{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:06:31Z","timestamp":1730225191132,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/hpcs48598.2019.9188113","type":"proceedings-article","created":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T16:58:33Z","timestamp":1599670713000},"page":"152-158","source":"Crossref","is-referenced-by-count":1,"title":["Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms"],"prefix":"10.1109","author":[{"given":"Sebastian","family":"Litzinger","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Korber","sequence":"additional","affiliation":[]},{"given":"Jorg","family":"Keller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The Skein Hash Function Family","author":"ferguson","year":"2008","journal-title":"Submission to NIST (Round 3)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6101"},{"key":"ref12","article-title":"Gr&#x00F8;stl &#x2013; a SHA-3 candidate","author":"gauravaram","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"key":"ref13","first-page":"1","article-title":"big.LITTLE Processing with ARM Cortex-A15 & Cortex-A7","author":"greenhalgh","year":"2011","journal-title":"ARM"},{"key":"ref14","article-title":"Workload type-aware scheduling on big.LITTLE platforms","author":"holmbacka","year":"2018","journal-title":"Proc ICA3PP"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/998300.997173"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1660","DOI":"10.3844\/ajassp.2012.1660.1667","article-title":"Enhanced rsacrt for energy efficient authentication to wireless sensor networks security","volume":"9","author":"kalyani","year":"2012","journal-title":"American Journal of Applied Sciences"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PATMOS.2013.6662176"},{"key":"ref18","first-page":"1","article-title":"Utilization-aware load balancing for the energy efficient operation of the big.LITTLE processor","author":"kim","year":"2014","journal-title":"Design Automation & Test in Europe Conference & Exhibition (DATE)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.317"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2015.7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_32"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1549-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2011.17"},{"key":"ref6","article-title":"The keccak sha-3 submission","author":"bertoni","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"key":"ref29","article-title":"The Hash Function JH","author":"wu","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"key":"ref5","first-page":"1","article-title":"Keying Hash Functions for Message Authentication","author":"bellare","year":"1996","journal-title":"Proc CRYPTO 1996"},{"key":"ref8","first-page":"46","article-title":"Modelling power consumption of the intel SCC","author":"cichowski","year":"2012","journal-title":"6th Many-core Applications Research Community (MARC) Symposium Proceedings of the 6th MARC Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790103"},{"key":"ref2","first-page":"1","article-title":"SHA-3 proposal BLAKE","author":"aumasson","year":"2010","journal-title":"SHA3 competition"},{"key":"ref9","article-title":"The Transport Layer Security (TLS) Protocol","author":"dierks","year":"2008","journal-title":"IETF RFC 5246"},{"journal-title":"ARM White paper","article-title":"ARM. big.LITTLE Technology: The Future of Mobile","year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2018.8449391"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1201\/9780203489802","author":"leung","year":"2004","journal-title":"Handbook of Scheduling"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1023\/A:1022864617640","article-title":"Scheduling techniques for reducing leakage power in hard real-time systems","author":"lee","year":"2003","journal-title":"Proc of the Euromicro Conference on Real-Time Systems"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2787800"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1023833.1023854"},{"key":"ref25","first-page":"1","article-title":"National Institute of Standards and Technology","year":"2002","journal-title":"Specifications for the Secure Hash Standard - FIPS PUB 180-2 Computing"}],"event":{"name":"2019 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2019,7,15]]},"location":"Dublin, Ireland","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9183768\/9188050\/09188113.pdf?arnumber=9188113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:49:05Z","timestamp":1658080145000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9188113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/hpcs48598.2019.9188113","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}