{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T16:08:32Z","timestamp":1649002112373},"reference-count":15,"publisher":"International Academy Publishing (IAP)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.6.10.2164-2172","type":"journal-article","created":{"date-parts":[[2011,9,27]],"date-time":"2011-09-27T12:43:40Z","timestamp":1317127420000},"source":"Crossref","is-referenced-by-count":3,"title":["Maxi-linear Deviation Searching Algorithm Based on Improved Pyramid Filter"],"prefix":"10.17706","volume":"6","author":[{"given":"Lizhao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Maoqing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yufeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tianhua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2011,10,1]]},"reference":[{"key":"ref1","first-page":"106","volume-title":"ANSI X3","year":"1983"},{"key":"ref2","first-page":"47","volume-title":"Zhang Yuqing, Xiao Guozhen. symmetric cryptography","author":"Yupu","year":"2002"},{"key":"ref3","first-page":"20","volume-title":"Sun Wei","author":"Chuangai","year":"2002"},{"key":"ref4","volume-title":"Liu Jianwei, \"Communication Network Security - Theory and Technology","author":"Yumin","year":"2000"},{"key":"ref5","first-page":"3","volume-title":"Prop, block cipher design and analysis","year":"2001"},{"key":"ref6","volume-title":"Modern Cryptography Boolean function","author":"Qiaoyan","year":"2000"},{"key":"ref7","first-page":"157","article-title":"On Correlation Between the Order of S-boxes and the Strength of DES","volume":"94","author":"Matsui","year":"1994","journal-title":"Advances in Cryptology Eurocrypto"},{"key":"ref8","first-page":"17","volume-title":"Linear cryptanalysis method for DES cipher. Advances in cryptology-Eurocrypt\u201993, LNCS 765","author":"Matsui","year":"1994"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/357346.357349"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0262-8856(92)90066-C"},{"issue":"3","key":"ref11","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/566654.566589","article-title":"Gux., Gortler S. J., Hoppe H.: Geometry images.","volume":"21","year":"2002","journal-title":"ACM Trans. Graph.","ISSN":"http:\/\/id.crossref.org\/issn\/0730-0301","issn-type":"print"},{"issue":"3","key":"ref12","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00454-002-2817-1","article-title":"Agarwalr., De BergM., Gudmundsson J.,Hammar M., Haverkorth.: Box-trees and r-trees with near optimal query time.","volume":"28","year":"2002","journal-title":"Discrete Comput. Geom.","ISSN":"http:\/\/id.crossref.org\/issn\/0179-5376","issn-type":"print"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/34.121791"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008854305733"},{"key":"ref15","first-page":"311","volume-title":"Annual Conference Series","author":"Turk","year":"1994"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T03:06:43Z","timestamp":1593054403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/4370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":15,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2011,10,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.6.10.2164-2172","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}