{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T11:59:39Z","timestamp":1759147179018,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/hst.2016.7495556","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T11:39:11Z","timestamp":1466854751000},"page":"55-60","source":"Crossref","is-referenced-by-count":11,"title":["Round gating for low energy block ciphers"],"prefix":"10.1109","author":[{"given":"Subhadeep","family":"Banik","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Bogdanov","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[]},{"given":"Takanori","family":"Isobe","sequence":"additional","affiliation":[]},{"given":"Harunaga","family":"Hiwatari","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Akishita","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Design of Rijndael AES - The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"ref12","first-page":"1","article-title":"Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID","author":"fan","year":"2009","journal-title":"Proceedings of the 4th International Conference for Internet Technology and Secured Transactions ICITST 2009 London UK November 9&#x2013;12 2009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","article-title":"The LED Block Cipher","volume":"6917","author":"guo","year":"2011","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"article-title":"Power management of digital circuits in deep sub-micron CMOS technologies","year":"2006","author":"henzler","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_23"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-642-33027-8_25","article-title":"Low-Latency Encryption-Is &#x201C;Lightweight= Light+ Wait&#x201D;?","author":"kne\u017eevi?","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2012"},{"key":"ref18","article-title":"An efficient implementation of a low-latency block cipher","author":"minoru","year":"2014","journal-title":"SCIS 2014 The 31st Symposium on Cryptography and Information Security Kagoshima"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/988952.989019"},{"key":"ref3","first-page":"585","article-title":"SIMON and SPECK: Block Ciphers for the Internet of Things","volume":"2015","author":"beaulieu","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume":"4727","author":"bogdanov","year":"2007","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.196"},{"key":"ref8","article-title":"A compact SHA-256 architecture for RFID tags","author":"cao","year":"2011","journal-title":"Proceedings of the 22nd IET irish signals and systems conference ISSC Trinity College Dublin"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","article-title":"PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract","volume":"7658","author":"borghoff","year":"2012","journal-title":"ASIACRYPT ser Lecture Notes in Computer Science"},{"key":"ref2","article-title":"Exploring Energy Efficiency of Lightweight Block Ciphers","author":"banik","year":"2015","journal-title":"Selected Areas in Cryptography-SAC 2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_17"},{"article-title":"Nessie Proposal: NOEKEON","year":"0","author":"daemen","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"ref21","volume":"6917","author":"preneel","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011 &#x2013; 13th International Workshop Nara Japan September 28 - October 1 2011 Proceedings ser Lecture Notes in Computer Science"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/81.841927","article-title":"Clock-gating and its application to low power design of sequential circuits","volume":"47","author":"wu","year":"2000","journal-title":"Circuits and Systems I Fundamental Theory and Applications IEEE Transactions On"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35999-6_22"}],"event":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2016,5,3]]},"location":"McLean, VA, USA","end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7489989\/7495545\/07495556.pdf?arnumber=7495556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:06:38Z","timestamp":1498323998000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7495556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/hst.2016.7495556","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}