{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T22:01:44Z","timestamp":1748728904597},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icecs.2004.1399745","type":"proceedings-article","created":{"date-parts":[[2005,3,31]],"date-time":"2005-03-31T18:26:51Z","timestamp":1112293611000},"page":"571-574","source":"Crossref","is-referenced-by-count":23,"title":["Comparison of the hardware architectures and FPGA implementations of stream ciphers"],"prefix":"10.1109","author":[{"given":"M.D.","family":"Galanis","sequence":"first","affiliation":[]},{"given":"P.","family":"Kitsos","sequence":"additional","affiliation":[]},{"given":"G.","family":"Kostopoulos","sequence":"additional","affiliation":[]},{"given":"N.","family":"Sklavos","sequence":"additional","affiliation":[]},{"given":"O.","family":"Koufopavlou","sequence":"additional","affiliation":[]},{"given":"C.E.","family":"Goutis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"European Telecommunications Standards Institute (ETSI)","article-title":"Recommendation GSM 02.09","year":"0","key":"3"},{"journal-title":"Specification of the Bluetooth System","year":"2001","key":"2"},{"key":"10","first-page":"397","article-title":"A CPLD-based RC4 cracking system","author":"hu","year":"1999","journal-title":"Proc IEEE Canadian Conf Electrical and Computer Engineering"},{"journal-title":"Intel Technology Journal Q2","article-title":"Overview of IEEE 802.11b security","year":"2000","key":"1"},{"journal-title":"National Institute of Standards and Technology (NIST)","article-title":"Recommendation for block cipher modes of operation. Methods and techniques","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.806129"},{"key":"5","article-title":"The W7 stream cipher algorithm","author":"thomas","year":"2002","journal-title":"Internet draft"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39887-5_24","article-title":"Helix: Fast encryption and authentication in a single cryptographic primitive","author":"ferguson","year":"2003","journal-title":"Proc Fast Software Encryption"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2003.1562548"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186722"},{"key":"11","first-page":"2289","article-title":"Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals","author":"flamalainen","year":"2000","journal-title":"European Signal Processing Conference (EUSIPCO)"},{"journal-title":"Xilinx Inc","year":"2004","key":"12"}],"event":{"name":"2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004.","location":"Tel Aviv, Israel"},"container-title":["Proceedings of the 2004 11th IEEE International Conference on Electronics, Circuits and Systems, 2004. ICECS 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9627\/30421\/01399745.pdf?arnumber=1399745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T17:51:07Z","timestamp":1497635467000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1399745\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icecs.2004.1399745","relation":{},"subject":[]}}