{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:25:14Z","timestamp":1730237114202,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1109\/iccta43079.2017.9497217","type":"proceedings-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T21:22:47Z","timestamp":1627680167000},"page":"50-56","source":"Crossref","is-referenced-by-count":0,"title":["Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard"],"prefix":"10.1109","author":[{"given":"Fatma","family":"Sbiaa","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Machhout","sequence":"additional","affiliation":[]},{"given":"Medien","family":"Zeghid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Advanced encryption standard (AES) Federal information processing standards publication 197","article-title":"National Institute of Standards and Technology (NIST)","year":"2001","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2015.7148425"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2012.119"},{"key":"ref14","article-title":"A novel algorithm for image encryption based on mixture of chaotic maps","author":"behnia","year":"2006","journal-title":"Chaos Solitons and Fractal"},{"key":"ref15","article-title":"Multimedia Security: A Survey of Chaos-Based Encryption Technology","author":"zhaopin","year":"0","journal-title":"School of Computer and Information Hefei University of Technology China"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1196410"},{"key":"ref17","article-title":"A New Approach for Encryption System Based on Block Cipher Algorithms and Logistic Function","author":"fatma","year":"2015","journal-title":"International Multi Conferenceo on Systems Signals and Devices"},{"key":"ref18","article-title":"NPCR and UACI Randomness Tests for Image Encryption","author":"wu","year":"2011","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04070-2_107"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680130"},{"journal-title":"A Study on the Efficiency of Differential Power Analysis on AES S-Box","year":"2007","author":"boracchi","key":"ref3"},{"key":"ref6","first-page":"196","article-title":"Implementation of Stronger AES by Using Dynamic S-Box Dependent of Master Key","volume":"53","author":"arrag","year":"2013","journal-title":"Journal of Theoretical & Applied Information Technology"},{"journal-title":"Open SystemC Initiative (OSCI) homepage","year":"0","key":"ref5"},{"key":"ref8","first-page":"193","article-title":"SystemC Design Flow for a DES\/AES CryptoProcessor","author":"castillo","year":"2004","journal-title":"In WSEAS Transactions on Information Science and Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJCAET.2012.046635"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/331-502"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126615500085"},{"key":"ref1","article-title":"Multimedia Content Encryption: Techniques and Applications","author":"lian","year":"2009","journal-title":"Taylor & Francis Group"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5121\/ijccms.2013.2203"},{"key":"ref22","article-title":"Enhancement of AES Algorithm Based on Chaotic Maps and Shift Operation for Image Encryption","volume":"71","author":"abdulgader","year":"2015","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref21","article-title":"Design of a Fast and Robust Chaos-Based CryptoSystem for image encryption","author":"noura","year":"2010","journal-title":"8th International Conference on Communications (COMM)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289152"},{"key":"ref23","article-title":"An Efficient Modified Advanced Encryption Standard (MAES) Adapted for Image Crypto-Systems","volume":"10","author":"shtewi","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/e16020770"}],"event":{"name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2017,10,28]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2017,10,30]]}},"container-title":["2017 27th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9497128\/9497137\/09497217.pdf?arnumber=9497217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T21:15:15Z","timestamp":1635282915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccta43079.2017.9497217","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]}}}