{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:55:34Z","timestamp":1729673734161,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/vlsi-soc.2012.6379017","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T16:55:47Z","timestamp":1355849747000},"page":"123-128","source":"Crossref","is-referenced-by-count":0,"title":["100 Gbit\/s authenticated encryption based on quantum key distribution"],"prefix":"10.1109","author":[{"given":"Michael","family":"Muehlberghuber","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Keller","sequence":"additional","affiliation":[]},{"given":"Norbert","family":"Felber","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Pendl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-642-21702-9_18","article-title":"The Software Performance of Authenticated-Encryption Modes","volume":"6733","author":"krovetz","year":"2011","journal-title":"Lecture Notes in Computer Science"},{"key":"15","article-title":"Serpent: A Proposal for the Advanced Encryption Standard","author":"anderson","year":"1998","journal-title":"Proceedings of First AES Candidate Conference"},{"key":"16","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","article-title":"Encryption Modes with Almost Free Message Integrity","volume":"2045","author":"jutla","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2011.6132722"},{"journal-title":"Report on the Development of the Advanced Encryption Standard (AES)","year":"2000","author":"nechvatal","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ESSCIRC.2010.5619894"},{"key":"12","first-page":"582","article-title":"High-speed architectures for GHASH based on efficient bit-parallel multipliers","author":"wang","year":"0","journal-title":"Wireless Communications Networking and Information Security (WCNIS) 2010 IEEE International Conference On 2010"},{"journal-title":"Recommendation for Block Cipher Modes of Operation Galois\/Counter Mode (GCM) and GMAC","year":"2007","author":"dworkin","key":"3"},{"key":"2","article-title":"The Galois\/Counter Mode of Operation (GCM)","author":"mcgrew","year":"2005","journal-title":"NIST Modes Operation Symmetric Key Block Ciphers"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3610"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00641-8_20"},{"key":"7","first-page":"1","article-title":"IEEE Std. for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA\/CD) Access Method and Physical Layer Specifications Amendment 4: Media Access Control Parameters, Physical Layers and Management Parameters for 40 Gb\/s and 100 Gb\/s Operation","year":"2010","journal-title":"IEEE Std 802 3ba-2010 (Amendment to IEEE Standard 802 3-2008)"},{"journal-title":"Advanced Encryption Standard (AES) (FIPS PUB 197)","year":"2001","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4106"},{"journal-title":"IEEE Standard for Information technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","year":"2007","key":"4"},{"key":"9","article-title":"OCB: A Block- Cipher Mode of Operation for Efficient Authenticated Encryption","author":"rogaway","year":"0","journal-title":"ACM Conference on Computer and Communications Security 2001"},{"key":"8","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/3-540-69710-1_15","article-title":"Serpent: A New Block Cipher Proposal","volume":"1372","author":"biham","year":"1998","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2012 IEEE\/IFIP 20th International Conference on VLSI and System-on-Chip (VLSI-SoC)","start":{"date-parts":[[2012,10,7]]},"location":"Santa Cruz, CA, USA","end":{"date-parts":[[2012,10,10]]}},"container-title":["2012 IEEE\/IFIP 20th International Conference on VLSI and System-on-Chip (VLSI-SoC)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T11:27:00Z","timestamp":1602674820000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6379017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/vlsi-soc.2012.6379017","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}