{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:34:49Z","timestamp":1729618489721,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/vlsi-soc.2012.6379039","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:55:47Z","timestamp":1355867747000},"page":"251-254","source":"Crossref","is-referenced-by-count":3,"title":["Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4"],"prefix":"10.1109","author":[{"given":"Anupam","family":"Chattopadhyay","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Pypy: Another version of Py","year":"2006","author":"biham","key":"ref10"},{"article-title":"Tweaking the IV Setup of the Py Family of Stream Ciphers - The ciphers TPy, TPypy, and TPy6","year":"2007","author":"biham","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_3"},{"key":"ref13","article-title":"Methods and apparatus for accelerating ARC4 processing","author":"matthews","year":"0","journal-title":"US Patent Number 7403615 Morgan Hill CA"},{"journal-title":"Synopsys Processor Designer","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2003.1562548"},{"key":"ref16","first-page":"491","article-title":"Predicting and Distinguishing Attacks on RC4 Keystream Generation","volume":"3494","author":"mantin","year":"0","journal-title":"Eurocrypt"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6272151"},{"key":"ref18","article-title":"High Performance Hardware Implementation for RC4 Stream Cipher","author":"sen gupta","year":"2012","journal-title":"IEEE Transactions on Computers"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012374287-2.50008-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_14"},{"key":"ref3","article-title":"ISAAC and RC4","author":"jenkins","year":"1996","journal-title":"Published on the Internet at"},{"key":"ref6","first-page":"2005","article-title":"A 32-bit RC4-like keystream generator","author":"nawaz","year":"0","journal-title":"CACR Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25937-4_16"},{"article-title":"Py: A Fast and Secure Stream Cipher using Rolling Arrays","year":"2005","author":"biham","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11599548_14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_17"},{"key":"ref1","article-title":"RC4 Stream Cipher and Its Variants","author":"paul","year":"0","journal-title":"edition CRC Press"},{"year":"0","key":"ref9"}],"event":{"name":"2012 IEEE\/IFIP 20th International Conference on VLSI and System-on-Chip (VLSI-SoC)","start":{"date-parts":[[2012,10,7]]},"location":"Santa Cruz, CA, USA","end":{"date-parts":[[2012,10,10]]}},"container-title":["2012 IEEE\/IFIP 20th International Conference on VLSI and System-on-Chip (VLSI-SoC)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:30:19Z","timestamp":1602689419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6379039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/vlsi-soc.2012.6379039","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}