{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:10:28Z","timestamp":1771467028423,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10725970","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Area optimised implementation of block cipher ELEPHANT for resource constrained devices in cyber physical system"],"prefix":"10.1109","author":[{"given":"Nidhi","family":"Baurai","sequence":"first","affiliation":[{"name":"National Institute of Technology, Raipur,Department of Electronics and Communication Engineering,Raipur,Chattisgarh,India,492010"}]},{"given":"Bijayananda","family":"Patnaik","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Raipur,Department of Electronics and Communication Engineering,Raipur,Chattisgarh,India,492010"}]},{"given":"Bibhudendra","family":"Acharya","sequence":"additional","affiliation":[{"name":"National Institute of Technology, Raipur,Department of Electronics and Communication Engineering,Raipur,Chattisgarh,India,492010"}]},{"given":"Zeesha","family":"Mishra","sequence":"additional","affiliation":[{"name":"Chhattisgarh Swami Vivekanand Technical University,Bhilai,Microelectronics and VLSI Department,Bhilai,Chhattisgarh,India,490023"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3268064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5310"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.31033\/ijemr.10.1.5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99007-1_38"},{"issue":"15","key":"ref5","first-page":"15","article-title":"A study of encryption algorithms AES, DES and RSA for security","volume":"13","author":"Mahajan","year":"2013","journal-title":"Global journal of computer science and technology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0160-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_28"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1201\/9781003406105-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2018.8383893"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993946"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.192-217"},{"key":"ref12","article-title":"Gift-cofb","author":"Banik","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS48785.2022.9937643"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.390-416"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-024-01416-w"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99277-4_8"},{"key":"ref17","article-title":"Status update on elephant","author":"Beyne","year":"2020","journal-title":"Note at NIST Lightweight Cryptography"},{"key":"ref18","first-page":"465","article-title":"Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption","volume-title":"Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 December, 3, Proceedings, Part II. LNCS","volume":"9453","author":"Mennink"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900051"},{"issue":"S1","key":"ref20","first-page":"5","article-title":"Improved Masking for Tweakable Block ciphers with Applications to Authenticated Encryption","volume-title":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. LNCS, vol. 9665, pp. 263-293. Springer (2016),Symmetric Cryptol","volume":"2020","author":"Granger"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.5-30"},{"key":"ref22","first-page":"312","article-title":"Spongent: A Lightweight Hash Function","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011 October, 1. Proceedings. LNCS","volume":"6917","author":"Bogdanov"},{"key":"ref23","volume-title":"The Keccak reference","author":"Bertoni","year":"2011"},{"issue":"2020","key":"ref24","first-page":"1207","article-title":"FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results","volume":"2020","author":"Mohajerani","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"ref25","first-page":"824","article-title":"Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look","volume":"2019","author":"Rezvani","year":"2019","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03726-y"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","location":"Kamand, India","start":{"date-parts":[[2024,6,24]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10725970.pdf?arnumber=10725970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:41:07Z","timestamp":1732682467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10725970\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10725970","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}