{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:35:48Z","timestamp":1729632948790,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029580","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"144-147","source":"Crossref","is-referenced-by-count":10,"title":["Lightweight cryptography for constrained devices"],"prefix":"10.1109","author":[{"given":"Cesare","family":"Alippi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Bogdanov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9125-6"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.196"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"15","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","article-title":"Katan and ktantana family of small and efficient hardware-oriented block ciphers","author":"de canniere","year":"2009","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2009"},{"key":"16","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","article-title":"Prince-a low-latency block cipher for pervasive computing applications","author":"borghoff","year":"2012","journal-title":"Advances in Cryptology-ASIACRYPT 2012"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_8"},{"key":"14","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"Present: An ultralightweight block cipher","volume":"4727","author":"bogdanov","year":"2007","journal-title":"CHES Ser Lecture Notes in Computer Science"},{"key":"11","article-title":"A compact sha-256 architecture for rfid tags","author":"cao","year":"2011","journal-title":"Proceedings of the 22nd IET Irish Signals and Systems Conference ISSC"},{"key":"12","article-title":"The keccak sha-3 submission","author":"bertoni","year":"2011","journal-title":"Submission to NIST (Round 3)"},{"journal-title":"Caesar Submission K v1","year":"2014","author":"bertoni","key":"21"},{"journal-title":"Federal Information Processing Standards Publication 197","article-title":"Announcing the advanced encryption standard (AES)","year":"2001","key":"3"},{"key":"20","first-page":"1","article-title":"Submission to the caesar competition","volume":"1","author":"andreeva","year":"2014","journal-title":"Primates"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5337046"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"journal-title":"Sha-3 Standard Permutation Based Hash and Extendable Output Functions","year":"2014","author":"moradi","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"key":"6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/11545262_32","article-title":"A very compact S-Box for AES","volume":"3659","author":"canright","year":"2005","journal-title":"Cryptographic Hardware and Embedded Systems i96\ufffd CHES 2005 Ser Lecture Notes in Computer Science"},{"key":"5","first-page":"323","article-title":"A systematic evaluation of compact hardware implementations for the Rijndael Sbox","volume":"2005","author":"mentens","year":"2005","journal-title":"Topics in Cryptology-CT-RSA"},{"key":"4","first-page":"239","article-title":"A Compact Rijndael hardware architecture with S-Box optimization","author":"satoh","year":"2000","journal-title":"Proc Asiacrypt'2001 LNCS"},{"journal-title":"Federal Information Processing Standards Publication FIPS FUB 180-1","article-title":"Secure hash standard (shs)","year":"2012","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","article-title":"Pushing the limits: A very compact and a threshold implementation of aes","volume":"6632","author":"moradi","year":"2011","journal-title":"EUROCRYPT Ser Lecture Notes in Computer Science"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029580.pdf?arnumber=7029580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:16:38Z","timestamp":1498180598000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029580","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}