{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:52:51Z","timestamp":1743137571995,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030602475"},{"type":"electronic","value":"9783030602482"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-60248-2_44","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T09:03:14Z","timestamp":1601370194000},"page":"639-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Energy-Efficient AES Encryption Algorithm Based on Memristor Switch"],"prefix":"10.1007","author":[{"given":"Danghui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Ze","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Ru","family":"Han","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"issue":"4","key":"44_CR1","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/S1363-4127(99)80083-1","volume":"4","author":"S Murphy","year":"1999","unstructured":"Murphy, S.: The advanced encryption standard (AES). Inf. Secur. Tech. Rep. 4(4), 12\u201317 (1999)","journal-title":"Inf. Secur. Tech. Rep."},{"key":"44_CR2","doi-asserted-by":"publisher","unstructured":"Shao, F., Chang, Z., Zhang, Y.: AES encryption algorithm based on the high performance computing of GPU. In: Second International Conference on Communication Software and Networks, Singapore, 2010, pp. 588\u2013590 (2010). \nhttps:\/\/doi.org\/10.1109\/iccsn.2010.124","DOI":"10.1109\/iccsn.2010.124"},{"key":"44_CR3","unstructured":"Shute, M., Hennessy, J.L., Patterson, D.A.: Computer Architecture: A Quantitative Approach. Morgan Kaufmann Publishers Inc., California (1990). ISBN 1-55860-069-8. \u00a324.95. Elsevier 24(1-2), 1993"},{"key":"44_CR4","doi-asserted-by":"publisher","unstructured":"Shao, F., Chang, Z., Zhang, Y.: AES encryption algorithm based on the high performance computing of GPU. In: 2010 Second International Conference on Communication Software and Networks, Singapore, pp. 588\u2013590 (2010). \nhttps:\/\/doi.org\/10.1109\/ICCSN.2010.124","DOI":"10.1109\/ICCSN.2010.124"},{"issue":"6","key":"44_CR5","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/JPROC.2011.2167489","volume":"100","author":"GS Rose","year":"2012","unstructured":"Rose, G.S., Rajendran, J., Manem, H., Karri, R., Pino, R.E.: Leveraging memristive systems in the construction of digital logic circuits. Proc. IEEE 100(6), 2033\u20132049 (2012). \nhttps:\/\/doi.org\/10.1109\/JPROC.2011.2167489","journal-title":"Proc. IEEE"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Ho, Y., Huang, G.M., Li, P.: Nonvolatile memristor memory: device characteristics and design implications. In: 2009 IEEE\/ACM International Conference on Computer-Aided Design - Digest of Technical Papers, San Jose, CA, pp. 485\u2013490","DOI":"10.1145\/1687399.1687491"},{"issue":"06","key":"44_CR7","doi-asserted-by":"publisher","first-page":"1446","DOI":"10.1007\/s11432-012-4572-0","volume":"55","author":"P Mazumder","year":"2012","unstructured":"Mazumder, P.: Memristor-based RRAM with applications. Sci. China (Inf. Sci.) 55(06), 1446\u20131460 (2012)","journal-title":"Sci. China (Inf. Sci.)"},{"key":"44_CR8","doi-asserted-by":"publisher","unstructured":"Raja, T., Mourad, S.: Digital logic implementation in memristor-based crossbars. In: International Conference on Communications, Circuits and Systems, Milpitas, CA, pp. 939\u2013943 (2009). \nhttps:\/\/doi.org\/10.1109\/icccas.2009.5250374","DOI":"10.1109\/icccas.2009.5250374"},{"key":"44_CR9","doi-asserted-by":"publisher","unstructured":"Kim, H., Sah, M.P., Yang, C., Chua, L.O.: Memristor-based multilevel memory. In: 2010 12th International Workshop on Cellular Nanoscale Networks and their Applications (CNNA 2010), Berkeley, CA, pp. 1\u20136 (2010). \nhttps:\/\/doi.org\/10.1109\/cnna.2010.5430320","DOI":"10.1109\/cnna.2010.5430320"},{"key":"44_CR10","doi-asserted-by":"publisher","unstructured":"Kvatinsky, S., Kolodny, A., Weiser, U.C., Friedman, E.G.: Memristor-based IMPLY logic design procedure. In: IEEE 29th International Conference on Computer Design (ICCD), Amherst, MA, pp. 142\u2013147 (2011). \nhttps:\/\/doi.org\/10.1109\/iccd.2011.6081389","DOI":"10.1109\/iccd.2011.6081389"},{"issue":"11","key":"44_CR11","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/TCSII.2014.2357292","volume":"61","author":"S Kvatinsky","year":"2014","unstructured":"Kvatinsky, S.: MAGIC\u2014Memristor-aided logic. IEEE Trans. Circuits Syst. II Express Briefs 61(11), 895\u2013899 (2014). \nhttps:\/\/doi.org\/10.1109\/TCSII.2014.2357292","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"7290","key":"44_CR12","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1038\/nature08940","volume":"464","author":"J Borghetti","year":"2010","unstructured":"Borghetti, J., Snider, G.S., Kuekes, P.J., Yang, J.J., Stewart, D.R., Williams, R.S.: \u2018Memristive\u2019 switches enable \u2018stateful\u2019 logic operations via material implication. Nature 464(7290), 873\u2013876 (2010)","journal-title":"Nature"},{"issue":"8","key":"44_CR13","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/TCSII.2015.2433536","volume":"62","author":"S Kvatinsky","year":"2015","unstructured":"Kvatinsky, S., Ramadan, M., Friedman, E.G., Kolodny, A.: VTEAM: a general model for voltage-controlled memristors. IEEE Trans. Circuits Syst. II Express Briefs 62(8), 786\u2013790 (2015). \nhttps:\/\/doi.org\/10.1109\/TCSII.2015.2433536","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"44_CR14","doi-asserted-by":"publisher","unstructured":"Shao, F., Chang, Z., Zhang, Y.: AES encryption algorithm based on the high performance computing of GPU.\u00a0In: 2010 Second International Conference on Communication Software and Networks, Singapore, pp. 588\u2013590 (2010). \nhttps:\/\/doi.org\/10.1109\/iccsn.2010.124","DOI":"10.1109\/iccsn.2010.124"},{"key":"44_CR15","doi-asserted-by":"publisher","unstructured":"Chen, D., Qing, D., Wang, D.: AES key expansion algorithm based on 2D logistic mapping. In: \u00a02012 Fifth International Workshop on Chaos-fractals Theories and Applications, Dalian, pp. 207\u2013211 (2012). \nhttps:\/\/doi.org\/10.1109\/iwcfta.2012.81","DOI":"10.1109\/iwcfta.2012.81"},{"key":"44_CR16","doi-asserted-by":"publisher","unstructured":"Rao, F., Tan, J.: Energy consumption research of AES encryption algorithm in ZigBee. In: International Conference on Cyberspace Technology (CCT 2014), Beijing, pp. 1\u20136 (2014). \nhttps:\/\/doi.org\/10.1049\/cp.2014.1330","DOI":"10.1049\/cp.2014.1330"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-60248-2_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T11:13:10Z","timestamp":1601377990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-60248-2_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030602475","9783030602482"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-60248-2_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/ica3pp2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"495","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"142","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"305","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}