{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:29:50Z","timestamp":1745386190758,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61874140"],"award-info":[{"award-number":["61874140"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hunan Science Project Foundation","award":["2018xk2102"],"award-info":[{"award-number":["2018xk2102"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3057866","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T07:23:42Z","timestamp":1612855422000},"page":"28377-28392","source":"Crossref","is-referenced-by-count":3,"title":["Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5480-2939","authenticated-orcid":false,"given":"Yufei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Zuocheng","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Jinhui","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Zerun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5919-918X","authenticated-orcid":false,"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongzhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2011.21"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2687463"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.251"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2015.7168850"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5381-z"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2432063"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2015.2504871"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7405707"},{"key":"ref34","first-page":"52","article-title":"Reconfigurable cluster block cipher processing architecture","volume":"31","author":"li","year":"2014","journal-title":"Com App Soft China"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523941"},{"key":"ref11","first-page":"321","article-title":"Block cipher modes of operation from a hardware implementation perspective","author":"debrup","year":"2009","journal-title":"Cryptographic Engineering"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501655"},{"key":"ref13","first-page":"115","article-title":"LTE\/SAE security issues on 4G wireless networks","volume":"45","author":"anastasios","year":"2013","journal-title":"IEEE Security Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s41928-019-0355-6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2933899"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426313"},{"key":"ref17","first-page":"293","article-title":"A very compact hardware implementation of the KASUMI block cipher","author":"dai","year":"2010","journal-title":"Information Security Theory and Practices Security and Privacy of Pervasive Systems and Smart Devices"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38853-8_7"},{"key":"ref19","first-page":"56","author":"tim","year":"2015","journal-title":"Lightweight Cryptography for Security and Privacy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.172"},{"journal-title":"3Gpp System Architecture Evolution Security Architecture","year":"2017","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-013-0256-7"},{"journal-title":"3G Security Security Architecture","year":"2014","key":"ref3"},{"journal-title":"View on 5G Architecture","year":"2016","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2620437"},{"journal-title":"5G Network Technology Architecture","year":"2015","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2419662"},{"journal-title":"Study on the security aspects of the next generation system","year":"2017","key":"ref7"},{"journal-title":"5G security scenarios and solutions","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2744650"},{"journal-title":"5G Network Security Requirements And Architecture","year":"2017","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDP7174"},{"key":"ref22","first-page":"53","author":"hennessy","year":"2013","journal-title":"Computer Architecture A Quantitative Approach"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2785799"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2011.10.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2016.08.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2007.909331"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CCOMS.2018.8463342"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09350281.pdf?arnumber=9350281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:43Z","timestamp":1639771003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9350281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3057866","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}