{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:13:25Z","timestamp":1730225605632,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/i2mtc.2014.6860905","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T17:02:35Z","timestamp":1406653355000},"page":"1065-1068","source":"Crossref","is-referenced-by-count":0,"title":["CRYSEED: An automatic 8-bit cryptographic algorithm developed with genetic programming"],"prefix":"10.1109","author":[{"given":"Rodrigo S.","family":"Semente","sequence":"first","affiliation":[]},{"given":"Andres O.","family":"Salazar","sequence":"additional","affiliation":[]},{"given":"Felipe D.M.","family":"Oliveira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The lil-gp genetic programming system","year":"1998","author":"punch","key":"17"},{"journal-title":"Ilena bmp","year":"2009","author":"bittencourt","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2007.4287293"},{"key":"16","first-page":"241","article-title":"Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms","volume":"5","author":"el-fishawy","year":"2007","journal-title":"International Journal of Network Security"},{"journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection","year":"1998","author":"koza","key":"13"},{"key":"14","article-title":"Efficiency analysis and security evaluation of image encryption schemes","volume":"12","author":"ahmad","year":"2012","journal-title":"International Journal of Video & Image Processing and Network Security"},{"key":"11","first-page":"1496","article-title":"On evolutionary computation methods in cryptography","author":"picek","year":"2011","journal-title":"MIPRO 2011 Proceedings of the 34th International Convention"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"journal-title":"IEEE Standard 802 15 4","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2008.4577681"},{"key":"1","article-title":"Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers","author":"rinne","year":"2007","journal-title":"Software Performance Enhancement for Encryption and Decryption"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0150608"},{"key":"7","first-page":"3","article-title":"Automated design of a lightweight block cipher with genetic programming","volume":"11","author":"polimo?n","year":"2007","journal-title":"International Journal of Knowledge-based and Intelligent Engineering Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688308"},{"key":"5","article-title":"Cryptanalysis of the full AES using GPU-like special-purpose hardware","author":"biryukov","year":"2010","journal-title":"Fundamenta Informaticae-Cryptology in Progress 10th Central European Conference on Cryptology Bedlewo Poland"},{"key":"4","article-title":"Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds","author":"biryukov","year":"2008","journal-title":"Proc 10th Annu Int Conf Theory Appl Cryptographic Techniques EUROCRYPT"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICHIT.2006.253509"},{"key":"8","first-page":"1485","article-title":"Automated design of cryptographic hash schemes by evolving highly-nonlinear functions","volume":"24","author":"estevez-tapiador","year":"2008","journal-title":"Journal of Information Science and Engineering"}],"event":{"name":"2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)","start":{"date-parts":[[2014,5,12]]},"location":"Montevideo, Uruguay","end":{"date-parts":[[2014,5,15]]}},"container-title":["2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6845396\/6860504\/06860905.pdf?arnumber=6860905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T14:44:32Z","timestamp":1490280272000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6860905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/i2mtc.2014.6860905","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}