{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T22:56:45Z","timestamp":1769813805206,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T00:00:00Z","timestamp":1329350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1007\/s00521-012-0870-0","type":"journal-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T06:59:33Z","timestamp":1329289173000},"page":"1085-1093","source":"Crossref","is-referenced-by-count":127,"title":["A projective general linear group based algorithm for the construction of substitution box for block ciphers"],"prefix":"10.1007","volume":"22","author":[{"given":"Iqtadar","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Tariq","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Muhammad Asif","family":"Gondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,16]]},"reference":[{"key":"870_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael-AES: the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael-AES: the advanced encryption standard. Springer, Berlin"},{"issue":"5","key":"870_CR2","first-page":"5","volume":"2","author":"I Hussain","year":"2010","unstructured":"Hussain I, Shah T, Mahmood H, Afzal M (2010) Comparative analysis of S-boxes based on graphical SAC. Int J Comput Appl 2(5):5\u20138","journal-title":"Int J Comput Appl"},{"issue":"5","key":"870_CR3","first-page":"132","volume":"1","author":"I Hussain","year":"2010","unstructured":"Hussain I, Mahmood Z (2010) Graphical strict avalanche criterion for Kasumi S-box. Can J Comput Math Nat Sci Eng Med 1(5):132\u2013136","journal-title":"Can J Comput Math Nat Sci Eng Med"},{"issue":"2","key":"870_CR4","first-page":"57","volume":"3","author":"I Hussain","year":"2010","unstructured":"Hussain I, Shah T, Aslam SK (2010) Graphical SAC analysis of S8 APA S-box. Adv Algebra 3(2):57\u201362","journal-title":"Adv Algebra"},{"issue":"16","key":"870_CR5","first-page":"4110","volume":"6","author":"T Shah","year":"2011","unstructured":"Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. Int J Phys Sci 6(16):4110\u20134127","journal-title":"Int J Phys Sci"},{"issue":"2","key":"870_CR6","first-page":"111","volume":"48","author":"I Hussain","year":"2011","unstructured":"Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti UY (2011) Some analysis of S-box based on residue of prime number. Proc Pak Acad Sci 48(2):111\u2013115","journal-title":"Proc Pak Acad Sci"},{"key":"870_CR7","doi-asserted-by":"crossref","unstructured":"Tran MT, Bui DK, Doung AD (2008) Gray S-box for advanced encryption standard. Int Conf Comp Intel Secur 253\u2013256","DOI":"10.1109\/CIS.2008.205"},{"issue":"3","key":"870_CR8","first-page":"45","volume":"3","author":"L Cui","year":"2007","unstructured":"Cui L, Cao Y (2007) A new S-box structure named Affine- Power-Affine. Int J Innov Comput I 3(3):45\u201353","journal-title":"Int J Innov Comput I"},{"issue":"26","key":"870_CR9","first-page":"1263","volume":"5","author":"I Hussain","year":"2010","unstructured":"Hussain I, Shah T, Mahmood H (2010) A new algorithm to construct secure keys for AES. Int J Cont Math Sci 5(26):1263\u20131270","journal-title":"Int J Cont Math Sci"},{"issue":"3","key":"870_CR10","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1080\/01611190802653228","volume":"33","author":"J Kim","year":"2009","unstructured":"Kim J, Phan RC-W (2009) Advanced differential-style cryptanalysis of the NSA\u2019s skipjack block cipher. Cryptologia 33(3):246\u2013270","journal-title":"Cryptologia"},{"key":"870_CR11","unstructured":"Shi XY, Xiao Hu You XC, Lam KY (2002) A method for obtaining cryptographically strong 8\u00a0\u00d7\u00a08 S-boxes. Int Conf Infor Network Appl 2(3):14\u201320"},{"key":"870_CR12","unstructured":"Feng D, Wu W (2000) Design and analysis of block ciphers. Tsinghua University Press"},{"key":"870_CR13","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume":"765","author":"M Matsui","year":"1994","unstructured":"Matsui M (1994) Linear cryptanalysis method of DES cipher. Advances in cryptology, proceeding of the Eurocrypt\u201993. Lect Notes Comput Sci 765:386\u2013397","journal-title":"Lect Notes Comput Sci"},{"issue":"1","key":"870_CR14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s00521-012-0870-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s00521-012-0870-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s00521-012-0870-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T18:45:46Z","timestamp":1561315546000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/10.1007\/s00521-012-0870-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,16]]},"references-count":14,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,5]]}},"alternative-id":["870"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/s00521-012-0870-0","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,16]]}}}