{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:36:00Z","timestamp":1764174960840},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tetc.2021.3073163","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T22:44:49Z","timestamp":1618440289000},"page":"1-1","source":"Crossref","is-referenced-by-count":12,"title":["Hardware Constructions for Error Detection in Lightweight Welch-Gong (WG)-Oriented Streamcipher WAGE Benchmarked on FPGA"],"prefix":"10.1109","author":[{"given":"Jasmin","family":"Kaur","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida, United States, (e-mail: jasmink1@mail.usf.edu)"}]},{"given":"Ausmita","family":"Sarker","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida, United States, (e-mail: asarker@mail.usf.edu)"}]},{"given":"Mehran","family":"Mozaffari-Kermani","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of South Florida, 7831 Tampa, Florida, United States, 33620-9951 (e-mail: mehran2@usf.edu)"}]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[{"name":"CEECS, Florida Atlantic University, 1782 Boca Raton, Florida, United States, 33431-0992 (e-mail: razarderakhsh@fau.edu)"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00222-x"},{"key":"ref2","article-title":"WAGE: An authenticated encryption algorithm","author":"Aagaard","year":"2019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.804043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72565-9_7"},{"key":"ref6","first-page":"1","article-title":"On the security of the keyed sponge construction","volume-title":"Proc. Symmetric Key Encryption Workshop","author":"Bertoni"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.2991671"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0092-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2881097"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010555"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3055514"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/6558478\/09404834.pdf?arnumber=9404834","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:09:06Z","timestamp":1704841746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9404834\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/tetc.2021.3073163","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}