{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:31:48Z","timestamp":1729643508673,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/iccd.2010.5647756","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T10:42:09Z","timestamp":1291891329000},"page":"253-259","source":"Crossref","is-referenced-by-count":1,"title":["Pulse latch based FSRs for low-overhead hardware implementation of cryptographic algorithms"],"prefix":"10.1109","author":[{"given":"Shohreh","family":"Sharif Mansouri","sequence":"first","affiliation":[]},{"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2004.1261850"},{"key":"35","first-page":"332","article-title":"Low-overhead implementation of a soft decision helper data algorithm for sram pufs","author":"maes","year":"2009","journal-title":"CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01388561"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2010.2041845"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/43.503935"},{"key":"33","article-title":"Lfsr counter implementation in cmos vlsi","volume":"48","author":"doshi","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"journal-title":"Shift Register Sequences","year":"1982","author":"golomb","key":"15"},{"key":"34","first-page":"197","article-title":"A low-cost implementation of trivium","author":"mentens","year":"2008","journal-title":"ECRYPT Workshop"},{"journal-title":"Stream Ciphers","year":"1994","author":"robshaw","key":"16"},{"journal-title":"Random Testing of Digital Circuits","year":"1998","author":"david","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2004.831584"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/WMED.2004.1297351"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_15"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.195"},{"journal-title":"Layout Suite L User Guide Product Version 6 1 4","year":"2009","key":"21"},{"journal-title":"Virtuoso Spectre Circuit Simulator User Guide Product Version 7 2","year":"2009","key":"20"},{"key":"22","doi-asserted-by":"crossref","first-page":"3626","DOI":"10.1109\/TNS.2004.839154","article-title":"Edge triggered pulse latch design with delayed latching edge for radiation hardened application","volume":"51","author":"wang","year":"2004","journal-title":"Nuclear Science"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45716-X_14"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/504914.504924"},{"journal-title":"Encounter User Guide Product Version 8 1 3","year":"2009","key":"25"},{"journal-title":"Cryptography for Ultra-Low Power Devices","year":"2006","author":"j-p","key":"26"},{"key":"27","first-page":"357","article-title":"Strong authentication for RFID systems using the AES algorithm","volume":"3156","author":"feldhofer","year":"2004","journal-title":"CHES"},{"key":"28","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/ICMB.2005.2","article-title":"A feasible security mechanism for low cost RFID tags","author":"chang","year":"2005","journal-title":"Proceedings of the International Conference on Mobile Business"},{"journal-title":"Digital Integrated Circuits- A Design Perspective","year":"2004","author":"rabaey","key":"29"},{"key":"3","article-title":"Feedback shift registers","volume":"169","author":"ronce","year":"1984","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/0471723703"},{"key":"10","first-page":"152","article-title":"Achterbahn-128\/80: Design and analysis","author":"gammel","year":"2007","journal-title":"SASC'2007 Workshop Record of The State of the Art of Stream Ciphers"},{"key":"1","article-title":"Digital design and fabrication","author":"oklobdzija","year":"2007","journal-title":"The Computer Engineering Handbook"},{"key":"30","article-title":"An improved hardware implementation of the grain stream cipher","author":"mansouri","year":"2009","journal-title":"CoRR"},{"key":"7","article-title":"Dragon: A fast word based stream cipher","author":"chen","year":"2005","journal-title":"ESTREAM ECRYPT Stream Cipher Project"},{"key":"6","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","article-title":"Trivium","author":"cannie?re","year":"2008","journal-title":"New Stream Cipher Designs The eSTREAM Finalists"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675298"},{"key":"5","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-540-68351-3_19","article-title":"ASIC hardware performance","author":"good","year":"2008","journal-title":"New Stream Cipher Designs The eSTREAM Finalists"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2030467"},{"key":"4","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-540-68351-3_14","article-title":"The Grain family of stream ciphers","author":"hell","year":"2008","journal-title":"New Stream Cipher Designs The eSTREAM Finalists"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1693235"},{"key":"8","article-title":"A presentation on VEST hardware performance, chip area measurements, power consumption estimates and benchmarking in relation to the AES, SHA-256 and SHA-512","author":"gittins","year":"2005","journal-title":"Cryptology EPrint Archive Report 415"}],"event":{"name":"2010 IEEE International Conference on Computer Design (ICCD 2010)","start":{"date-parts":[[2010,10,3]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2010,10,6]]}},"container-title":["2010 IEEE International Conference on Computer Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5640356\/5647518\/05647756.pdf?arnumber=5647756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:03:13Z","timestamp":1497877393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5647756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/iccd.2010.5647756","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}