{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:35:38Z","timestamp":1764174938379,"version":"3.37.3"},"reference-count":17,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["60NANB20D013"],"award-info":[{"award-number":["60NANB20D013"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tetc.2020.3027789","type":"journal-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T20:17:06Z","timestamp":1601583426000},"page":"514-519","source":"Crossref","is-referenced-by-count":33,"title":["Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4723-4800","authenticated-orcid":false,"given":"Jasmin","family":"Kaur","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran Mozaffari","family":"Kermani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[{"name":"Department of Computer and Electrical Engineering and Computer Science, I-SENSE Fellow, Florida Atlantic University, Boca Raton, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.178"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-017-0160-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9073-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.111"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2566673"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14971-4_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_14"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.46586\/tosc.v2017.i1.4-44","article-title":"The QARMA block cipher family","author":"Avanzi","year":"2017","journal-title":"IACR Trans. Symmetric Cryptol."},{"year":"2017","key":"ref9","article-title":"Pointer authentication on ARMv8.3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2009.5189583"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-018-0049-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2011.60"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2661811"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3159173"},{"article-title":"Using state space encoding to counter biased fault attacks on AES countermeasures","year":"2015","author":"Patranabis","key":"ref17"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6245516\/9726526\/9210809-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/9726526\/09210809.pdf?arnumber=9210809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:44:40Z","timestamp":1704840280000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9210809\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":17,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2020.3027789","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"type":"electronic","value":"2168-6750"},{"type":"electronic","value":"2376-4562"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}