{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:14:03Z","timestamp":1725729243450},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T00:00:00Z","timestamp":1704672000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,8]]},"DOI":"10.1109\/ccwc60891.2024.10427812","type":"proceedings-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T18:35:29Z","timestamp":1707849329000},"page":"0428-0434","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Polymorphic Algorithms and Their Use in Cryptography"],"prefix":"10.1109","author":[{"given":"Mandeep","family":"Singh","sequence":"first","affiliation":[{"name":"Santa Clara University,Computer Science &amp; Engineering Department,Santa Clara,CA,USA"}]},{"given":"Albert","family":"Carlson","sequence":"additional","affiliation":[{"name":"Austin Community College,Chair for Entropy and Encryption, Quantum Security Alliance &amp; Computer Science Department,Austin,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC54266.2021.9732571"},{"key":"ref2","article-title":"Polymorphic hardware engine","volume-title":"patent number","author":"Carlson","year":"2015"},{"key":"ref3","article-title":"Secret signal system","volume-title":"patent number","author":"Vernam","year":"1977"},{"volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C.","year":"1996","author":"Schneier","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT54827.2022.9984325"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40657-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.2326-1951.1999.tb03700.x"},{"volume-title":"Quantum computers won\u2019t break rsa encryption any time soon","author":"Chirgwin","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC55209.2022.9851755"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.12987\/9780300129878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC55209.2022.9851716"},{"key":"ref13","article-title":"Set Theoretic Estimation Applied to the Information Content of Ciphers and Decryption","volume-title":"PhD thesis","author":"Carlson","year":"2012"},{"article-title":"Polymorphic one time pad matrix","volume-title":"patent number","author":"Carlson","key":"ref14"},{"volume-title":"A First Course in Probability.","year":"1976","author":"Ross","key":"ref15"},{"volume-title":"An Introduction to Statistical Methods and Data Analysis","year":"2016","author":"Ott","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/iemcon53756.2021.9623158"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON53756.2021.9623135"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2011.6072867"},{"volume-title":"Applied Coding and Information Theory.","year":"1999","author":"Wells","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/uemcon53757.2021.9666530"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref24","article-title":"An anti-counterfeiting concept for currency systems","author":"Bauder","year":"1983","journal-title":"Technical report, Sandia National Labs, Albuquerque, NM"},{"volume-title":"Physically Unclonable Functions, From Basic Principles to Advanced Hardware Security Applications.","author":"Halak","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SAI.2017.8252190"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/047174882X"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS48785.2022.9937489"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC58260.2023.10323635"},{"journal-title":"ZDNet International.","article-title":"Start-up generates random numbers from space","author":"Goodwins","key":"ref30"},{"journal-title":"Wired Magazine.","article-title":"Totally random","author":"McNichol","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1201\/9780203733813"},{"volume-title":"Think Complexity.","author":"Downey","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319408"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69710-1_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527028"},{"journal-title":"Technical report, Quantum Security Alliance","article-title":"Nist quantum proof algorithm analysis","author":"Carlson","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s20154212"},{"journal-title":"Two factor hash verification (tfhv): A novel paradigm for remote authentication","author":"Brwon","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18075-1_3"},{"key":"ref42","article-title":"Novel innovations for improving the quality of strong prngs","author":"Williams","year":"2022","journal-title":"13th ICCCNT"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924431"}],"event":{"name":"2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2024,1,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2024,1,10]]}},"container-title":["2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426790\/10427556\/10427812.pdf?arnumber=10427812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:39:56Z","timestamp":1709458796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,8]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ccwc60891.2024.10427812","relation":{},"subject":[],"published":{"date-parts":[[2024,1,8]]}}}