{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:22:56Z","timestamp":1743078176590,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359491"},{"type":"electronic","value":"9789811359507"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5950-7_2","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T21:31:33Z","timestamp":1548365493000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["High Level Synthesis and Implementation of Cryptographic Algorithm in AHIR Platform"],"prefix":"10.1007","author":[{"given":"Abhimanniu","family":"Raveendran","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Dhok","sequence":"additional","affiliation":[]},{"given":"Rajendra","family":"Patrikar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Sahasrabuddhe, S.D., Raja, H., Arya, K., Desai, M.P.: AHIR: a hardware intermediate representation for hardware generation from high-level languages. In: 20th International Conference on VLSI Design, January 2007","DOI":"10.1109\/VLSID.2007.28"},{"key":"2_CR2","unstructured":"Arvind, Nikhil, R., Rosenband, D., Dave, N.: High-level synthesis: an essential ingredient for designing complex ASICs. In: International Conference on Computer Aided Design (ICCAD 2004), November 2004"},{"key":"2_CR3","unstructured":"Sahasrabuddhe, S.D.: A competitive pathway from high-level programs to hardware. Ph.D. dissertation, IIT Bombay (2009)"},{"key":"2_CR4","unstructured":"AhirV2: from algorithms to hardware-An overview Madhav Desai Department of Electrical Engineering Indian Institute of Technology, Mumbai, 400076, India, 22 February 2015"},{"key":"2_CR5","unstructured":"Budiu, M., Goldstein, S.C.: Pegasus: an efficient intermediate representation. School of Computer Science, Carnegie Mellon University, Technical report, April 2002"},{"key":"2_CR6","unstructured":"Gupta, S., Dutt, N., Gupta, R., Nicolau, A.: SPARK: a high-level synthesis framework for applying parallelizing compiler transformations. In: International Conference on VLSI Design, January 2003"},{"key":"2_CR7","unstructured":"ModelSim Foreign Language Interface for c VHDL Co-Simulation- by Andre Pool"},{"key":"2_CR8","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael, NIST AES Proposal. \n                    www.esat.kuleuven.ac.be\/rijmen\/rijndael\/"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). \n                    https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"key":"2_CR10","unstructured":"Light Encryption Device, Jian Guo Institute for Infocomm Research, Singapore, Thomas Peyrin Axel Poschmann Nanyang Technological University, Singapore, Matt Robshaw Applied Cryptography Group, Orange Labs, France, CHES 2011 Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems"},{"key":"2_CR11","unstructured":"A recent review on lightweight cryptography. in IoT In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, February 2017"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Analysis of lightweight cryptographic solutions for Internet of Things. Indian J. Sci. Technol. 9(28) (2016). \n                    https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i28\/98382","DOI":"10.17485\/ijst\/2016\/v9i28\/98382"}],"container-title":["Communications in Computer and Information Science","VLSI Design and Test"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5950-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:42:47Z","timestamp":1558395767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5950-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359491","9789811359507"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5950-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VDAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on VLSI Design and Test","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madurai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vdat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vdat2018.tce.edu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}