{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:29:16Z","timestamp":1769239756055,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener Comput"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/bf03037656","type":"journal-article","created":{"date-parts":[[2009,4,24]],"date-time":"2009-04-24T03:41:12Z","timestamp":1240544472000},"page":"219-231","source":"Crossref","is-referenced-by-count":93,"title":["The design of S-boxes by simulated annealing"],"prefix":"10.1007","volume":"23","author":[{"given":"John A.","family":"Clark","sequence":"first","affiliation":[]},{"given":"Jeremy L.","family":"Jacob","sequence":"additional","affiliation":[]},{"given":"Susan","family":"Stepney","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03037656_CR1","series-title":"LNCS","first-page":"2","volume-title":"Advances in Cryptology\u2014Crypto\u201990","author":"E. Biham","year":"1990","unstructured":"Biham, E. and Shamir, A., \u201cDifferential Cryptanalysis of DES-like Cryptosystems (Extended Abstract)\u201d, inAdvances in Cryptology\u2014Crypto\u201990 (Menezes, A.J. and Vanstone, S.A. eds.),LNCS, 537, pp. 2\u201321, Springer-Verlag, Berlin, 1990."},{"key":"BF03037656_CR2","doi-asserted-by":"crossref","unstructured":"Clark, J. A. and Jacob, J. L., \u201cTwo Stage Optimisation in the Design of Boolean Functions\u201d, in5th Australasian Conference on Information Security and Privacy (Dawson, E., Clark, A. and Boyd, C. eds.),ACIS 2000, LNCS,1841, pp. 242\u2013254. Springe Verlag, July 2000.","DOI":"10.1007\/10718964_20"},{"issue":"3","key":"BF03037656_CR3","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1111\/j.0824-7935.2004.00245.x","volume":"20","author":"J.A. Clark","year":"2004","unstructured":"Clark, J.A., Jacob, J.L., Maitra, S. and St\u00e2nic\u00e2, P., \u201cAlmost Boolean functions: the Design of Boolean Functions by Spectral Inversion\u201d,Computational Intelligence, 20, 3, pp. 450\u2013462, August2004.","journal-title":"Computational Intelligence"},{"key":"BF03037656_CR4","unstructured":"Clark, J.A., Jacob, J.L. and Stepney, S., \u201cSearching for Cost Functions\u201d, inConference on Evolutionary Computation-CEC-04, July 2004."},{"key":"BF03037656_CR5","doi-asserted-by":"crossref","unstructured":"Clark, J.A., Jacob, J.L., Stepney, S., Maitra, S. and Millan, W., \u201cEvolving Boolean Functions Satisfying Multiple Criteria\u201d, inProgress in Cryptology\u2014INDOCRYPT 2002, LNCS, 2551, pp. 246\u2013259, Springer Verlag, 2002.","DOI":"10.1007\/3-540-36231-2_20"},{"key":"BF03037656_CR6","series-title":"Technical report, Electrical and Computer Engineering","volume-title":"A Tutorial on Linear and Differential Cryptanalysis","author":"H. M. Heys","year":"2004","unstructured":"Heys, H. M., \u201cA Tutorial on Linear and Differential Cryptanalysis\u201d,Technical report, Electrical and Computer Engineering, University of Newfoundland, St. John\u2019s, Newfoundland, Canada, 2004."},{"issue":"4598","key":"BF03037656_CR7","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S. Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt, Jr. C. D. and Vecchi, M. D., \u201cOptimization by Simulated Annealing\u201d,Science, 220, 4598, pp. 671\u2013680,May 1983.","journal-title":"Science"},{"key":"BF03037656_CR8","series-title":"LNCS","first-page":"386","volume-title":"Advances in Cryptology\u2014EuroCrypt \u201993","author":"M. Matsui","year":"1993","unstructured":"Matsui, M., \u201cLinear Cryptanalysis Method for DES Cipher\u201d, inAdvances in Cryptology\u2014EuroCrypt \u201993 (Helleseth, T. ed),LNCS, 765, pp. 386\u2013397, Springer-Verlag, Berlin, 1993."},{"key":"BF03037656_CR9","doi-asserted-by":"crossref","unstructured":"Millan, W., \u201cHow to Improve the Non-linearity of Bijective S-boxes\u201d, in3rd Australian Conference on Information Security and Privacy (Boyd, C. and Dawson, E. eds.),LNCS, 1438, pp. 181\u2013192, Springer-Verlag, April 1998.","DOI":"10.1007\/BFb0053732"},{"key":"BF03037656_CR10","doi-asserted-by":"crossref","unstructured":"Millan, W., Burnett, L., Carter, G., Clark, A. and Dawson, E., \u201cEvolutionary Heuristics for Finding Cryptographically Strong S-Boxes\u201d, inICICS 99, LNCS, 1726, pp. 263\u2013274, Springer-Verlag, 1999.","DOI":"10.1007\/978-3-540-47942-0_22"},{"key":"BF03037656_CR11","unstructured":"Millan, W., Clark, A. and Dawson, E., \u201cSmart Hill Climbing Finds Better Boolean Functions\u201d, inWorkshop on Selected Areas on Cryptography, SAC 97, pp. 50\u201363, 1997."},{"key":"BF03037656_CR12","doi-asserted-by":"crossref","unstructured":"Millan, W., Clark, A. and Dawson, E., \u201cBoolean Function Design Using Hill Climbing Methods\u201d, in4th Australian Conference on Information Security and Privacy (Schneier, B. ed),LNCS, 1587, pp. 1\u201311, Springer-Verlag, April 1999.","DOI":"10.1007\/3-540-48970-3_1"},{"key":"BF03037656_CR13","doi-asserted-by":"crossref","unstructured":"Millan, W., Clark, A. and Dawson, E., \u201cHeuristic Design of Cryptographically Strong Balanced Boolean Functions\u201d, inAdvances in Cryptology EUROCRYPT\u201998, LNCS, 1403, pp. 489\u2013499, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0054148"},{"key":"BF03037656_CR14","unstructured":"National Bureau of Standards, Data Encryption Standard,NBS FIPS PUB 46, 1976."}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037656.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03037656\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T00:52:41Z","timestamp":1558572761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03037656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["BF03037656"],"URL":"https:\/\/doi.org\/10.1007\/bf03037656","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"value":"0288-3635","type":"print"},{"value":"1882-7055","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}