{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:30Z","timestamp":1750220490715,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1145\/3495018.3495081","type":"proceedings-article","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T17:33:51Z","timestamp":1647279231000},"page":"367-370","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study of Format-Preserving Encryption Algorithm Incorporating Robust Chinese Remainder Theorem"],"prefix":"10.1145","author":[{"given":"Ke","family":"Luo","sequence":"first","affiliation":[{"name":"Shaoyang University, China"}]},{"given":"Wei","family":"Gao","sequence":"additional","affiliation":[{"name":"Yunnan Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,14]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/3-540-36178-2_17"},{"key":"e_1_3_2_1_2_1","volume-title":"Unpublished Voltage White Paper","author":"S. T.","year":"2008","unstructured":"S. T. Format preserving encryption. Unpublished Voltage White Paper , 2008 . S. T. Format preserving encryption. Unpublished Voltage White Paper, 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"Feistel finite set encryption mode. NIST Proposed Encryption Mode. Available online at http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffsem\/ffsem-spec. pdf","author":"Spies T.","year":"2008","unstructured":"T. Spies . Feistel finite set encryption mode. NIST Proposed Encryption Mode. Available online at http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffsem\/ffsem-spec. pdf , 2008 .23. T. Spies. Feistel finite set encryption mode. NIST Proposed Encryption Mode. Available online at http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/ffsem\/ffsem-spec. pdf, 2008.23."},{"key":"e_1_3_2_1_4_1","first-page":"312","volume-title":"International Workshop on Selected Areas in Cryptography","author":"Bellare M.","year":"2009","unstructured":"M. Bellare , T. Ristenpart , P. Rogaway , T. Stegers , Format-preserving encryption. International Workshop on Selected Areas in Cryptography , pp. 295\u2013 312 ,Springer, 2009 . M. Bellare, T. Ristenpart, P. Rogaway, T. Stegers, Format-preserving encryption. International Workshop on Selected Areas in Cryptography, pp. 295\u2013312,Springer, 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"The ffx mode of operation for formatpreserving encryption. NIST submission","author":"Bellare M.","year":"2010","unstructured":"M. Bellare , P. Rogaway , T. Spies . The ffx mode of operation for formatpreserving encryption. NIST submission , vol. 20 , 2010 . M. Bellare, P. Rogaway, T. Spies. The ffx mode of operation for formatpreserving encryption. NIST submission, vol. 20, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-03356-8_17"},{"key":"e_1_3_2_1_7_1","first-page":"130","volume-title":"RSA Conference","author":"Black J.","year":"2002","unstructured":"J. Black , P. Rogaway . Ciphers with arbitrary finite domains. Cryptographers\u2019 Track at the RSA Conference , pp. 114\u2013 130 , Springer , 2002 . J. Black , P. Rogaway. Ciphers with arbitrary finite domains. Cryptographers\u2019 Track at the RSA Conference, pp. 114\u2013130, Springer, 2002."},{"key":"e_1_3_2_1_8_1","volume-title":"International Journal Of Computational Engineering Research","author":"Vidhya S.","year":"2012","unstructured":"S. Vidhya , K. Chitra . Survey of format preserving encryption . International Journal Of Computational Engineering Research , 2012 . S. Vidhya , K. Chitra. Survey of format preserving encryption. International Journal Of Computational Engineering Research, 2012."},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Engineering Inventions","author":"Vidhya S.","year":"2013","unstructured":"S. Vidhya , K. Chitra . Enhancement of prefix cipher in format preserving encryption . International Journal of Engineering Inventions , 2013 . S. Vidhya , K. Chitra. Enhancement of prefix cipher in format preserving encryption. International Journal of Engineering Inventions, 2013."