{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:13:56Z","timestamp":1730240036329,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,25]]},"DOI":"10.1109\/icecet61485.2024.10698226","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:33:15Z","timestamp":1728408795000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["The Advanced Encryption Standard with a Dynamic S-Box Using the RC4 Key Schedule"],"prefix":"10.1109","author":[{"given":"Abdelrahman","family":"Altigani","sequence":"first","affiliation":[{"name":"Higher Colleges of Technology,Computer Information Science,Al Ain,UAE"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Rukunuddin","family":"Ghalib","sequence":"additional","affiliation":[{"name":"School of Engineering &#x0026; Computing, De Monfort University,Dubai,UAE"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huwaida T.","family":"Elshoush","sequence":"additional","affiliation":[{"name":"University of Khartoum,Faculty of Mathematical Sciences and Informatics,Computer Science Department,Khartoum,Sudan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muawia A.","family":"Elsadig","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Technology, Imam Abdulrahman bin Faisal University,Dammam,KSA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nashat","family":"Alrefai","sequence":"additional","affiliation":[{"name":"College of Science, Imam Abdulrahman Bin Faisal University, Basic and Applied Scientific Research Center, Imam Abdulrahman Bin Faisal University,Department of Mathematics,Dammam,KSA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shiraz","family":"Naserelden","sequence":"additional","affiliation":[{"name":"Faculty of Science, Universiti Teknologi Malaysia,Department of Mathematical Sciences,Johor,Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.111847"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7176\/ceis\/14-2-03"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/9781003360889-15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i3.4039"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4491217"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v13i2.pp1708-1723"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1117\/12.2662564"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/ATDE221268"},{"issue":"3","key":"ref9","first-page":"360","article-title":"The need for polymorphic encryption algorithms: A review paper","volume":"98","author":"Altigani","year":"2020","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCEEE.2018.8515761"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051556"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3346319"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.11591\/eei.v12i3.4824"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/acd1c3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.037516"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2017.04.022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3352411.3352429"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.03.013"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/app13127168"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/e25081178"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/e25101399"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-41082-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2023.171253"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/sym15020409"},{"journal-title":"Evaluating AES Performance Using NIST Recommended Block Cipher Modes of Operation","year":"2015","author":"Altigani","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i28\/97795"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA58933.2023.10392143"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_358"},{"key":"ref29","article-title":"Security analysis of KNOT-AEAD and KNOT -Hash","volume-title":"NIST Lightweight Cryptography Workshop","volume":"368","author":"Zhang","year":"2020"},{"key":"ref30","article-title":"Key dependency of differentials: Experiments in the differential cryptanalysis of block ciphers using small S-boxes","author":"Heys","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref31","article-title":"MULTI-SHAPE SYMMETRIC ENCRYPTION MECHANISM FOR NON-GENERIC ATTACKS MITIGATION","author":"Abdelgader","year":"2022","journal-title":"Universiti Teknologi Malaysia"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2024-0002"}],"event":{"name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET)","start":{"date-parts":[[2024,7,25]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,7,27]]}},"container-title":["2024 International Conference on Electrical, Computer and Energy Technologies (ICECET"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10697983\/10697986\/10698226.pdf?arnumber=10698226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:58:09Z","timestamp":1728453489000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10698226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icecet61485.2024.10698226","relation":{},"subject":[],"published":{"date-parts":[[2024,7,25]]}}}