{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:55Z","timestamp":1750306795819,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490460","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"222-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Randomized symmetric block encryption"],"prefix":"10.1145","author":[{"given":"B. Dinesh","family":"Reddy","sequence":"first","affiliation":[{"name":"VIIT, Visakhapatnam, India"}]},{"given":"V. Valli","family":"Kumari","sequence":"additional","affiliation":[{"name":"Andhra University, Visakhapatnam, India"}]},{"given":"Kvsvn","family":"Raju","sequence":"additional","affiliation":[{"name":"ANITS, Visakhapatnam, India"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"194","volume-title":"NCETACS","author":"Sashank K.","year":"2011","unstructured":"K. Sashank , B. Dinesh Reddy , S. Ratan Kumar \" Index Based Symmetric Block Encryption\" in NCETACS 2011 , Shillong, India , pp 194 -- 198 . IEEE Xplore Digital Library Print ISBN: 978-1-4244-9578-8 K. Sashank, B. Dinesh Reddy, S. Ratan Kumar \"Index Based Symmetric Block Encryption\" in NCETACS 2011, Shillong, India, pp 194--198. IEEE Xplore Digital Library Print ISBN: 978-1-4244-9578-8"},{"key":"e_1_3_2_1_2_1","volume-title":"Applied Cryptography --","author":"SHNEIR","year":"2010","unstructured":"SHNEIR , B. , Applied Cryptography -- 2 nd ed., Wiley , 2010 SHNEIR, B., Applied Cryptography -- 2nd ed., Wiley, 2010","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/647930.740574"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_5_1","volume-title":"Special Publication 800--67","author":"National Institute of Standards and Technology","year":"2004","unstructured":"National Institute of Standards and Technology , Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , Special Publication 800--67 , May 2004 . National Institute of Standards and Technology, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Special Publication 800--67, May 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"Advanced Encryption Standard (AES)","author":"Standard F. I. P.","year":"2001","unstructured":"F. I. P. Standard , Advanced Encryption Standard (AES) , National Institute of Standards and Technology (NIST) , 2001 F. I. P. Standard, Advanced Encryption Standard (AES), National Institute of Standards and Technology (NIST), 2001"},{"key":"e_1_3_2_1_7_1","first-page":"191","article-title":"Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)","volume":"1993","author":"Shneier Bruce","unstructured":"Bruce Shneier , Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) . Fast Software Encryption 1993 : 191 -- 204 Bruce Shneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). Fast Software Encryption 1993: 191--204","journal-title":"Fast Software Encryption"},{"key":"e_1_3_2_1_8_1","volume-title":"Wiener \"Minimal key lengths for symmetric ciphers to provide adequate commercial security\". A Report by an Ad Hoc Group of Cryptographers and Computer Scientists","author":"Blaze M.","year":"1996","unstructured":"M. Blaze , W. Diffie , R. L. Rivest , B. Schneier , T. Shimomura , E. Thompson , M. Wiener \"Minimal key lengths for symmetric ciphers to provide adequate commercial security\". A Report by an Ad Hoc Group of Cryptographers and Computer Scientists , 1996 . M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener \"Minimal key lengths for symmetric ciphers to provide adequate commercial security\". A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, 1996."},{"key":"e_1_3_2_1_9_1","volume-title":"National Institute of Standards and Technology","author":"Recommendation W. C.","year":"2004","unstructured":"Barker, W. C. \" Recommendation for the triple data encryption algorithm (TDEA) block cipher.\" Tech. Rep. 800--67 , National Institute of Standards and Technology , 2004 Barker, W. C. \"Recommendation for the triple data encryption algorithm (TDEA) block cipher.\" Tech. Rep. 800--67, National Institute of Standards and Technology, 2004"},{"unstructured":"http:\/\/en.wikipedia.org\/wiki\/Feistel_cipher  http:\/\/en.wikipedia.org\/wiki\/Feistel_cipher","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"A new method for known plaintext attack of FEAL cipher\". Advances in Cryptology - EUROCRYPT","author":"Yamagishi M.","year":"1992","unstructured":"Matsui, M. and Yamagishi , A . \" A new method for known plaintext attack of FEAL cipher\". Advances in Cryptology - EUROCRYPT 1992 . Matsui, M. and Yamagishi, A. \"A new method for known plaintext attack of FEAL cipher\". Advances in Cryptology - EUROCRYPT 1992."},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of CRYPTO '92","author":"Biham Eli","year":"1991","unstructured":"Eli Biham , Adi Shamir , \" Differential Cryptanalysis of the Full 16-Round DES,\" CS 708 , Proceedings of CRYPTO '92 , Volume 740 of Lecture Notes in Computer Science , December 1991 Eli Biham, Adi Shamir, \"Differential Cryptanalysis of the Full 16-Round DES,\" CS 708, Proceedings of CRYPTO '92, Volume 740 of Lecture Notes in Computer Science, December 1991"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"],"acronym":"SECURIT '12","name":"SECURIT '12: First International Conference on Security of Internet of Things","location":"Kollam India"},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":12,"alternative-id":["10.1145\/2490428.2490460","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490460","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}