{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T05:26:55Z","timestamp":1731475615837,"version":"3.28.0"},"reference-count":9,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2009,9,8]]},"DOI":"10.1049\/iet-ifs.2008.0116","type":"journal-article","created":{"date-parts":[[2009,8,31]],"date-time":"2009-08-31T13:50:01Z","timestamp":1251726601000},"page":"114-118","source":"Crossref","is-referenced-by-count":4,"title":["Efficient method for simplifying and approximating the S-boxes based on power functions"],"prefix":"10.1049","volume":"3","author":[{"given":"A.","family":"Farhadian","sequence":"first","affiliation":[{"name":"Information Systems & Security Laboratory, Department of Electrical Engineering, Sharif University of Technology, Azadi Avenue, P.O. Box 11155-9363, Tehran, Iran"}]},{"given":"M.R.","family":"Aref","sequence":"additional","affiliation":[{"name":"Information Systems & Security Laboratory, Department of Electrical Engineering, Sharif University of Technology, Azadi Avenue, P.O. Box 11155-9363, Tehran, Iran"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs.2008.0116_r1","doi-asserted-by":"crossref","first-page":"1271","DOI":"10.1109\/18.761283","volume":"45","author":"Dobbertin","year":"1999","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9448","issn-type":"print"},{"key":"10.1049\/iet-ifs.2008.0116_r2","first-page":"113","author":"Dobbertin","year":"1999, 2001","journal-title":"Proc. Fifth Conf. Finite Field and Applications"},{"key":"10.1049\/iet-ifs.2008.0116_r3","first-page":"19","volume":"89-A","author":"Cheon","year":"2006","ISSN":"http:\/\/id.crossref.org\/issn\/0917-1673","issn-type":"print"},{"key":"10.1049\/iet-ifs.2008.0116_r4","first-page":"55","author":"Nyberg","year":"1994","journal-title":"Proc. Eurocrypt'93"},{"key":"10.1049\/iet-ifs.2008.0116_r5"},{"key":"10.1049\/iet-ifs.2008.0116_r6","first-page":"39","volume":"2012","author":"Aoki","year":"2000"},{"key":"10.1049\/iet-ifs.2008.0116_r7","first-page":"99","volume":"1039","author":"Rijmen","year":"1996"},{"key":"10.1049\/iet-ifs.2008.0116_r8","first-page":"2016","volume":"306","author":"Youssef","year":"2006"},{"key":"10.1049\/iet-ifs.2008.0116_r9","unstructured":"Lidl, R., and Niederreiter, H.: \u2018Finite fields, encyclopedia of mathematics and its applications\u2019, (Addison Wesley, Reading, MA 1983),20,"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs.2008.0116?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T14:13:24Z","timestamp":1731420804000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs.2008.0116"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9,8]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,9,8]]}},"alternative-id":["10.1049\/iet-ifs.2008.0116"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2008.0116","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2009,9,8]]}}}