{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:46:08Z","timestamp":1730227568085,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/icacci.2018.8554562","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:17:32Z","timestamp":1543886252000},"page":"401-406","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing Data Security using Obfuscated 128-bit AES Algorithm - An Active Hardware Obfuscation Approach at RTL Level"],"prefix":"10.1109","author":[{"given":"Surbhi","family":"Chhabra","sequence":"first","affiliation":[]},{"given":"Kusum","family":"Lata","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/92.931230"},{"key":"ref11","volume":"6","author":"stallings","year":"2014","journal-title":"Cryptography and network security principles and practice Pearson London"},{"key":"ref12","first-page":"344","article-title":"Biclique cryptanalysis of the full aes","author":"bogdanov","year":"2011","journal-title":"Advances in Cryptology-Asiacrypt"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/VLSI.Design.2010.29"},{"key":"ref14","first-page":"63","article-title":"Cryptographic schemes based on the asasa structure: Black-box, white-box, and public-key","author":"biryukov","year":"2014","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICCAD.2013.6691207"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/43.952740"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TVLSI.2015.2437996"},{"key":"ref18","first-page":"1","article-title":"Chip editor: leveraging circuit edit for logic obfuscation and trusted fabrication","author":"shakya","year":"2016","journal-title":"IEEE\/ACM International Conference on Computer-Aided Design (ICCAD)"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CISIM.2007.51"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"17","DOI":"10.14257\/ijsia.2017.11.3.02","article-title":"Data encryption using advanced encryption standard with key generation by elliptic curve diffie-hellman","volume":"11","author":"sharma","year":"2017","journal-title":"International Journal of Security and its Applications"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TCAD.2009.2028166"},{"key":"ref3","first-page":"1","article-title":"Announcing the advanced encryption standard (aes)","volume":"197","author":"standard","year":"2001","journal-title":"Federal Information Processing Standards Publication"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/INVENTIVE.2016.7830170"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICITECH.2017.8080056"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MWSCAS.2005.1594143"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.2991\/icssr-13.2013.158","article-title":"The reseach of aes algorithm and application in cloud storage system","author":"fang","year":"2013","journal-title":"International Conference on Science and Social Research"},{"key":"ref2","first-page":"7","article-title":"A brief introduction to modern cryptography","author":"rodriguez-henriquez","year":"2007","journal-title":"Cryptographic Algorithms on Reconfigurable Hardware"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/MILCOM.2010.5680130"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/VLSI.Design.2010.54"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ARES.2014.32"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/MC.2010.284"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s10836-011-5255-2"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.5121\/vlsic.2012.3402"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.21236\/ADA597771"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.jksuci.2016.01.004"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-319-49019-9_2"}],"event":{"name":"2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2018,9,19]]},"location":"Bangalore","end":{"date-parts":[[2018,9,22]]}},"container-title":["2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536361\/8554361\/08554562.pdf?arnumber=8554562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:06:12Z","timestamp":1643288772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icacci.2018.8554562","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}