{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:16:54Z","timestamp":1730290614154,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/prime.2018.8430366","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T19:56:49Z","timestamp":1534535809000},"page":"85-88","source":"Crossref","is-referenced-by-count":2,"title":["Encryption of test data: which cipher is better?"],"prefix":"10.1109","author":[{"given":"Mathieu","family":"Da Silva","sequence":"first","affiliation":[]},{"given":"Emanuele","family":"Valea","sequence":"additional","affiliation":[]},{"given":"Marie-Lise","family":"Flottes","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Dupuis","sequence":"additional","affiliation":[]},{"given":"Giorgio","family":"Di Natale","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Rouzeyre","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"TRIVIUM Specifications","author":"de canniere","year":"2005","journal-title":"ECRYPT Stream Cipher Project Report"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2010.9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2011.5783765"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST.2016.7835558"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2017.7968248"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031543"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VTS.2012.6231061"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2011.30"},{"key":"ref6","volume":"2001","author":"committee","year":"1990","journal-title":"IEEE standard test access port and boundary scan architecture"},{"key":"ref5","first-page":"234","article-title":"New scan-based attack using only the test mode","author":"subidh ali","year":"2013","journal-title":"In International Conference on Very Large Scale Integration (VLSI-SoC)"},{"year":"0","key":"ref8"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2005.193787"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","author":"daemen","year":"2002","journal-title":"The Design of Rijndael"},{"key":"ref9","first-page":"450","author":"bogdanov","year":"2007","journal-title":"PRESENT An Ultra-Lightweight Block Cipher CHES 2007 LNCS 4727"}],"event":{"name":"2018 14th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME)","start":{"date-parts":[[2018,7,2]]},"location":"Prague","end":{"date-parts":[[2018,7,5]]}},"container-title":["2018 14th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410979\/8430100\/08430366.pdf?arnumber=8430366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:03:56Z","timestamp":1598238236000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8430366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/prime.2018.8430366","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}