{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:22:26Z","timestamp":1730272946633,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iscisc.2017.8488373","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T22:31:28Z","timestamp":1539297088000},"page":"64-69","source":"Crossref","is-referenced-by-count":0,"title":["A New Approach to Key Schedule Designing"],"prefix":"10.1109","author":[{"given":"Seyed Reza Hoseini","family":"Najarkolaei","sequence":"first","affiliation":[]},{"given":"Siavash","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Aref","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"TWINE: A Lightweight Block Cipher for Multiple Platforms.","author":"suzaki","year":"2012","journal-title":"Selected Areas in Cryptography"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21554-4_19","article-title":"LBlock: a lightweight block cipher","author":"wu","year":"2011","journal-title":"International Conference on Applied Cryptography and Network Security"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-71039-4_7","article-title":"A meet-in-the-middle attack on 8-round AES","author":"demirci","year":"2008","journal-title":"Fast Software Encryption Third International Workshop"},{"key":"ref6","article-title":"Linear cryptanalysis method for DES cipher","author":"matsui","year":"1993","journal-title":"Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736450"},{"key":"ref5","article-title":"Piccolo: an ultra-lightweight blockcipher","author":"shibutani","year":"2011","journal-title":"International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref12","volume":"2","author":"west","year":"2001","journal-title":"Introduction to Graph Theory"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736453"},{"key":"ref7","article-title":"Improved differential attacks on RC5","author":"knudsen","year":"1996","journal-title":"Adv Cryptology"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2013","author":"daemen","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_583"},{"journal-title":"National Bureau of Standards U S Department of Commerce","article-title":"Federal information processing standards publication 46","year":"1977","key":"ref1"}],"event":{"name":"2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2017,9,6]]},"location":"Shiraz","end":{"date-parts":[[2017,9,7]]}},"container-title":["2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8472118\/8488334\/08488373.pdf?arnumber=8488373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:09:58Z","timestamp":1643224198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8488373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2017.8488373","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}