{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:47:45Z","timestamp":1729619265859,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1109\/ares.2010.93","type":"proceedings-article","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T15:52:36Z","timestamp":1269877956000},"page":"210-215","source":"Crossref","is-referenced-by-count":3,"title":["Enhanced Chaotic Stream Cipher for WSNs"],"prefix":"10.1109","author":[{"given":"Rui Miguel Soares","family":"Silva","sequence":"first","affiliation":[]},{"given":"Rui Gustavo Nunes Pereira","family":"Crespo","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio Serafim dos Santos","family":"Nunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Report on the development of the advanced encryption standard (AES)","volume":"106","author":"nechvatal","year":"2000","journal-title":"Technical report Journal of Research of the National Institute of Standards and Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258477"},{"article-title":"RC4 &#x2013; Ron Rivest Cipher 4","year":"1987","author":"rivest","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82865-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980680"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2009.027596"},{"journal-title":"IEEE Computer Society Tech Rep","year":"2003","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/11935070_19","article-title":"Chaotic keystream generator using coupled ndfs with parameter perturbing","author":"wang","year":"2006","journal-title":"Cryptology and Network Security"},{"key":"ref18","first-page":"287","article-title":"An implementation of the GSM General Data Encryption Algorithm A5","author":"xu","year":"0","journal-title":"In In Proceedings of the CHINACRYPT'94"},{"key":"ref19","article-title":"ZigBee Specification","author":"alliance","year":"2005","journal-title":"ZigBee Alliance Tech Rep"},{"key":"ref4","first-page":"345","author":"courtois","year":"2003","journal-title":"Algebraic attacks on stream ciphers with linear feedback"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/31.75404"},{"journal-title":"Performance optimized AES Implementation for 8051-based Microcontrollers","article-title":"Institute for Applied Information Processing and Communications (IAIK)","year":"2007","key":"ref6"},{"journal-title":"Technical Report","year":"2001","key":"ref5"},{"journal-title":"Diehard A Battery of Tests of Randomness","year":"1997","author":"marsaglia","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1138127.1138130"},{"journal-title":"A pedagogical implementation of A5\/1","year":"1999","author":"briceno","key":"ref2"},{"key":"ref1","article-title":"Instant Ciphertext-only Cryptanalysis of GSM Encrypted Communication","author":"barkan","year":"2006","journal-title":"Technical Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"}],"event":{"name":"2010 International Conference on Availability, Reliability, and Security (ARES)","start":{"date-parts":[[2010,2,15]]},"location":"Krakow, Poland","end":{"date-parts":[[2010,2,18]]}},"container-title":["2010 International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5437532\/5437988\/05438094.pdf?arnumber=5438094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T02:38:25Z","timestamp":1497839905000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5438094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ares.2010.93","relation":{},"subject":[],"published":{"date-parts":[[2010,2]]}}}