{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:45:17Z","timestamp":1729662317341,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/trustcom.2012.275","type":"proceedings-article","created":{"date-parts":[[2012,9,11]],"date-time":"2012-09-11T22:46:34Z","timestamp":1347403594000},"page":"1883-1888","source":"Crossref","is-referenced-by-count":0,"title":["The Research and Application of a Specific Instruction Processor for SMS4"],"prefix":"10.1109","author":[{"given":"Zhenzhou","family":"Li","sequence":"first","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Ju","sequence":"additional","affiliation":[]},{"given":"Renhai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.220"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2003.1212834"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1023833.1023844"},{"key":"15","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-540-77048-0_24","article-title":"Attacking reduced-round versions of the sms4 block cipher in the chinese wapi standard","author":"lu","year":"2007","journal-title":"Proc Int Conf Information and Communication Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019180916909"},{"key":"13","first-page":"10","article-title":"Formal analysis and verification for authentication process of wapi","volume":"32","author":"li","year":"2006","journal-title":"Jisuanji Gongcheng\/ Computer Engineering"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_13"},{"key":"11","first-page":"12","article-title":"Analysis of security and communication performance about wapi and ieee 802.11 i","author":"juan","year":"2007","journal-title":"Communications"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2006.243972"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2004.825430"},{"key":"2","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/CEC.2001.934295","article-title":"Pde: A pareto-frontier differential evolution approach for multi-objective optimization problems","volume":"2","author":"abbass","year":"2001","journal-title":"Evolutionary Computation 2001 Proceedings of the 2001 Congress on"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1457246.1457254"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.171"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1176254.1176293"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1968502.1968509"},{"journal-title":"SMS4 Encryption Algorithm for Wireless Networks","year":"2008","author":"diffie","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(85)90133-2"},{"key":"9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/ICEC.1994.350037","article-title":"A niched pareto genetic algorithm for multiobjective optimization","author":"horn","year":"1994","journal-title":"Evolutionary Computation 1994 IEEE World Congress on Computational Intelligence Proceedings of the First IEEE Conference on"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090724"}],"event":{"name":"2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2012,6,25]]},"location":"Liverpool, United Kingdom","end":{"date-parts":[[2012,6,27]]}},"container-title":["2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6294581\/6295938\/06296217.pdf?arnumber=6296217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T15:00:30Z","timestamp":1562166030000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6296217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":19,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/trustcom.2012.275","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}