{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:52:07Z","timestamp":1729666327963,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cec.2004.1331077","type":"proceedings-article","created":{"date-parts":[[2005,1,17]],"date-time":"2005-01-17T12:47:16Z","timestamp":1105966036000},"page":"1525-1532","source":"Crossref","is-referenced-by-count":12,"title":["Multi-objective optimisation of bijective s-boxes"],"prefix":"10.1109","author":[{"given":"J.","family":"Fuller","sequence":"first","affiliation":[]},{"given":"W.","family":"Millan","sequence":"additional","affiliation":[]},{"given":"E.","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_6"},{"key":"22","article-title":"Properties of the building blocks of serpent","author":"mister","year":"2000","journal-title":"AES conference"},{"key":"17","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-45537-X_8","article-title":"A simple algebraic representation of rijndael","author":"ferguson","year":"2001","journal-title":"Proceedings of SAC'01 Workshop on Selected Areas in Cryptology"},{"journal-title":"Q Submision to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","key":"23"},{"key":"18","first-page":"267","article-title":"Algebraic attacks on block ciphers using overdefined systems of equations","author":"courtois","year":"0","journal-title":"Advances in Cryptology - Proceedings of Asiacrypt 2002"},{"journal-title":"On someAlgebraic Structures in the AES Round Function","year":"2002","author":"youssef","key":"15"},{"journal-title":"Proof Od Redundancy in Finite Field Inversion","year":"2002","author":"wagner","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-38424-3_1"},{"key":"14","first-page":"137","article-title":"Linear redundancy in s-boxes","volume":"1008","author":"fuller","year":"2003","journal-title":"Fast Software Encryption - Sweden'2003 Volume 1008 of Lecture Notes in Computer Science"},{"journal-title":"Submision to the AES Encryption Standard (AES)","year":"0","author":"serpent","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"21","article-title":"Observations on the relations between the bit-functions of many s-boxes","author":"biham","year":"2002","journal-title":"3rd NESSIE Conference"},{"journal-title":"AES proposal Rijndael","year":"0","author":"daemen","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_41"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","author":"khazad","key":"2"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","author":"anubis","key":"1"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","key":"10"},{"key":"7","first-page":"149","article-title":"The block cipher SQUARE","volume":"1267","author":"daemen","year":"1997","journal-title":"Fast Software Encryption (FSE'97) Volume 1267 of Lecture Notes in Computer Science"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","key":"6"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","key":"5"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","author":"camellia","key":"4"},{"journal-title":"Submission to the New European Schemes for Signatures Integrity and Encryption (NESSIE)","year":"0","key":"9"},{"key":"8","first-page":"99","article-title":"The cipher SHARK","volume":"1039","author":"rijmen","year":"1996","journal-title":"Fast Software Encryption '96 Volume 1039 of Lecture Notes in Computer Science"}],"event":{"name":"2004 Congress on Evolutionary Computation","acronym":"CEC-04","location":"Portland, OR, USA"},"container-title":["Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9256\/29392\/01331077.pdf?arnumber=1331077","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T16:12:42Z","timestamp":1547482362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1331077\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cec.2004.1331077","relation":{},"subject":[]}}