{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:45:43Z","timestamp":1730220343781,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/etfa.2008.4638587","type":"proceedings-article","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T18:08:47Z","timestamp":1223402927000},"page":"1449-1456","source":"Crossref","is-referenced-by-count":2,"title":["Comparison of FPGA-based implementation alternatives for complex algorithms in networked embedded systems - the encryption example"],"prefix":"10.1109","author":[{"given":"Enrico","family":"Heinrich","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Staamann","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Joost","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Salomon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0302-6"},{"key":"17","first-page":"1364","article-title":"ieee standard for verilog hardware description language","year":"2005","journal-title":"IEEE Standard"},{"journal-title":"Advanced Encryption Standard (AES) Implementation in C\/C","year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.66"},{"key":"16","first-page":"1076","article-title":"ieee standard vhdl language reference manual","year":"2002","journal-title":"IEEE Standard"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2006.014859"},{"key":"11","article-title":"introduction to multilevel security","volume":"3","author":"smith","year":"2005","journal-title":"Handbook of Information Security"},{"year":"0","key":"12"},{"year":"0","key":"3"},{"journal-title":"Cryptography Theory and Practice Chapman & Hall \/ CRC","year":"2002","author":"stinson","key":"20"},{"year":"0","key":"2"},{"journal-title":"Nios II software developer's handbook","year":"2007","key":"1"},{"journal-title":"MicroBlaze Processor Reference Guide XILINX Document UG081 (v5 0)","year":"2005","key":"10"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"journal-title":"Nios Development Board Cyclone II Edition Reference Manual","year":"2007","key":"4"},{"journal-title":"LEON2 Processor User's Manual-XST","year":"2005","author":"resarch","key":"9"},{"journal-title":"Advanced Encryption Standard (AES)","year":"2001","key":"8"}],"event":{"name":"Factory Automation (ETFA 2008)","start":{"date-parts":[[2008,9,15]]},"location":"Hamburg, Germany","end":{"date-parts":[[2008,9,18]]}},"container-title":["2008 IEEE International Conference on Emerging Technologies and Factory Automation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4631965\/4638343\/04638587.pdf?arnumber=4638587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:57:59Z","timestamp":1489676279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4638587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/etfa.2008.4638587","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}