{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:14:45Z","timestamp":1729642485746,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215353","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T08:17:03Z","timestamp":1340266623000},"page":"214-219","source":"Crossref","is-referenced-by-count":1,"title":["FPGA based pipelined architecture for RC5 encryption"],"prefix":"10.1109","author":[{"given":"A. Ruhan","family":"Bevi","sequence":"first","affiliation":[]},{"given":"S. S. V.","family":"Sheshu","sequence":"additional","affiliation":[]},{"given":"S.","family":"Malarvizhi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Modifed Cryptanalysis of RC5","volume":"3","author":"hasan","year":"2006","journal-title":"The Internatioal Arab Journal of Information Tecchnology"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cds:20030574"},{"key":"12","first-page":"16","volume":"1636","author":"borst","year":"1999","journal-title":"Linear Cryptanalysis of RC5 and RC6"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2005.170"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/71.954620"},{"key":"1","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/3-540-60590-8_7","article-title":"The RC5 Encryption Algorithm","author":"rivest","year":"1995","journal-title":"Proc of the 2nd Workshop on Fast Software Encryption"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2010.5696178"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2004.1347051"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2003.1302004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.3.48-55"},{"key":"4","article-title":"Dedicated Hardware for RC5 Cryptography and its Implementation","author":"yoshikawa","year":"0","journal-title":"World Congress in Computer Science Computer Engineering and Applied Computing (WORLDCOM'11) Las Vegas Nevada USA Jul 2011"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2005.862742"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.1999.813219"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok, Thailand","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215353.pdf?arnumber=6215353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T01:05:33Z","timestamp":1561856733000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215353","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}