{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:01:17Z","timestamp":1729638077905,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1109\/ccwc.2018.8301643","type":"proceedings-article","created":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T17:14:26Z","timestamp":1520270066000},"page":"444-449","source":"Crossref","is-referenced-by-count":6,"title":["A generalized methodology for designing non-linear elements in symmetric cryptographic primitives"],"prefix":"10.1109","author":[{"given":"Chuck","family":"Easttom","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2478\/v10065-011-0009-4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2035-3_64"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"23","DOI":"10.15388\/Informatica.2009.235","article-title":"Key-dependent S-box generation in AES block cipher system","volume":"20","author":"kazlauskas","year":"2009","journal-title":"Informatica"},{"key":"ref13","first-page":"91","article-title":"New Dynamical Key Dependent S-Box based on Chaotic Maps","volume":"17","author":"luma","year":"2015","journal-title":"IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN"},{"key":"ref14","first-page":"92","article-title":"Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security","author":"jacob","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17781\/P001985"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","author":"katz","year":"2014","journal-title":"Introduction to Modern Cryptography"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_8"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2010","author":"stallings","key":"ref18"},{"journal-title":"Modern Cryptography Theory and Practice","year":"2011","author":"mao","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9781119226079"},{"journal-title":"Crypto Archeology Unearthing Design Methodologies of DES S-Boxes","year":"2017","author":"dey","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0987-4"},{"key":"ref6"},{"journal-title":"Modern Cryptography","year":"2015","author":"easttom","key":"ref5"},{"key":"ref8","first-page":"290","article-title":"Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria","author":"kishan","year":"2003","journal-title":"Progress in Cryptology-INDOCRYPT 2003 Lecture Notes in Comput Sci"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11464-016-0518-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54525-2_48"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_56"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1007\/s11071-016-3099-0","article-title":"A novel approach for strong S-Box generation algorithm design based on chaotic scaled Zhongtang system","volume":"87","author":"\u00e7avu?ogl?","year":"2017","journal-title":"Nonlinear Dynamics"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_1"},{"journal-title":"A Specification for Rijndael the AES Algorithm","year":"2003","author":"daemen","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1201\/9780429246609","author":"stanoyavich","year":"2010","journal-title":"Introduction to cryptography with mathematical foundations and computer implementations"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.62.1439"},{"key":"ref23","article-title":"Random S-Box Generation in AES by changing Irreducible polynomial","author":"das","year":"2013","journal-title":"Meghnad Saha Institute of Technology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1169456"},{"key":"ref25","article-title":"An Improved AES S-Box and Its Performance Analysis","volume":"7","author":"cui","year":"2011","journal-title":"International Journal of Innovative Computing Information and Control"}],"event":{"name":"2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2018,1,8]]},"location":"Las Vegas, NV","end":{"date-parts":[[2018,1,10]]}},"container-title":["2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8293728\/8301613\/08301643.pdf?arnumber=8301643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T20:17:05Z","timestamp":1603916225000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8301643\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ccwc.2018.8301643","relation":{},"subject":[],"published":{"date-parts":[[2018,1]]}}}