{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:51:00Z","timestamp":1767084660921,"version":"3.41.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,25]]},"DOI":"10.1109\/iscas56072.2025.11044135","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T17:42:19Z","timestamp":1751046139000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced Tower Field Mask Scheme with Affine Transformation-based Dynamic S-box"],"prefix":"10.1109","author":[{"given":"Thai-Ha","family":"Tran","sequence":"first","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan"}]},{"given":"Duc-Thuan","family":"Dam","sequence":"additional","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan"}]},{"given":"Van-Phuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Hanoi,Vietnam"}]},{"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan"}]},{"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3135324"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3400624"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348144"},{"volume-title":"Cryptography and Network Security: Principles and Practice, Global Edition","year":"2022","author":"Stallings","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3265683"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2018.8464780"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2019.2899113"},{"volume-title":"The Design of Rijndael - The Advanced Encryption Standard (AES)","year":"2020","author":"Joan","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560634"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE55644.2022.9852062"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3230372"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES45898.2019.9002543"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NEleX59773.2023.10421625"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3230141"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa069"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145990"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2757921"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2020EAL2037"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3262926"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-019-00220-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.62056\/ay4c3txol7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2957355"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-38162-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43933-3_21"},{"volume-title":"Security of Block Cipher: From Algorithm Design to Hardware Implementation","year":"2016","author":"Sakiyama","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i1.25-55"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3237957"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i4.589-613"}],"event":{"name":"2025 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2025,5,25]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,5,28]]}},"container-title":["2025 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11043142\/11042930\/11044135.pdf?arnumber=11044135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:11:57Z","timestamp":1751094717000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11044135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,25]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iscas56072.2025.11044135","relation":{},"subject":[],"published":{"date-parts":[[2025,5,25]]}}}