{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:33:52Z","timestamp":1768462432164,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3081792","type":"journal-article","created":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T20:50:20Z","timestamp":1621457420000},"page":"76518-76530","source":"Crossref","is-referenced-by-count":22,"title":["Improved Twofish Algorithm: A Digital Image Enciphering Application"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0417-019X","authenticated-orcid":false,"given":"Tanveer Ul","family":"Haq","sequence":"first","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6587-1638","authenticated-orcid":false,"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0291-3287","authenticated-orcid":false,"given":"Ghazanfar Farooq","family":"Siddiqui","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-6821","authenticated-orcid":false,"given":"Muhammad Zafar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Quaid-i-Azam University, Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1252-260X","authenticated-orcid":false,"given":"Ibrahim A.","family":"Hameed","sequence":"additional","affiliation":[{"name":"Department of ICT and Natural Sciences, Norwegian University of Science and Technology, &#x00C5;lesund, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1097-4821","authenticated-orcid":false,"given":"Huma","family":"Jamil","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s40314-015-0265-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.12.043"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-006-9034-5"},{"key":"ref14","first-page":"1","article-title":"The Twofish team&#x2019;s final comments on AES selection","volume":"2","author":"schneier","year":"2000","journal-title":"AES Round"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028315"},{"key":"ref11","first-page":"523","article-title":"On the design of S-boxes","author":"webster","year":"1985","journal-title":"Proc Conf Appl Cryptograph Techn"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164922"},{"key":"ref2","first-page":"643","article-title":"A RSA-based efficient dynamic secure algorithm for ensuring data security","author":"mondal","year":"2020","journal-title":"Proc Int Joint Conf Comput Intell"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978083"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3305160.3305179"},{"key":"ref16","first-page":"72","article-title":"Cyclic codes of arbitrary length over Fq+ uFq + $\\text{u}^{2}\\text{F}_{q}$\n+$\\ldots$\n+$\\text{u}^{k-1}\\text{F}_{q}$","volume":"2","author":"al-ashker","year":"2013","journal-title":"Palest J Math"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02878-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3046-0"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-019-00689-w"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102592"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CAS47993.2019.9075747"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CAS47993.2019.9075747"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/3594534"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2018916654"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909554"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2185227"},{"key":"ref8","first-page":"434","article-title":"On the F-function of FEAL","author":"fumy","year":"1987","journal-title":"Proc Conf Theory Appl Cryptograph Techn"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.10005"},{"key":"ref9","first-page":"293","article-title":"Cryptanalysis of FEAL","author":"den boer","year":"1988","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA49400.2020.9022829"},{"key":"ref3","first-page":"124","article-title":"Secure communication for messaging using AES or DES","volume":"31","author":"kishore","year":"2020","journal-title":"Purakala UGC Care Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09435417.pdf?arnumber=9435417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T20:55:48Z","timestamp":1690318548000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9435417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3081792","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}