{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:59:23Z","timestamp":1762505963571,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/spw.2012.11","type":"proceedings-article","created":{"date-parts":[[2012,7,10]],"date-time":"2012-07-10T21:39:25Z","timestamp":1341956365000},"page":"27-32","source":"Crossref","is-referenced-by-count":11,"title":["The BlueJay Ultra-Lightweight Hybrid Cryptosystem"],"prefix":"10.1109","author":[{"given":"Markku-Juhani O.","family":"Saarinen","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"104","article-title":"Differential power analysis","volume":"1666","author":"kocher","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"year":"2012","journal-title":"Cortex-M0+ Processor","key":"22"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"18","first-page":"388","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"15","article-title":"WIPR - Public-key identification on two grains of sand","author":"oren","year":"2008","journal-title":"RFIDSec08 - 4th Workshop on RFID Security"},{"key":"16","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-25286-0_2","article-title":"The Hummingbird-2 lightweight authenticated encryption algorithm","volume":"7055","author":"engels","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/RFID.2011.5764620"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1514274.1514283"},{"year":"1993","author":"naccache","article-title":"Method, sender apparatus and receiver apparatus for modulo operation","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/3-540-49264-X_33"},{"year":"2011","journal-title":"LPC1102 32-bit ARM Cortex-M0 Microcontroller 32 KB Flash and 8 KB SRAM Rev 4","key":"21"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.simpat.2007.04.006"},{"year":"0","journal-title":"RVM0CL Version 1 02","key":"20"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/MC.2007.52"},{"key":"1","first-page":"146","author":"gaubatz","year":"2005","journal-title":"State of the Art in Ultra-low Power Public Key Cryptography for Wireless Sensor Networks"},{"key":"10","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/BFb0053461","article-title":"Memory efficient variants of public-key schemes for smart card applications","volume":"950","author":"shamir","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","author":"boyd","year":"2003","journal-title":"Protocols for Authentication and Key Establishment"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ISSCC.2012.6177023"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/MCOM.2012.6178849"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/JPROC.2006.873620"},{"year":"1979","author":"rabin","journal-title":"Digitalized signatures and public-key functions as intractable as factorization","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/978-3-642-27937-9_20"}],"event":{"name":"2012 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2012,5,24]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2012,5,25]]}},"container-title":["2012 IEEE Symposium on Security and Privacy Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6226981\/6227677\/06227681.pdf?arnumber=6227681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:11:26Z","timestamp":1497993086000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6227681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/spw.2012.11","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}