{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:35:20Z","timestamp":1729658120026,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/icitst.2014.7038845","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T14:51:14Z","timestamp":1424184674000},"page":"402-408","source":"Crossref","is-referenced-by-count":6,"title":["Advanced encryption standard development based quantum key distribution"],"prefix":"10.1109","author":[{"given":"Omer K. Jasim","family":"Mohammad","sequence":"first","affiliation":[]},{"given":"Safia","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Horbaty","sequence":"additional","affiliation":[]},{"given":"Abdel-Badeeh M.","family":"Salem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"45","article-title":"Statistical analysis for random bits generation on quantum key distribution","author":"omer","year":"2014","journal-title":"International Conference on Cyber Security Cyber Warfare and Digital Forensic (CyberSec"},{"key":"22","first-page":"477","article-title":"Q Phone: A Quantum Security","author":"bo","year":"2013","journal-title":"VOIP Phone SIGCOMM'13"},{"key":"17","first-page":"243","article-title":"An invention of quantum cryptography over the classical cryptography for enhancing security","volume":"2","author":"payal","year":"2013","journal-title":"International Journal of Applied or Innovation in Engineering and Management"},{"key":"18","first-page":"20","article-title":"Quantum cryptography in practice","volume":"3","author":"chip","year":"2003","journal-title":"International Journal of Theoretical Security"},{"key":"15","article-title":"Enhancing aes s-box generation based on a round key","volume":"1","author":"julia","year":"2012","journal-title":"International Journal of Cyber-security and Digital Forensics"},{"key":"16","first-page":"57","article-title":"Analysis of aes algorithm using symmetric cryptography","volume":"1","author":"amit","year":"2012","journal-title":"Int J Comput Netw Commun"},{"key":"13","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/11927587_12","article-title":"A simpler sieving device: Combining ecm and twirl","volume":"4296","author":"geiselmann","year":"2007","journal-title":"Information Security and Cryptology - ICISC 2006 Lecture Notes in Computer Science"},{"key":"14","first-page":"166","article-title":"Cryptanalysis of modern cryptographic algorithms","volume":"1","author":"neetu","year":"2010","journal-title":"International Journal of Computer Science and Telecommunications"},{"key":"11","first-page":"21","article-title":"Cryptanalysis of 7- round aes-128","volume":"10","author":"hadi","year":"2013","journal-title":"International Journal of Computer Application"},{"key":"12","first-page":"322","article-title":"Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to aes","volume":"6610","author":"biryukov","year":"2010","journal-title":"Advances in Cryptology-CRYPTO 2010 Lecture Notes in Computer Science"},{"key":"21","first-page":"20","article-title":"A revolutionary security technology","volume":"3","author":"michael","year":"2012","journal-title":"ISSA Journal"},{"key":"3","first-page":"19","article-title":"Using a cipher key to generate dynamic s-box in aes cipher system","volume":"6","author":"rose","year":"2012","journal-title":"International Journal of Computer Science and Security"},{"key":"20","first-page":"187","article-title":"A new accurate quantum cryptography control error reconciliation (qccer) with xor operator in bb84 protocol","volume":"2","author":"arias","year":"2008","journal-title":"ICIC Express Letters"},{"key":"2","first-page":"17","article-title":"Enhancement the security of aes against modern attacks by using variable key block cipher","volume":"3","author":"shaaban","year":"2013","journal-title":"International Arab Journal of E-Technology"},{"key":"1","first-page":"23","volume":"20","author":"kazys","year":"2012","journal-title":"Key-dependent S-box Generation in AES Block Cipher System"},{"key":"10","first-page":"131","article-title":"The billion-mulmod-per-second pc","author":"bernstein","year":"2009","journal-title":"SHARCS - Special-purpose Hardware for Attacking Cryptographic Systems"},{"journal-title":"AES Seems Weak Linear Time Secure Cryptography \"","year":"2014","author":"warren","key":"7"},{"key":"6","volume":"22","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard (Information Security and Cryptography)"},{"key":"5","first-page":"368","article-title":"Generation and testing of random numbers for cryptographic application","volume":"13","author":"kinga","year":"2012","journal-title":"Proceedings of the Romanian Academy"},{"key":"4","first-page":"61","article-title":"Secure communication using 512 bit key","volume":"52","author":"sekar","year":"2012","journal-title":"European Journal of Scientific Research"},{"key":"9","first-page":"221","article-title":"Cryptanalysis of the full aes using gpu-like special-purpose hardware","volume":"114","author":"alex","year":"2012","journal-title":"Journal Fundamental Informatics - Cryptology in Progress 10th Central European Conference on Cryptology"},{"key":"8","first-page":"330","author":"stallings","year":"2012","journal-title":"Cryptography and Network Security Principles and Practice"}],"event":{"name":"2014 9th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2014,12,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2014,12,10]]}},"container-title":["The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7018215\/7038754\/07038845.pdf?arnumber=7038845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:43:57Z","timestamp":1498182237000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7038845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icitst.2014.7038845","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}