{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:00:08Z","timestamp":1775538008139,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[1988,5,1]],"date-time":"1988-05-01T00:00:00Z","timestamp":578448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[1988,5]]},"DOI":"10.1109\/5.4441","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:17:23Z","timestamp":1030213043000},"page":"550-559","source":"Crossref","is-referenced-by-count":148,"title":["Data Encryption Standard: past and future"],"prefix":"10.1109","volume":"76","author":[{"given":"M.E.","family":"Smid","sequence":"first","affiliation":[]},{"given":"D.K.","family":"Branstad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"1987","journal-title":"Draft proposed American national standard for electronic data interchange security structures and cryptographic service message transaction set (855)"},{"key":"ref32","year":"1979","journal-title":"A key notarization system for computer networks"},{"key":"ref31","year":"1985","journal-title":"Password Usage"},{"key":"ref30","year":"1985","journal-title":"Criteria and procedures for testing evaluating and certifying message authentication devices for Federal E F T use"},{"key":"ref36","author":"daniels","year":"1985","journal-title":"NSA Deputy Director for Information Security"},{"key":"ref35","article-title":"An industry perspective of the CCEP","author":"barker","year":"1986","journal-title":"2nd Annual AIAA Computer Security Conf Proceedings"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118791861730"},{"key":"ref10","year":"0","journal-title":"Information processing systems?Open systems interconnection?Basic reference model"},{"key":"ref11","year":"0","journal-title":"American national standard for personal identification number (PIN) management and security"},{"key":"ref12","year":"0","journal-title":"American national standard for retail message authentication"},{"key":"ref13","year":"0","journal-title":"Draft proposed American national standard for retail key management"},{"key":"ref14","year":"0","journal-title":"American National Standard for Financial Institution Message Authentication (Wholesale)"},{"key":"ref15","year":"0","journal-title":"American national standard for financial institution key management (wholesale)"},{"key":"ref16","year":"0","journal-title":"Draft proposed American national standard for financial institution message encryption"},{"key":"ref17","year":"0","journal-title":"Draft proposed American national standard for access security for wholesale financial systems Secure transmission of personal authenticating information and node authentication"},{"key":"ref18","year":"0","journal-title":"Computer Security Act of 1987"},{"key":"ref19","year":"1983","journal-title":"Telecommunications Interoperability and security requirements for use of the data encryption standard in the physical and data link layers of data communications"},{"key":"ref28","year":"1984","journal-title":"Department of the Treasury Directives Manual"},{"key":"ref4","year":"1976","journal-title":"Report of the workshop on estimation of Significant Advances in Computer Technology"},{"key":"ref3","year":"1976","journal-title":"NBS Report on Workshop"},{"key":"ref27","year":"1965","journal-title":"Computer Data Authentication"},{"key":"ref6","year":"1980","journal-title":"Key management standard"},{"key":"ref29","year":"1986","journal-title":"Electronic funds and securities transfer policy?Message authentication and enchanced security"},{"key":"ref5","year":"1979","journal-title":"Management and use of personal identification numbers"},{"key":"ref8","year":"0","journal-title":"American National Standard for Information Systems?Data encryption algorithm?Modes of Operation"},{"key":"ref7","year":"0","journal-title":"American National Standard for Data Encryption Algorithm (DEA)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217750"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0573-15"},{"key":"ref9","year":"0","journal-title":"American national standard for information systems?Data link encryption"},{"key":"ref20","year":"1982","journal-title":"Telecommunications General Security Requirements for Equipment Using the Data Encryption Standard"},{"key":"ref22","year":"1987","journal-title":"Banking?Requirements for message authentication (wholesale)"},{"key":"ref21","year":"1985","journal-title":"Interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment"},{"key":"ref24","year":"1977","journal-title":"Data Encryption Standard (DES)"},{"key":"ref23","year":"1987","journal-title":"Banking?Key management (wholesale)"},{"key":"ref26","year":"1980","journal-title":"DES Modes of Operation"},{"key":"ref25","year":"1981","journal-title":"Guidelines for Implementing and using the NBS data encryption standard"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/5\/246\/00004441.pdf?arnumber=4441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:08:01Z","timestamp":1638216481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4441\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,5]]},"references-count":36,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/5.4441","relation":{},"ISSN":["0018-9219"],"issn-type":[{"value":"0018-9219","type":"print"}],"subject":[],"published":{"date-parts":[[1988,5]]}}}