{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T18:22:20Z","timestamp":1745346140190},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795498","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T21:49:56Z","timestamp":1482788996000},"page":"1225-1230","source":"Crossref","is-referenced-by-count":5,"title":["Implementing authenticated encryption algorithm MK-3 on FPGA"],"prefix":"10.1109","author":[{"given":"Gordon","family":"Werner","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steven","family":"Farris","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alan","family":"Kaminsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Kurdziel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Lukowiak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stanislaw","family":"Radziszowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref4","article-title":"General overview of the first-round caesar candidates for authenticated encryption","author":"farzaneh","year":"2014","journal-title":"Cryptology ePrint report 2014\/792 Tech Rep"},{"year":"0","key":"ref3","article-title":"Caesar: Competition for authenticated encryption: Security, applicability and robustness"},{"journal-title":"Large substitution boxes with efficient combinational implementations","year":"2013","author":"wood","key":"ref10"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-28496-0_19","article-title":"Duplexing the sponge: single-pass authenticated encryption and other applications","author":"bertoni","year":"2012","journal-title":"Selected Areas in Cryptography"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357416"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_5"},{"key":"ref7","article-title":"Keccak sponge function family main document","author":"bertoni","year":"2009","journal-title":"Submission to NIST (Round 2)"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/1150019.1136502","article-title":"Improving cost, performance, and security of memory encryption and authentication","author":"yan","year":"2006","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357417"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44987-6_32","article-title":"Encryption modes with almost free message integrity","author":"jutla","year":"2001","journal-title":"Advances in Cryptology ? EUROCRYPT 2001"}],"event":{"name":"MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795498.pdf?arnumber=7795498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T23:53:09Z","timestamp":1568677989000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7795498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795498","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}