{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:12:53Z","timestamp":1755792773758,"version":"3.44.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icm.2016.7847871","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:43:31Z","timestamp":1486658611000},"page":"285-288","source":"Crossref","is-referenced-by-count":26,"title":["ASIC-oriented comparative review of hardware security algorithms for internet of things applications"],"prefix":"10.1109","author":[{"given":"Mohamed A.","family":"Bahnasawi","sequence":"first","affiliation":[{"name":"Electronics and Electrical Communications Engineering Department, Cairo University, Giza, Egypt"}]},{"given":"Khalid","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Electronics Department, Faculty of Information Engineering and Technology, German University in Cairo, Cairo, Egypt"}]},{"given":"Ahmed","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Electronics and Electrical Communications Engineering Department, Cairo University, Giza, Egypt"}]},{"given":"Mohamed Khalifa","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Electrical, Electronics and Communications Engineering Department, Faculty of Engineering, Alexandria University, Egypt"}]},{"given":"Ahmed","family":"Moustafa","sequence":"additional","affiliation":[{"name":"Electronics and Electrical Communications Engineering Department, Cairo University, Giza, Egypt"}]},{"given":"Kareem","family":"Abdelmonem","sequence":"additional","affiliation":[{"name":"Electronics and Electrical Communications Engineering Department, Cairo University, Giza, Egypt"}]},{"given":"Yehea","family":"Ismail","sequence":"additional","affiliation":[{"name":"Center for Nanoelectronics and Devices, AUC and Zewail City of Science and Technology, New Cairo, Egypt"}]},{"given":"Hassan","family":"Mostafa","sequence":"additional","affiliation":[{"name":"Electronics and Electrical Communications Engineering Department, Cairo University, Giza, Egypt"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_19"},{"journal-title":"Open core AES Core module","year":"2006","key":"ref11"},{"journal-title":"Open core 3DES (Triple DES) \/ DES","year":"2006","key":"ref12"},{"journal-title":"Open core Twofish Core","year":"2002","key":"ref13"},{"journal-title":"Open core Basic RSA Encryption Engine","year":"2003","key":"ref14"},{"key":"ref15","article-title":"Low Power State Machine Designfor AES Encryption Coprocessor","volume":"ii","author":"dong","year":"2015","journal-title":"the International Multiconference of Engineers and Computer Scientists 2015"},{"key":"ref16","first-page":"1","article-title":"Design and ASIC Implementation of Triple Data Encryption and Decryption Standard Algorithm","volume":"1","author":"rao","year":"2011","journal-title":"International Journal of Power Elecronics and Technology"},{"key":"ref17","article-title":"VLSI architecture design and implementation for TWOFISH block cipher","author":"lai","year":"2002","journal-title":"Circuits and Systems 2002 ISCAS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.548"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.203"},{"year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1201\/9781420035087","author":"mollin","year":"2005","journal-title":"Codes The Guide to Secrecy from Ancient to Modern Times"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","author":"paar","year":"2010","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"journal-title":"Cryptanalysis of Twofish (II)","year":"2000","author":"moriai","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","article-title":"A performance comparison of encryption algorithms AES and DES","volume":"4","author":"rihan","year":"2015","journal-title":"International Journal of Engineering Research & Technology (IJERT)"},{"key":"ref1","first-page":"45","article-title":"Analyzing the speed of combined cryptographic algorithms with secret and public key","volume":"8","author":"florim","year":"2013","journal-title":"International Journal of Engineering Research and Development"},{"key":"ref9","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"boneh","year":"1999","journal-title":"Notices of the American Mathematical Society (AMS)"}],"event":{"name":"2016 28th International Conference on Microelectronics (ICM)","start":{"date-parts":[[2016,12,17]]},"location":"Giza, Egypt","end":{"date-parts":[[2016,12,20]]}},"container-title":["2016 28th International Conference on Microelectronics (ICM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7835397\/7847841\/07847871.pdf?arnumber=7847871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:32Z","timestamp":1755197012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7847871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icm.2016.7847871","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}