{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:12Z","timestamp":1763507712114},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/milcom.2015.7357416","type":"proceedings-article","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T21:54:21Z","timestamp":1450389261000},"page":"43-48","source":"Crossref","is-referenced-by-count":14,"title":["Customizable sponge-based authenticated encryption using 16-bit S-boxes"],"prefix":"10.1109","author":[{"given":"Matthew","family":"Kelly","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alan","family":"Kaminsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Kurdziel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Lukowiak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stanislaw","family":"Radziszowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"article-title":"Duplexing the sponge: single-pass authenticated encryption and other applications","year":"2010","author":"bertoni","key":"ref11"},{"key":"ref12","article-title":"Beyond 2c\/2 Security in Sponge-Based Authenticated Encryption Modes","author":"jovanovic","year":"2014","journal-title":"Cryptology ePrint Archive Report"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref13"},{"journal-title":"Federal Information Processing Standards Publication 197","article-title":"Specification for the Advanced Encryption Standard (AES)","year":"2001","key":"ref14"},{"key":"ref15","article-title":"Design and Cryptanalysis of a Customizable Authenticated Encryption Algorithm","author":"kelly","year":"2014","journal-title":"Rochester Institute of Technology"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"article-title":"Block Cipher Analysis","year":"2014","author":"kaminsky","key":"ref17"},{"article-title":"Parallel Java 2 Library","year":"2014","author":"kaminsky","key":"ref18"},{"article-title":"CryptoMiniSat","year":"2014","author":"soos","key":"ref19"},{"journal-title":"Cryptography Engineering","year":"2010","author":"ferguson","key":"ref4"},{"article-title":"A Critique of CCM","year":"2003","author":"rogaway","key":"ref3"},{"article-title":"Large Substitution Boxes with Efficient Combinational Implementations","year":"2013","author":"wood","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179704"},{"key":"ref8","article-title":"Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition","author":"chang","year":"2012","journal-title":"NIST Internal Report 7896"},{"key":"ref7","article-title":"The Keccak reference","author":"bertoni","year":"2011","journal-title":"NIST SHA-3 Submission Document"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_6"},{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"ref1"},{"article-title":"Cryptographic Sponge Functions","year":"2011","author":"bertoni","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_33"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-45537-X_8","article-title":"A Simple Algebraic Representation of Rijndael","author":"ferguson","year":"2001","journal-title":"Selected Areas in Cryptography"}],"event":{"name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","start":{"date-parts":[[2015,10,26]]},"location":"Tampa, FL, USA","end":{"date-parts":[[2015,10,28]]}},"container-title":["MILCOM 2015 - 2015 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7347040\/7357245\/07357416.pdf?arnumber=7357416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T17:08:16Z","timestamp":1567444096000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7357416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/milcom.2015.7357416","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}