{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:18:03Z","timestamp":1760710683901,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772545"],"award-info":[{"award-number":["61772545"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011451","name":"State Key Laboratory of Cryptography","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011451","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001475","name":"Nanyang Technological University, Singapore","doi-asserted-by":"publisher","award":["04INS000397C230"],"award-info":[{"award-number":["04INS000397C230"]}],"id":[{"id":"10.13039\/501100001475","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education of Singapore","doi-asserted-by":"publisher","award":["RG91\/20","MOE2019-T2-1-060"],"award-info":[{"award-number":["RG91\/20","MOE2019-T2-1-060"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61961146004"],"award-info":[{"award-number":["61961146004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032009"],"award-info":[{"award-number":["62032009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/tit.2021.3100756","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T20:54:14Z","timestamp":1627419254000},"page":"7561-7567","source":"Crossref","is-referenced-by-count":5,"title":["New Constructions of Complete Permutations"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7403-8795","authenticated-orcid":false,"given":"Bing","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6708-2309","authenticated-orcid":false,"given":"Kangquan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8847-6748","authenticated-orcid":false,"given":"Jian","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3506-5501","authenticated-orcid":false,"given":"Longjiang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/978-3-030-03326-2_8"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s00145-018-9295-y"},{"key":"ref12","first-page":"47","article-title":"Black box cryptanalysis of hash networks based on multipermutations","volume":"950","author":"schnorr","year":"1994","journal-title":"Advances in Cryptology"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/3-540-60590-8_22"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.ffa.2014.08.002"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.ffa.2013.09.007"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.ffa.2014.01.011"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s11425-014-4964-2"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.ffa.2016.06.005"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.ffa.2014.11.010"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-1-4612-0731-3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1006\/aama.1995.1003"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s10623-018-0480-7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1017\/S1446788700018346"},{"key":"ref6","first-page":"329","article-title":"SMS4 encryption algorithm for wireless networks","volume":"2008","author":"diffie","year":"2008","journal-title":"IACR Cryptol ePrint Arch"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-642-00843-6_28"},{"key":"ref5","first-page":"389","article-title":"A proposal for a new block encryption standard","author":"lai","year":"1990","journal-title":"Proc Workshop Theory Appl Cryptogr Techn"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-642-20901-7_7"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/978-3-540-30564-4_8"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1214\/aoms\/1177731539"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-662-46706-0_8"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-540-48000-6_2"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s10623-016-0236-1"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.ffa.2010.10.002"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.ffa.2019.01.003"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s12095-018-0321-6"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.ffa.2019.03.001"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/BFb0052334"},{"year":"1977","journal-title":"Data encryption standard","key":"ref25"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9579483\/09499067.pdf?arnumber=9499067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:19Z","timestamp":1652194459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9499067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":29,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tit.2021.3100756","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}