{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:45:10Z","timestamp":1729608310908,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icc.2017.7996731","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:39:10Z","timestamp":1501533550000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["SHIPHER: A new family of light-weight block ciphers based on dynamic operators"],"prefix":"10.1109","author":[{"given":"Xiali","family":"Hei","sequence":"first","affiliation":[]},{"given":"Binheng","family":"Song","sequence":"additional","affiliation":[]},{"given":"Caijin","family":"Ling","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","article-title":"The Salsa20 Family of Stream Ciphers","author":"bernstein","year":"2008","journal-title":"New Stream Cipher Designs-The ESTREAM Finalists Ser Lecture Notes in Computer Science"},{"key":"ref31","article-title":"TRIVIUM Specifications","author":"canniere","year":"2005","journal-title":"ECRYPT Stream Cipher Project Report 2005\/030"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_14"},{"key":"ref10","first-page":"272","author":"canni\u00e8re","year":"2009","journal-title":"KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers"},{"key":"ref11","first-page":"1","article-title":"KLEIN: a new family of lightweight block ciphers","author":"gong","year":"2011","journal-title":"RFIDsec '11 Workshop Proceedings Cryptology and Information Security Series"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_41"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_12"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","article-title":"A Statistical Saturation Attack against the Block Cipher PRESENT","volume":"5473","author":"collard","year":"2009","journal-title":"Topics in Cryptology - CT-RSA 2009"},{"key":"ref15","first-page":"104","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems","author":"kocher","year":"1996","journal-title":"Proc Crypto 96"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2013-0025"},{"key":"ref17","first-page":"554","article-title":"Key-dependent s-box in lightweight block ciphers","volume":"62","author":"aldabbagh","year":"2014","journal-title":"J of Theoretical and Applied Information Technology"},{"key":"ref18","article-title":"A proposal for a key-dependent AES","author":"fahmy","year":"2005","journal-title":"Proc of 3rd International Conference Sceiences of Electronic Technologies of Information and Telecommunications Tunisia"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_22"},{"key":"ref28","article-title":"The Hummingbird-2 lightweight authenticated encryption algorithm","author":"engels","year":"2011","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref4","article-title":"SHipher: Families of Block Ciphers based on SubSet-Sum Problem","volume":"103","author":"hei","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"PRESENT: An Ultra-Lightweight Block Cipher","author":"bogdanov","year":"2007","journal-title":"CHES 2007 Lecture Notes Comput Sci"},{"key":"ref3","first-page":"64","article-title":"An enhancement in international data encryption algorithm for increasing security","volume":"3","author":"patil","year":"2014","journal-title":"Intl J of Application or Innovation in Engineering & Management"},{"key":"ref6","first-page":"15","volume":"1556","author":"harris","year":"1999","journal-title":"Key-dependent S-Box Manipulations"},{"key":"ref29","article-title":"The SIMON and SPECK Families of Lightweight Block Ciphers","author":"beaulieu","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"journal-title":"Twofish A 128-bit block cipher","year":"0","author":"schneier","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/5.4440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"journal-title":"A 128-bit block cipher based on three group arithmetics","year":"0","author":"su","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","author":"daemen","year":"2002","journal-title":"The design of Rijndeal"},{"key":"ref1","first-page":"389","author":"lai","year":"1990","journal-title":"EuroCrypt 1990"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_28"},{"key":"ref22","first-page":"1","article-title":"SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm","author":"massey","year":"1993","journal-title":"Proc Fast Softw Encrypt"},{"key":"ref21","first-page":"91","article-title":"New Dynamical Key Dependent S-Box based on chaotic maps","volume":"17","author":"lumal","year":"2015","journal-title":"IOSR Journal of Computer Engineering (IOSRJCE)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118491858746"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052335"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_2"},{"journal-title":"A new DNA based appoach of generating key-depedent shiftrows transformation","year":"0","author":"al-wattar","key":"ref25"}],"event":{"name":"ICC 2017 - 2017 IEEE International Conference on Communications","start":{"date-parts":[[2017,5,21]]},"location":"Paris, France","end":{"date-parts":[[2017,5,25]]}},"container-title":["2017 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7985734\/7996317\/07996731.pdf?arnumber=7996731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T21:27:25Z","timestamp":1569965245000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7996731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icc.2017.7996731","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}