{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:47:29Z","timestamp":1771890449322,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000028","name":"SRC","doi-asserted-by":"publisher","award":["GRC2971.001"],"award-info":[{"award-number":["GRC2971.001"]}],"id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,29]]},"DOI":"10.1109\/isdfs60797.2024.10527312","type":"proceedings-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T17:33:23Z","timestamp":1715794403000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["Efficient Programable Architecture for LWC NIST FIPS Standard ASCON"],"prefix":"10.1109","author":[{"given":"Islam","family":"Elsadek","sequence":"first","affiliation":[{"name":"The Ohio State University,Department of Electrical and Computer Engineering"}]},{"given":"Eslam Yahya","family":"Tawfik","sequence":"additional","affiliation":[{"name":"The Ohio State University,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Lightweight Cryptography: Project Overview"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8454"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"ref4","article-title":"Crypto competitions: CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/iscas48785.2022.9937643"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/socc56010.2022.9908100"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3052184"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icecs202256217.2022.9971037"},{"key":"ref9","volume-title":"Energy Efficient Hardware Implementations of CAESAR Submissions","author":"Fivez","year":"2016"}],"event":{"name":"2024 12th International Symposium on Digital Forensics and Security (ISDFS)","location":"San Antonio, TX, USA","start":{"date-parts":[[2024,4,29]]},"end":{"date-parts":[[2024,4,30]]}},"container-title":["2024 12th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10526462\/10526466\/10527312.pdf?arnumber=10527312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T05:02:42Z","timestamp":1715835762000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10527312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/isdfs60797.2024.10527312","relation":{},"subject":[],"published":{"date-parts":[[2024,4,29]]}}}