{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:56:35Z","timestamp":1771700195255,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/iscas.2018.8351145","type":"proceedings-article","created":{"date-parts":[[2018,5,4]],"date-time":"2018-05-04T18:00:05Z","timestamp":1525456805000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Hardware Accelerator for NORX Authenticated Encryption"],"prefix":"10.1109","author":[{"given":"Sachin","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Jawad","family":"Haj-Yahya","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21702-9_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_16"},{"key":"ref13","year":"2017","journal-title":"ATHENa Automated Tool for Hardware EvaluatioN"},{"key":"ref14","first-page":"237","article-title":"Sat-based cryptanalysis of authenticated ciphers from the caesar competition","author":"dwiedi","year":"2017","journal-title":"14th International Joint Conference on e-Business and Telecommunications (ICETE 2017)"},{"key":"ref15","first-page":"320","author":"bertoni","year":"2012","journal-title":"Duplexing the Sponge Single-Pass Authenticated Encryption and Other Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9026-x"},{"key":"ref3","article-title":"Failures of secret-key cryptography","author":"bernstein","year":"2013","journal-title":"Invited talk at FSE at 20th International Workshop on Fast Software Encryption"},{"key":"ref6","article-title":"CAESAR submissions","year":"2016","journal-title":"CAESAR Competition"},{"key":"ref5","author":"dworkin","year":"2007","journal-title":"Sp 800-38d recommendation for block cipher modes of operation Galois\/counter mode (gem) and gmac"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937529"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.07.002"},{"key":"ref2","article-title":"The cwc authenticated encryption (associated data) mode","author":"kohno","year":"2003","journal-title":"ePrint Archive"},{"key":"ref1","author":"bellare","year":"2003","journal-title":"A conventional authenticated-encryption mode"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_2"}],"event":{"name":"2018 IEEE International Symposium on Circuits and Systems (ISCAS)","location":"Florence","start":{"date-parts":[[2018,5,27]]},"end":{"date-parts":[[2018,5,30]]}},"container-title":["2018 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8334884\/8350884\/08351145.pdf?arnumber=8351145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T20:54:33Z","timestamp":1571691273000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8351145\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscas.2018.8351145","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}