{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:22:36Z","timestamp":1774120956852,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,13]],"date-time":"2017-10-13T00:00:00Z","timestamp":1507852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,13]]},"DOI":"10.1145\/3136825.3136858","type":"proceedings-article","created":{"date-parts":[[2018,1,26]],"date-time":"2018-01-26T13:06:00Z","timestamp":1516971960000},"page":"291-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Approxhash"],"prefix":"10.1145","author":[{"given":"Sunil","family":"Dutt","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Bikram","family":"Paul","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Anshu","family":"Chauhan","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Sukumar","family":"Nandi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]},{"given":"Gaurav","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Guwahati, India"}]}],"member":"320","published-online":{"date-parts":[[2017,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488873"},{"key":"e_1_3_2_1_2_1","volume-title":"26th International Conference Radioelektronika (RADIOELEKTRONIKA). 61--65","author":"Dutt S.","unstructured":"S. Dutt , S. Nandi , and G. Trivedi . 2016. A Comparative Survey of Approximate Adders . In 26th International Conference Radioelektronika (RADIOELEKTRONIKA). 61--65 . S. Dutt, S. Nandi, and G. Trivedi. 2016. A Comparative Survey of Approximate Adders. In 26th International Conference Radioelektronika (RADIOELEKTRONIKA). 61--65."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000108"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/646753.704905"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2012.2217962"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2243658"},{"key":"e_1_3_2_1_7_1","volume-title":"Hill and Christos Kozyrakis","author":"Mark","year":"2012","unstructured":"Mark D. Hill and Christos Kozyrakis . 2012 . Advancing Computer Systems without Technology Progress. In http:\/\/www.sigarch.org\/2012\/07\/28\/outbrief-of-darpaisat-workshop-advancing-computer-systems-without-technology-progress\/. Mark D. Hill and Christos Kozyrakis. 2012. Advancing Computer Systems without Technology Progress. In http:\/\/www.sigarch.org\/2012\/07\/28\/outbrief-of-darpaisat-workshop-advancing-computer-systems-without-technology-progress\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/148544.148545"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893356"},{"key":"e_1_3_2_1_10_1","volume-title":"Energy-efficient Digital Processing via Approximate Computing","author":"Pagliari Daniele Jahier","unstructured":"Daniele Jahier Pagliari , Massimo Poncino , and Enrico Macii . 2016. Energy-efficient Digital Processing via Approximate Computing . Springer International Publishing , 55--89. Daniele Jahier Pagliari, Massimo Poncino, and Enrico Macii. 2016. Energy-efficient Digital Processing via Approximate Computing. Springer International Publishing, 55--89."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050406"}],"event":{"name":"SIN '17: Security of Information and Networks","location":"Jaipur India","acronym":"SIN '17"},"container-title":["Proceedings of the 10th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136858","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136825.3136858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:17Z","timestamp":1750212677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136825.3136858"}},"subtitle":["delay, power and area optimized approximate hash functions for cryptography applications"],"short-title":[],"issued":{"date-parts":[[2017,10,13]]},"references-count":11,"alternative-id":["10.1145\/3136825.3136858","10.1145\/3136825"],"URL":"https:\/\/doi.org\/10.1145\/3136825.3136858","relation":{},"subject":[],"published":{"date-parts":[[2017,10,13]]},"assertion":[{"value":"2017-10-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}