{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T21:45:33Z","timestamp":1705095933790},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2009,6,1]],"date-time":"2009-06-01T00:00:00Z","timestamp":1243814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Broadcast."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/tbc.2009.2014993","type":"journal-article","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T16:00:56Z","timestamp":1239811256000},"page":"270-281","source":"Crossref","is-referenced-by-count":18,"title":["Multilevel Indexed Quasigroup Encryption for Data and Speech"],"prefix":"10.1109","volume":"55","author":[{"given":"M.","family":"Satti","sequence":"first","affiliation":[]},{"given":"S.","family":"Kak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"1","author":"Bailey","year":"2003","journal-title":"\u201cLatin Squares: Equivalents and Equivalence,\u201d"},{"key":"2","first-page":"194","article-title":"A message authentication code based on latin squares","author":"Bakhtiari","year":"1997","journal-title":"Proc. Australasian Conference on Information Security and Privacy"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1038\/scientificamerican0573-15","article-title":"Cryptography and computer security","author":"Feistel","year":"1973","journal-title":"Scientific American"},{"key":"4","author":"Gligoroski","year":"2004","journal-title":"\u201cStream Cipher Based on Quasigroup String Transformations in"},{"key":"5","author":"Gligoroski","year":"2005","journal-title":"\u201cCandidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations,\u201d"},{"key":"6","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1002\/j.1538-7305.1977.tb00539.x","article-title":"Speech encryption using waveform scrambling","volume":"56","author":"Kak","year":"1977","journal-title":"Bell System Technical Journal"},{"key":"7","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1049\/ip-f-1.1983.0066","article-title":"Overview of analogue signal encryption","volume":"130","author":"Kak","year":"1983","journal-title":"IEE Proceedings F. Communications, Radar and Signal Processing"},{"key":"8","first-page":"559","article-title":"Generating quasigroups for cryptographic applications","volume":"12","author":"Ko\u015acienly","year":"2002","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"key":"9","first-page":"13","article-title":"Quasigroup string processing: Part 1","volume":"XX 1-2","author":"Markovski","year":"1999","journal-title":"Proc. of Maced. Acad. of Sci. and Arts for Math. and Tech. Sci."},{"key":"10","article-title":"Quasigroup string processing: Part 2","volume":"XXI","author":"Markovski","year":"2000","journal-title":"Proc. of Maced. Acad. of Sci. and Arts for Math. and Tech. Sci."},{"key":"11","author":"Ritter","year":"1998","journal-title":"\u201cOrthogonal latin squares, nonlinear balanced block mixers,\u201d"},{"key":"12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/BFb0053423","article-title":"Black box cryptanalysis of hash networks based on multipermutations","volume":"950","author":"Schnorr","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"13","first-page":"286","article-title":"On the need for multipermutations: Cryptanalysis of MD4 and SAFER","author":"Vaudenay","year":"1994","journal-title":"Proc. Fast Software Encryption"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676636"},{"key":"15","author":"Stallings","year":"2006","journal-title":"Cryptography and Network Security"},{"key":"16","first-page":"267","volume":"Lecture Notes","author":"Hoffstein","year":"1998","journal-title":"Algorithmic Number Theory (ANTS III), Portland, OR, June 1998"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110591893762"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1080\/01611190500541824"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2007.894947"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2008.919940"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2005.847600"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2006.875650"}],"container-title":["IEEE Transactions on Broadcasting"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11\/4976143\/04814470.pdf?arnumber=4814470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:45:16Z","timestamp":1633913116000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4814470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":22,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tbc.2009.2014993","relation":{},"ISSN":["0018-9316","1557-9611"],"issn-type":[{"value":"0018-9316","type":"print"},{"value":"1557-9611","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6]]}}}