{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:30:10Z","timestamp":1730298610721,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/ssd.2015.7348107","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T17:14:24Z","timestamp":1449594864000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["A new approach for encryption system based on block cipher algorithms and logistic function"],"prefix":"10.1109","author":[{"given":"Fatma","family":"Sbiaa","sequence":"first","affiliation":[]},{"given":"Adel","family":"Baganne","sequence":"additional","affiliation":[]},{"given":"Medien","family":"Zeghid","sequence":"additional","affiliation":[]},{"given":"Rached","family":"Tourki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Recommendation for block cipher modes of operation: methods and techniques","author":"dworkin","year":"2001","journal-title":"Gaithersburg U S Doc\/NIST"},{"key":"ref3","article-title":"National Institute of Standards and Technology (NIST)","volume":"197","year":"2001","journal-title":"FIPS Publication 197 Advanced Encryption Standard (AES)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.5772\/36036"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/HPCC.2012.119"},{"key":"ref8","first-page":"2","article-title":"Differential Cryptanalysis of DES-like Cryptosystems","author":"biham","year":"1990","journal-title":"Advancesin Cryptology - CRYPTO &#x2018;90"},{"key":"ref7","article-title":"A novel algorithm for image encryption based on mixture of chaotic maps","author":"behnia","year":"2006","journal-title":"Chaos Solitons and Fractals [Article in press]"},{"key":"ref2","article-title":"Image Encryption Using Chaos and Block Cipher","author":"alireza","year":"0","journal-title":"Computer and Information Science"},{"key":"ref9","article-title":"NPCR and UACI Randomness Tests for Image Encryption","author":"wu","year":"2011","journal-title":"Journal of Selected Areas in Telecommunications (JSAT)"},{"year":"2009","author":"lian","journal-title":"Multimedia Content Encryption Techniques and Applications","key":"ref1"}],"event":{"name":"2015 12th International Multi-Conference on Systems, Signals & Devices (SSD)","start":{"date-parts":[[2015,3,16]]},"location":"Mahdia, Tunisia","end":{"date-parts":[[2015,3,19]]}},"container-title":["2015 IEEE 12th International Multi-Conference on Systems, Signals &amp; Devices (SSD15)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336450\/7348090\/07348107.pdf?arnumber=7348107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:41:02Z","timestamp":1490391662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7348107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ssd.2015.7348107","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}