., Keller, N., Rijmen, V.: Low-data complexity attacks on aes. IEEE Trans. Inf. Theory 58(11), 7002\u20137017 (2012)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Advances in Intelligent Systems and Computing","11th International Conference on Practical Applications of Computational Biology &amp; Bioinformatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60816-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T20:03:29Z","timestamp":1750363409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60816-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319608150","9783319608167"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60816-7_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}