{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T18:41:54Z","timestamp":1720464114775},"reference-count":12,"publisher":"Maria Curie-Sklodowska University","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1,1]]},"DOI":"10.2478\/v10065-008-0022-4","type":"journal-article","created":{"date-parts":[[2009,12,26]],"date-time":"2009-12-26T04:16:58Z","timestamp":1261801018000},"source":"Crossref","is-referenced-by-count":5,"title":["Designing cryptographically strong S-boxes with the use of cellular automata"],"prefix":"10.17951","volume":"8","author":[{"given":"Miros\u0142aw","family":"Szaban","sequence":"first","affiliation":[]},{"given":"Franciszek","family":"Seredynski","sequence":"additional","affiliation":[]}],"member":"7349","reference":[{"key":"1","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996"},{"key":"2","unstructured":"Federal Information Processing Standards Publication, Fips Pub 46-3, Reaffirmed (1999) October 25 <a target=\"_blank\" href='http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf'>http:\/\/csrc.nist.gov\/publications\/fips\/fips46-3\/fips46-3.pdf<\/a>"},{"key":"3","unstructured":"Federal Information Processing Standards Publications (FIPS PUBS) 197, AES, (2001) November 26 <a target=\"_blank\" href='http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf'>http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf<\/a>"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/CEC.2004.1331077","article-title":"Multi-objective Optimisation of Bijective S-boxes","author":"J. Fuller","year":"2004"},{"key":"5","volume-title":"A New Kind of Science","author":"S. Wolfram","year":"2002"},{"key":"6","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1007\/11506157_48","article-title":"<i>New Cryptographic Applications of Boolean Function Equivalence Classes<\/i>","volume":"3574","author":"W. Millan","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF03037656","article-title":"<i>The Design of S-Boxes by Simulated Annealing<\/i>","volume":"3","author":"J. Clark","year":"2005","journal-title":"New Generation Computing"},{"key":"8","first-page":"1","article-title":"<i>Designing Boolean Functions for Cryptographic Applications<\/i>","volume":"12","author":"E. Dowson","year":"2000","journal-title":"Contributions to General Algebra"},{"key":"9","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/3-540-39799-X_32","article-title":"<i>Cryptography with Cellular Automata<\/i>, Crypto '85 Proceedings","volume":"218","author":"S. Wolfram","year":"1986","journal-title":"Lecture Notes in Computer Science"},{"key":"10","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/BFb0053732","article-title":"<i>How to Improve the Non-linearity of Bijective S-boxes<\/i>","volume":"143","author":"W. Millan","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"crossref","unstructured":"Millan W., Burnett L., Carter G., Clark A., Dawson E., <i>Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes<\/i>, ICICS'99 (1999).","DOI":"10.1007\/978-3-540-47942-0_22"},{"key":"12","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJICA.2007.013404","article-title":"<i>Designing Substitution Boxes for Secure Ciphers<\/i>","volume":"1","author":"N. Nedjah","year":"2007","journal-title":"International Journal Innovative Computing and Application"}],"container-title":["Annales UMCS, Informatica"],"original-title":[],"link":[{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/download\/3237\/2433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T15:47:21Z","timestamp":1653493641000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.umcs.pl\/ai\/article\/view\/3237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,1]]},"references-count":12,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.2478\/v10065-008-0022-4","relation":{},"ISSN":["2083-3628","1732-1360"],"issn-type":[{"value":"2083-3628","type":"electronic"},{"value":"1732-1360","type":"print"}],"subject":[],"published":{"date-parts":[[2008,1,1]]}}}