{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:45:42Z","timestamp":1766137542827,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/iscc50000.2020.9219737","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T21:03:51Z","timestamp":1602536631000},"page":"1-7","source":"Crossref","is-referenced-by-count":6,"title":["Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Noura","sequence":"first","affiliation":[]},{"given":"Ola","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Raphael","family":"Couturier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.17487\/rfc2104"},{"year":"2017","author":"stallings","journal-title":"Cryptography and Network Security Principles and Practice","key":"ref11"},{"key":"ref12","first-page":"585","article-title":"Simon and speck: Block ciphers for the internet of things","volume":"2015","author":"beaulieu","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/s11042-018-7000-7"},{"key":"ref14","article-title":"A new efficient lightweight and secure image cipher scheme","author":"noura","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"ref15","article-title":"Method of encryption with dynamic diffusion and confusion layers","author":"noura","year":"2016","journal-title":"wO Patent App"},{"key":"ref16","first-page":"1","article-title":"Efficient and secure cipher scheme for multimedia contents","author":"noura","year":"2018","journal-title":"Multimedia Tools and Applications"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.image.2019.08.005"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11042-018-5660-y"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/11426639_2"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.17487\/rfc4543"},{"year":"0","author":"song","journal-title":"RFC 4493 (Informational)","key":"ref3"},{"key":"ref6","article-title":"The keccak reference","author":"bertoni","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"year":"0","author":"handschuh","key":"ref5"},{"key":"ref8","article-title":"Gr&#x00F8;stl - a sha-3 candidate","author":"gauravaram","year":"2009","journal-title":"Symmetric Cryptography"},{"key":"ref7","article-title":"Sha-3 proposal blake","author":"aumasson","year":"2010","journal-title":"Submission to NIST (Round 3)"},{"year":"2009","author":"miller","journal-title":"Advanced Encryption Standard","key":"ref2"},{"key":"ref1","first-page":"7","article-title":"The principles and practice of cryptography and network security 7th edition, isbn-10: 0134444280","volume":"20","author":"stallings","year":"2017","journal-title":"Pearson Education"},{"year":"2009","author":"ferguson","article-title":"The skein hask function family","key":"ref9"},{"year":"1996","author":"menezes","journal-title":"Handbook of Applied Cryptography","key":"ref20"}],"event":{"name":"2020 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2020,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9213178\/9219543\/09219737.pdf?arnumber=9219737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:54:23Z","timestamp":1656453263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iscc50000.2020.9219737","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}