{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:18Z","timestamp":1762004838987,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/tvlsi.2016.2606554","type":"journal-article","created":{"date-parts":[[2016,9,27]],"date-time":"2016-09-27T19:49:13Z","timestamp":1475005753000},"page":"1072-1084","source":"Crossref","is-referenced-by-count":11,"title":["RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers"],"prefix":"10.1109","volume":"25","author":[{"given":"Ayesha","family":"Khalid","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5160-6032","authenticated-orcid":false,"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271518"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.19"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6272151"},{"article-title":"Methods and apparatus for accelerating ARC4 processing","year":"2008","author":"matthews","key":"ref30"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICECE.2008.4769284"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012374287-2.50008-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_17"},{"key":"ref10","first-page":"397","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref11","first-page":"210","article-title":"VMPC one-way function and stream cipher","volume":"3017","author":"zoltak","year":"2004","journal-title":"Proc 11th Int Workshop (FSE)"},{"key":"ref12","first-page":"245","article-title":"A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher","volume":"3017","author":"paul","year":"2004","journal-title":"Proc 11th Int Workshop (FSE)"},{"article-title":"Distinguishing attacks on RC4 and a new improvement of the cipher","year":"0","author":"lv","key":"ref13"},{"article-title":"Design and analysis of RC4-like stream ciphers","year":"2005","author":"mckague","key":"ref14"},{"article-title":"A 32-bit RC4-like keystream generator","year":"2005","author":"nawaz","key":"ref15"},{"key":"ref16","first-page":"162","article-title":"Towards a general RC4-like keystream generator","volume":"3822","author":"gong","year":"2005","journal-title":"Proc 1st SKLOIS Conf (CISC)"},{"key":"ref17","first-page":"179","article-title":"Scrutinizing and improving impossible differential attacks: Applications to CLEFIA, Camellia, LBlock and Simon","author":"boura","year":"2014","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2005.1466189"},{"key":"ref19","first-page":"304","article-title":"Unified hardware architecture for 128-bit block ciphers AES and Camellia","volume":"2779","author":"satoh","year":"2003","journal-title":"Proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02181-7_15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0834"},{"key":"ref3","first-page":"97","article-title":"All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS","author":"vanhoef","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488898"},{"journal-title":"RFC7465 - Prohibiting RC4 Cipher Suites","year":"2015","author":"popov","key":"ref6"},{"key":"ref5","first-page":"297","article-title":"New state recovery attack on RC4","volume":"5157","author":"maximov","year":"2008","journal-title":"Proc 28th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2003.1562548"},{"key":"ref8","article-title":"Spritz&#x2014;A spongy RC4-like stream cipher and hash function","author":"rivest","year":"2014","journal-title":"Proc Rump Session 34th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref7","first-page":"27","article-title":"Analysis of RC4 and proposal of additional layers for better security margin","volume":"5365","author":"maitra","year":"2008","journal-title":"Proc Int Conf Cryptology India (INDOCRYPT"},{"article-title":"Tornado attack on RC4 with applications to WEP & WPA","year":"2015","author":"sepehrdad","key":"ref2"},{"key":"ref9","first-page":"30","article-title":"Keccak sponge function family main document","volume":"3","author":"bertoni","year":"2009","journal-title":"Proc NIST Round 2"},{"key":"ref1","first-page":"251","article-title":"Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4","author":"chattopadhyay","year":"2012","journal-title":"Proc IEEE\/IFIP Int Conf VLSI and System-on-Chip (VLSI SoC)"},{"key":"ref20","first-page":"196","article-title":"HiPAcc-LTE: An integrated high performance accelerator for 3GPP LTE stream ciphers","volume":"7107","author":"gupta","year":"2011","journal-title":"Proc Int Conf Cryptol India (INDOCRYPT)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2013.05.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-012-0074-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/379240.379256"},{"key":"ref23","article-title":"Sharing resources between AES and the SHA-3 second round candidates Fugue and Gr&#x00F8;stl","author":"j\u00e4rvinen","year":"2010","journal-title":"Proc 2nd SHA-3 Candidate Conf"},{"key":"ref26","first-page":"1","article-title":"CCproc: An efficient cryptographic coprocessor","author":"theodoropoulos","year":"2008","journal-title":"Proc IFIP Int Conf Very Large-Scale Integr"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24714-2_15"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/7862316\/07577878.pdf?arnumber=7577878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:04Z","timestamp":1642003924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577878\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":36,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2016.2606554","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}