{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:04:20Z","timestamp":1725883460292},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319565378"},{"type":"electronic","value":"9783319565385"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56538-5_11","type":"book-chapter","created":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T02:10:58Z","timestamp":1490667058000},"page":"105-114","source":"Crossref","is-referenced-by-count":3,"title":["Building a Unified Middleware Architecture for Security in IoT"],"prefix":"10.1007","author":[{"given":"Alexandru","family":"Vulpe","sequence":"first","affiliation":[]},{"given":"\u015etefan-Ciprian","family":"Arseni","sequence":"additional","affiliation":[]},{"given":"Ioana","family":"Marcu","sequence":"additional","affiliation":[]},{"given":"Carmen","family":"Voicu","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"11_CR1","unstructured":"Biryukov, A., Perrin, L.: Lightweight cryptography lounge (2015). http:\/\/cryptolux.org\/index.php\/Lightweight_Cryptography"},{"key":"11_CR2","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The Simon and speck of lightweight block ciphers, National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, June 2013"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Yalla, P., Kaps, J-P.: Lightweight cryptography for FPGAs. In: International Conference on Reconfigurable Computing and FPGAs, pp. 225\u2013230 (2009). doi: 10.1109\/ReConFig.2009.54","DOI":"10.1109\/ReConFig.2009.54"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very compact FPGA implementation of the AES algorithm. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 319\u2013333. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45238-6_26"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"von Maurich, I., G\u00fcneysu, T.: Lightweight code-based cryptography: QC-MDPC McEliece encryption on reconfigurable devices. In: Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE2014.051"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Fan, X., Gong, G., Lauffenburger, K., Hicks, T.: FPGA implementations of the hummingbird cryptographic algorithm. In: IEEE International Symposium on HardwareOriented Security and Trust (HOST), pp. 48\u201351, June 2010","DOI":"10.1109\/HST.2010.5513116"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Saha, S., Islam, MR., Rahman, H., Hassan, M., Hossain, A.A.: Design and implementation of block cipher in hummingbird algorithm over FPGA. In: Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1\u20135 (2014). doi: 10.1109\/ICCCNT.2014.6963084","DOI":"10.1109\/ICCCNT.2014.6963084"},{"key":"11_CR8","unstructured":"Beaulieu, R., Shors, D., Smith, J.: SIMON and SPECK: Block ciphers for the internet of things, Cryptology ePrint, Archive, Report 2015\/585 (2015). http:\/\/eprint.iacr.org\/2015\/585"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Feizi, S., Ahmadi, A., Nemati, A.: A hardware implementation of simon cryptography algorithm. In: 4th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 245\u2013250 (2014). doi: 10.1109\/ICCKE.2014.6993386","DOI":"10.1109\/ICCKE.2014.6993386"},{"key":"11_CR10","unstructured":"Kumar, M., Pal, S.K., Panigrahi, A.: FeW: A Lightweight Block Cipher, Scientific Analysis Group, DRDO, Delhi, India, Department of Mathematics, University of Delhi, India (2014)"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Nemati, A., Feizi, S., Ahmadi, A., Haghiri, S., Ahmadi, M., Alirezaee, S.: An efficient hardware implementation of FeW lightweight block cipher. In: The International Symposium on Artificial Intelligence and Signal Processing (AISP), pp. 273\u2013278 (2015). doi: 10.1109\/AISP.2015.7123493","DOI":"10.1109\/AISP.2015.7123493"},{"key":"11_CR12","isbn-type":"print","first-page":"73","volume-title":"The Most In-Depth Hacker\u2019s Guide","author":"D Khan","year":"2015","unstructured":"Khan, D.: The Most In-Depth Hacker\u2019s Guide, p. 73. Lulu.com, Raleigh (2015). ISBN 1329727681","ISBN":"http:\/\/id.crossref.org\/isbn\/1329727681"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Jungk, B., Lima, L.R., Hiller, M.: A systematic study of lightweight hash functions on FPGAs. In: International Conference on ReConFigurable Computing and FPGAs (ReConFig14), pp. 1\u20136 (2014). doi: 10.1109\/ReConFig.2014.7032493","DOI":"10.1109\/ReConFig.2014.7032493"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Arseni, S., Mi\u0163oi, M., Vulpe, A.: PASS-IoT: a platform for studying security, privacy and trust in IoT. In: 11th International Conference on Communications (COMM 2016), Bucharest, Romania, 9\u201311 June 2016. ISBN:978-1-4673-8196-3","DOI":"10.1109\/ICComm.2016.7528258"},{"key":"11_CR15","unstructured":"Some lightweight cryptography algorithms optimized for x86. https:\/\/github.com\/rb-anssi\/lightweight-crypto-lib . Accessed Sep 2016"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56538-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T07:17:23Z","timestamp":1568963843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56538-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319565378","9783319565385"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56538-5_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}