{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:33:55Z","timestamp":1742952835612,"version":"3.40.3"},"publisher-location":"India","reference-count":10,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132210405"},{"type":"electronic","value":"9788132210412"}],"license":[{"start":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:00:00Z","timestamp":1354579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:00:00Z","timestamp":1354579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-81-322-1041-2_9","type":"book-chapter","created":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T20:44:11Z","timestamp":1354567451000},"page":"101-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ANN Based Distinguishing Attack on RC4 Stream Cipher"],"prefix":"10.1007","author":[{"given":"Ashok K","family":"Bhateja","sequence":"first","affiliation":[]},{"given":"Maiya","family":"Din","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,4]]},"reference":[{"key":"9_CR1","unstructured":"Roos, A.: Class of Weak Keys in the RC4 Stream Cipher. Post in sci.crypt, (1995)."},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Fluhrer, S., Mantin I. and Shamir A.: Weakness in the Key Scheduling Algorithm of RC4, LNCS 2259, 1-24, Springer Verlag (2001).","DOI":"10.1007\/3-540-45537-X_1"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Paul, Souradyuti and Preneel, Bart: A New Weakness in the RC4 Key-stream Generator and an Approach to Improve the Security of the Cipher, FSE-2001, 245-259, Springer Verlag (2004).","DOI":"10.1007\/978-3-540-25937-4_16"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Mantin, I.: Predicting and Distinguishing Attacks on RC4 Key-stream Generator 491-505, Springer Verlag (2005).","DOI":"10.1007\/11426639_29"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Klein, Andreas: Attacks on the RC4 Stream Cipher, Journal of Design, Code and Cryptography, vol 48, issue 3, 269-286, (2008).","DOI":"10.1007\/s10623-008-9206-6"},{"key":"9_CR6","first-page":"1","volume":"13","author":"H. H. Yang","year":"1999","unstructured":"Yang, H. H. and Moody, J.: Feature Selection based on Joint Mutual Information, Journal of Computational Intelligence Methods and Applications, Int. Computer Science Convention, Vol.13, 1-8, (1999).","journal-title":"Journal of Computational Intelligence Methods and Applications, Int. Computer Science Convention"},{"key":"9_CR7","first-page":"27","volume":"13","author":"G. Brown","year":"2012","unstructured":"Brown, G., Pocock, A. and Jhao, M.J.: Conditional Likelihood Maximization: A Unifying Framework for Information Theoretic Feature Selection. Journal of Machine Learning Research, Vol.13, 27-66, (2012).","journal-title":"Journal of Machine Learning Research"},{"key":"9_CR8","unstructured":"Haykin, S.: Neural Networks- A Comprehensive Foundation, Macmillan, New York, (2001)."},{"key":"9_CR9","unstructured":"Katagiri, S.: Hand Book of Neural Networks for Speech Processing, Artech House, London, 1st edition,(2000)."},{"key":"9_CR10","unstructured":"www.security.iitk.ac.in\/hack.in\/2009\/bimal_keynote_hack.in.pdf."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1041-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T05:22:13Z","timestamp":1676179333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1041-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,4]]},"ISBN":["9788132210405","9788132210412"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1041-2_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012,12,4]]},"assertion":[{"value":"4 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}