{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T04:08:36Z","timestamp":1769573316344,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/reconfig.2017.8279790","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T22:32:24Z","timestamp":1517869944000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["Evaluation of the CAESAR hardware API for lightweight implementations"],"prefix":"10.1109","author":[{"given":"Panasayya","family":"Yalla","sequence":"first","affiliation":[]},{"given":"Jens-Peter","family":"Kaps","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2016","journal-title":"Spartan-6 FPGA Configuration User Guide UG380 (v2 9) ed"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2007.4374972"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2004.07.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44614-1_76"},{"key":"ref14","article-title":"Use of embedded FPGA resources in implementations of five round three SHA-3 candidates","author":"sharif","year":"2011","journal-title":"Ecrypt II Hash Workshop 2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.86"},{"key":"ref16","year":"0","journal-title":"ATHENa database of FPGA results for authenticated ciphers"},{"key":"ref4","article-title":"CAESAR submission: Ketje v2","author":"bertoni","year":"2016","journal-title":"Submission to CAESAR(Round3)"},{"key":"ref3","year":"0","journal-title":"Development package for the CAESAR hardware APIv1 0&#x2013;3"},{"key":"ref6","year":"2015","journal-title":"Sha-3 Standard Permutation Based Hash and Extendable Output Functions"},{"key":"ref5","author":"bertoni","year":"2011","journal-title":"The KECCAK Reference"},{"key":"ref8","article-title":"CAESAR submission: Ketje v1","author":"bertoni","year":"2014","journal-title":"Submission to CAESAR(Round2)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref2","first-page":"800","author":"dworkin","year":"2006","journal-title":"Recommendation for Block Cipher Modes of Operation Galois\/Counter Mode (GCM) for Confidentiality and Authentication"},{"key":"ref1","article-title":"Caesar hardware api","author":"homsirikamol","year":"2016","journal-title":"Cryptology ePrint Archive Report 2016\/626"},{"key":"ref9","article-title":"ASCON v1.2","author":"dobraunig","year":"2016","journal-title":"Submission to CAESAR(Round3)"}],"event":{"name":"2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","location":"Cancun","start":{"date-parts":[[2017,12,4]]},"end":{"date-parts":[[2017,12,6]]}},"container-title":["2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8268902\/8279767\/08279790.pdf?arnumber=8279790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T21:51:38Z","timestamp":1520891498000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8279790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2017.8279790","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}