{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:52:22Z","timestamp":1725720742821},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/isncc.2017.8071975","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:19:48Z","timestamp":1508959188000},"page":"1-4","source":"Crossref","is-referenced-by-count":15,"title":["High speed efficient advanced encryption standard implementation"],"prefix":"10.1109","author":[{"given":"Soufiane","family":"Oukili","sequence":"first","affiliation":[]},{"given":"Seddik","family":"Bri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2013.6815431"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2478\/s13537-013-0112-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2013.6718392"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126616500493"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2014.0101"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2016.7527453"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2016.7805015"},{"journal-title":"Federal Information Processing Standard 197 The Advanced Encryption Standard","year":"2001","key":"ref4"},{"journal-title":"Federal Information Processing Standards Publication 46 Data Encryption Standard","year":"1999","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2004.12.001"},{"journal-title":"Aes Proposal Rijndael NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY","year":"1999","author":"joan","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.651"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2014.7082791"},{"journal-title":"Cryptography and Network Security","year":"2007","author":"kahate","key":"ref2"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2005","author":"stalling","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2012.2234891"}],"event":{"name":"2017 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2017,5,16]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2017,5,18]]}},"container-title":["2017 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8054594\/8071973\/08071975.pdf?arnumber=8071975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T20:35:23Z","timestamp":1512074123000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8071975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isncc.2017.8071975","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}