{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:30:19Z","timestamp":1730205019189,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/cec.2008.4631226","type":"proceedings-article","created":{"date-parts":[[2008,9,26]],"date-time":"2008-09-26T11:17:53Z","timestamp":1222427873000},"page":"3162-3166","source":"Crossref","is-referenced-by-count":0,"title":["Fast symmetric keys generation via mutual mirroring process"],"prefix":"10.1109","author":[{"family":"Chun-Shun Tseng","sequence":"first","affiliation":[]},{"family":"Ya-Yun Jheng","sequence":"additional","affiliation":[]},{"family":"Sih-Yin Shen","sequence":"additional","affiliation":[]},{"family":"Jung-Hua Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2002.1188715"},{"journal-title":"Security in Computing","year":"1997","author":"pfleeger","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2005\/01\/P01009"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"journal-title":"Fundamentals of Cryptology","year":"2000","author":"van tilborg","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/5.4442"},{"journal-title":"An Overview of Cryptography","year":"0","author":"gary","key":"2"},{"journal-title":"Cryptography Theory and Practice","year":"0","author":"stinson","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055927"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.234140"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056752"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1979.6368157"},{"journal-title":"Applied Cryptography - Protocols Algorithms and Source Code","year":"1996","author":"schneier","key":"4"},{"key":"9","first-page":"417","article-title":"use of elliptic curves in cryptology","volume":"85","author":"miller","year":"1978","journal-title":"Crypto"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"}],"event":{"name":"2008 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2008,6,1]]},"location":"Hong Kong, China","end":{"date-parts":[[2008,6,6]]}},"container-title":["2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4625778\/4630767\/04631226.pdf?arnumber=4631226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:45:27Z","timestamp":1489751127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4631226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cec.2008.4631226","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}