{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:44:27Z","timestamp":1729640667487,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754985","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T22:14:57Z","timestamp":1394230497000},"page":"000436-000440","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of the Toorani-Falahati Hill Ciphers"],"prefix":"10.1109","author":[{"given":"Liam","family":"Keliher","sequence":"first","affiliation":[]},{"given":"Anthony Z.","family":"Delaney","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Indroduction to Algorithms","year":"2009","author":"cormen","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110591893771"},{"journal-title":"Linear Algebra A Modern Introduction","year":"2011","author":"poole","key":"14"},{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"11"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"12"},{"key":"3","first-page":"27","article-title":"A block cipher involving a key applied on both sides of the plain text","volume":"1","author":"sastry","year":"2009","journal-title":"International Journal of Computer and Network Security"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2011","author":"stallings","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.137"},{"key":"1","doi-asserted-by":"crossref","first-page":"306","DOI":"10.2307\/2298294","article-title":"Cryptography in an algebraic alphabet","volume":"36","author":"hill","year":"1929","journal-title":"American Mathematical Monthly"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.2006.A2022"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2004.9670922"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/01611190008984253"},{"key":"4","first-page":"122","article-title":"Cryptanalysis of a modified Hill Cipher","volume":"2","author":"keliher","year":"2010","journal-title":"International Journal of Computer and Network Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2009.5202241"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.A0720102"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754985.pdf?arnumber=6754985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:15:13Z","timestamp":1498122913000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754985","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}