{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:43:55Z","timestamp":1746225835679,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/reconfig.2017.8279795","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T17:32:24Z","timestamp":1517851944000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Flexible and low-cost HSM based on non-volatile FPGAs"],"prefix":"10.1109","author":[{"given":"Diogo","family":"Parrinha","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Chaves","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Review of Hardware Security Modules","author":"ivarsson","year":"2010","journal-title":"opendnssec org Tech Rep"},{"key":"ref11","first-page":"43","article-title":"Design and Implementation of a Digital Signature Solution for a Healthcare Enterprise","author":"tulu","year":"2004","journal-title":"AMCIS 2004 Proceedings"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_22"},{"key":"ref13","first-page":"549","article-title":"AR-Mageddon: Cache attacks on mobile devices","author":"lipp","year":"2016","journal-title":"25th USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-07005-2_5"},{"key":"ref15","article-title":"Efficient transmission of pki certificates using elliptic curve cryptography and its variants","volume":"13","author":"selvakumaraswamy","year":"2016","journal-title":"International Arab Journal of Information Technology (IAJIT)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2007.3"},{"journal-title":"Technical Report Microsemi","article-title":"IGLOO2 FPGA and SmartFusion2 SoC FPGA","year":"2016","key":"ref17"},{"journal-title":"mbedTLS","year":"2016","key":"ref18"},{"journal-title":"SHA-256 HASH CORE","year":"2016","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2005.1568540"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ReCoSoC.2015.7238102"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6486004"},{"key":"ref5","article-title":"Orthogonal security with cipherbase","author":"arasu","year":"2013","journal-title":"CIDR"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30117-2_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2013.6645526"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2816822"},{"journal-title":"FPGA Market size worth $9 98bn by","year":"2022","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2012.6339242"},{"journal-title":"Thales nshield connect offers enterprise-class key management","year":"2009","key":"ref20"}],"event":{"name":"2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2017,12,4]]},"location":"Cancun","end":{"date-parts":[[2017,12,6]]}},"container-title":["2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8268902\/8279767\/08279795.pdf?arnumber=8279795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T17:51:33Z","timestamp":1520877093000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8279795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2017.8279795","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}