},{"key":"e_1_3_2_1_10_1","first-page":"8","volume-title":"International Conference on Research Trends in Computer Technology, ICRTCT-2013","author":"Vidhya S.","year":"2013","unstructured":"S. Vidhya , K. Chitra . Format preserving encryption using feistel cipher . International Conference on Research Trends in Computer Technology, ICRTCT-2013 , in Proceeding of International Journal of Computer Application (IJCA) , pp. 5\u2013 8 , 2013 . S. Vidhya , K. Chitra. Format preserving encryption using feistel cipher. International Conference on Research Trends in Computer Technology, ICRTCT-2013, in Proceeding of International Journal of Computer Application (IJCA), pp. 5\u20138, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.9790\/0661-1462329","article-title":"Efficient fpe algorithm for encrypting credit card numbers","volume":"14","author":"Chitra K.","year":"2013","unstructured":"K. Chitra . Efficient fpe algorithm for encrypting credit card numbers . IOSR Journal of Computer Engineering , vol. 14 ,pp. 23 \u2013 29 , 01 2013 .24. K. Chitra. Efficient fpe algorithm for encrypting credit card numbers. IOSR Journal of Computer Engineering, vol. 14,pp. 23\u201329, 01 2013.24.","journal-title":"IOSR Journal of Computer Engineering"},{"unstructured":"E. Brier T. Peyrin J. Stern Bps. a format-preserving encryption proposal. http:\/\/csrc. nist. gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/bps\/bpsspec. pdf 2010.  E. Brier T. Peyrin J. Stern Bps. a format-preserving encryption proposal. http:\/\/csrc. nist. gov\/groups\/ST\/toolkit\/BCM\/documents\/proposedmodes\/bps\/bpsspec. pdf 2010.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"644","volume-title":"A new integer fpe scheme based on feistel network. Advances in Electric and Electronics","author":"Jia C.","year":"2012","unstructured":"C. Jia , Z. Liu , J. Li , Z. Dong , X. You . A new integer fpe scheme based on feistel network. Advances in Electric and Electronics , pp. 637\u2013 644 , Springer , 2012 . C. Jia, Z. Liu, J. Li, Z. Dong, X. You. A new integer fpe scheme based on feistel network. Advances in Electric and Electronics, pp. 637\u2013644, Springer, 2012."},{"key":"e_1_3_2_1_14_1","first-page":"205","volume-title":"2010 IEEE International Conference on","volume":"2","author":"Liu Z.","year":"2010","unstructured":"Z. Liu , C. Jia , J. Li , X. Cheng . Format-preserving encryption for datetime, in Intelligent Computing and Intelligent Systems (ICIS) . 2010 IEEE International Conference on , vol. 2 , pp. 201\u2013 205 , IEEE, 2010 .4. Z. Liu, C. Jia, J. Li, X. Cheng. Format-preserving encryption for datetime, in Intelligent Computing and Intelligent Systems (ICIS). 2010 IEEE International Conference on, vol. 2, pp. 201\u2013205, IEEE, 2010.4."},{"key":"e_1_3_2_1_15_1","first-page":"4","volume-title":"International Conference on","volume":"1","author":"Bhatt Z.","year":"2016","unstructured":"Z. Bhatt , V. Gupta, Advance security technique for format preserving encryption, in Inventive Computation Technologies (ICICT) . International Conference on , vol. 1 , pp. 1\u2013 4 , IEEE, 2016 . Z. Bhatt, V. Gupta, Advance security technique for format preserving encryption, in Inventive Computation Technologies (ICICT). International Conference on, vol. 1, pp. 1\u20134, IEEE, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/CSE-EUC.2017.203"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/CSE-EUC.2017.97"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1137\/0217022"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/TSP.2010.2066974"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1137\/0217022"}],"event":{"acronym":"AIAM2021","name":"AIAM2021: 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture","location":"Manchester United Kingdom"},"container-title":["2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495018.3495081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:20Z","timestamp":1750193360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":20,"alternative-id":["10.1145\/3495018.3495081","10.1145\/3495018"],"URL":"https:\/\/doi.org\/10.1145\/3495018.3495081","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]},"assertion":[{"value":"2022-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}