{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T14:13:17Z","timestamp":1773583997686,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1109\/apcc49754.2021.9609933","type":"proceedings-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T15:38:56Z","timestamp":1637336336000},"page":"271-274","source":"Crossref","is-referenced-by-count":6,"title":["A Modified Argon2i Using a Tweaked Variant of Blake3"],"prefix":"10.1109","author":[{"given":"Ilona Teodora","family":"Ciocan","sequence":"first","affiliation":[{"name":"Advanced Technologies Institute,Bucharest,Romania"}]},{"given":"Evgnosia Alexandra","family":"Kelesidis","sequence":"additional","affiliation":[{"name":"Advanced Technologies Institute,Bucharest,Romania"}]},{"given":"Diana","family":"Maimut","sequence":"additional","affiliation":[{"name":"Advanced Technologies Institute,Bucharest,Romania"}]},{"given":"Luciana","family":"Morogan","sequence":"additional","affiliation":[{"name":"Military Technical Academy &#x201C;Ferdinand I&#x201D;,Bucharest,Romania"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.31"},{"key":"ref3","year":"0","journal-title":"Password Hashing Competition"},{"key":"ref10","first-page":"17","article-title":"Intel&#x00AE; Digital Random Number Generator (DRNG) Software Implementation Guide","author":"mechalas","year":"2018","journal-title":"Intel Tech Rep"},{"key":"ref6","article-title":"The memory-hard Argon2 password hash and proof-of-work function","author":"biryukov","year":"2021","journal-title":"Internet Engineering Task Force Internet-Draft draft-irtf-cfrg-argon2&#x2013;13"},{"key":"ref5","author":"o'connor","year":"2020","journal-title":"BLAKE3 one function fast everywhere"},{"key":"ref8","article-title":"Announcing the ADVANCED ENCRYPTION STANDARD (AES)","year":"2001","journal-title":"Federal Information Processing Standards Publication 197"},{"key":"ref7","first-page":"3","article-title":"ChaCha, a variant of Salsa20","volume":"8","author":"bernstein","year":"2008","journal-title":"Workshop Record of SASC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8018"},{"key":"ref9","article-title":"Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC","author":"dworkin","year":"2007","journal-title":"NIST Special Publication"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2898"}],"event":{"name":"2021 26th IEEE Asia-Pacific Conference on Communications (APCC)","location":"Kuala Lumpur, Malaysia","start":{"date-parts":[[2021,10,11]]},"end":{"date-parts":[[2021,10,13]]}},"container-title":["2021 26th IEEE Asia-Pacific Conference on Communications (APCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9609798\/9609702\/09609933.pdf?arnumber=9609933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T19:41:46Z","timestamp":1659469306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9609933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/apcc49754.2021.9609933","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]}}}