{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:35:55Z","timestamp":1729665355576,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/percomw.2013.6529543","type":"proceedings-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T20:26:40Z","timestamp":1373574400000},"page":"470-474","source":"Crossref","is-referenced-by-count":1,"title":["Symmetric-key encryption scheme based on the strong generating sets of permutation groups"],"prefix":"10.1109","author":[{"given":"Ara","family":"Alexanyan","sequence":"first","affiliation":[]},{"given":"Hakob","family":"Aslanyan","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Rolim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"181","author":"shirai","year":"2007","journal-title":"The 128-bit Blockcipher Clefia"},{"key":"2","article-title":"Present: An ultra-lightweight block cipher","author":"bogdanov","year":"2007","journal-title":"Proceedings of CHES 2007"},{"key":"10","article-title":"Pgp in constrained wireless devices","author":"brown","year":"2000","journal-title":"9th USENIX Security Symposium"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-012975-4.50020-5"},{"journal-title":"Algebra","year":"1968","author":"der varden","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0041-0","author":"lang","year":"2002","journal-title":"Algebra"},{"journal-title":"Algebra (Groups Rings Fields)","year":"2006","author":"alexanyan","key":"5"},{"key":"4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0890-5401(02)93173-1"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"alfred p c","key":"8"},{"journal-title":"Constraints and Approaches for Distributed Sensor Networks Security","year":"2000","author":"carman","key":"11"}],"event":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013)","start":{"date-parts":[[2013,3,18]]},"location":"San Diego, CA","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6523359\/6529412\/06529543.pdf?arnumber=6529543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:07:34Z","timestamp":1498061254000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6529543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/percomw.2013.6529543","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}