{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:10:49Z","timestamp":1773468649643,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,16]]},"DOI":"10.1109\/iccp68926.2025.11427129","type":"proceedings-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T19:51:37Z","timestamp":1773431497000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["CS-ECC: Chaotic S-box based Elliptic Curve Cryptosystem"],"prefix":"10.1109","author":[{"given":"Ionut-Eduard","family":"Matei","sequence":"first","affiliation":[{"name":"West University of Timisoara,Computer Science Department,Timisoara,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-018-9298-8"},{"key":"ref2","article-title":"Advanced Encryption Standard (AES)","year":"2001","journal-title":"National Institute of Standards and Technology (U.S.)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_94"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12791-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.02.049"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2906292"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s41939-019-00049-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105821"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105816"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-05413-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2970806"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102505"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09648-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3282160"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X23401072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2023.102620"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.104140"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-95511-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27739-9_245-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0196-8858(86)90023-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44828-4_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1987-0866109-5"},{"key":"ref29","article-title":"Digital Signature Standard (DSS)","year":"2023","journal-title":"National Institute of Standards and Technology (U.S.)"},{"key":"ref30","volume-title":"USC-SIPI Image Database","year":"2025"},{"key":"ref31","article-title":"Recommendations for discrete logarithm-based cryptography","author":"Moody","journal-title":"National Institute of Standards and Technology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1978-0491431-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"}],"event":{"name":"2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)","location":"Cluj-Napoca, Romania","start":{"date-parts":[[2025,10,16]]},"end":{"date-parts":[[2025,10,18]]}},"container-title":["2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11427093\/11427059\/11427129.pdf?arnumber=11427129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:27:39Z","timestamp":1773466059000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11427129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iccp68926.2025.11427129","relation":{},"subject":[],"published":{"date-parts":[[2025,10,16]]}}}