{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:18Z","timestamp":1767339918852},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/iscas.2019.8702231","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T21:02:28Z","timestamp":1556744548000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["High Throughput\/Gate FN-Based Hardware Architectures for AES-OTR"],"prefix":"10.1109","author":[{"given":"Rei","family":"Ueno","sequence":"first","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Tomonori","family":"Iida","sequence":"additional","affiliation":[]},{"given":"Kazuhiko","family":"Minematsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/937527.937529"},{"key":"ref11","first-page":"144","article-title":"2Gbit\/s hardware realizations of RIJNDAEL and SERPENT: A comparative analysis","author":"lutz","year":"2002","journal-title":"CHES"},{"journal-title":"Nangate FreePDK45 Open Cell Library","year":"2016","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.217"},{"key":"ref14","first-page":"538","article-title":"A high throughput\/gate AES hardware architecture by compressing encryption and decryption datapaths&#x2014;toward efficient CBC-mode implementation","author":"ueno","year":"2016","journal-title":"CHES"},{"key":"ref15","first-page":"63","article-title":"Highly efficient GF (28) inversion circuit based on redundant GF arithmetic and its application to AES design","author":"ueno","year":"2015","journal-title":"CHES"},{"journal-title":"NIST Special Publication 800-38A","article-title":"Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC","year":"2007","key":"ref4"},{"journal-title":"NIST Special Publication 800-38A","article-title":"Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality","year":"2004","key":"ref3"},{"journal-title":"ATHENa Automated Tool for Hardware EvaluatioN","year":"2016","key":"ref6"},{"journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_16"},{"journal-title":"Authenticated encryption Relations among notations nad analysis of the generic composition paradigm (full version)","year":"2018","author":"bellare","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.42"},{"journal-title":"Here Come the ? Ninjas","year":"2011","author":"duong","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_2"}],"event":{"name":"2019 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2019,5,26]]},"location":"Sapporo, Japan","end":{"date-parts":[[2019,5,29]]}},"container-title":["2019 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8682239\/8702066\/08702231.pdf?arnumber=8702231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:08:46Z","timestamp":1657854526000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8702231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscas.2019.8702231","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}