{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:57:20Z","timestamp":1755601040034,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,12]]},"DOI":"10.1145\/3360774.3368202","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T14:56:00Z","timestamp":1580741760000},"page":"483-491","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device"],"prefix":"10.1145","author":[{"given":"Brandon","family":"Tsao","sequence":"first","affiliation":[{"name":"Santa Clara University"}]},{"given":"Yuhong","family":"Liu","sequence":"additional","affiliation":[{"name":"Santa Clara University"}]},{"given":"Behnam","family":"Dezfouli","sequence":"additional","affiliation":[{"name":"Santa Clara University"}]}],"member":"320","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2017.201"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. CC2650. http:\/\/www.ti.com\/product\/CC2650  [n. d.]. CC2650. http:\/\/www.ti.com\/product\/CC2650"},{"key":"e_1_3_2_1_3_1","unstructured":"2018. https:\/\/github.com\/contiki-os\/contiki  2018. https:\/\/github.com\/contiki-os\/contiki"},{"volume-title":"Cesar Conference","year":"2017","author":"Jacques Fournier Benjamin Lac Caroline Fontaine","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"ARM 2016. ARM Compiler v5.06 for &mu;Vision armcc User Guide. ARM.  ARM 2016. ARM Compiler v5.06 for &mu;Vision armcc User Guide. ARM."},{"key":"e_1_3_2_1_6_1","unstructured":"Doug Whiting David Wagner Chris Hall Bruce Schneier John Kelsey. 1999. Performance Comparison of the AES Submissions.  Doug Whiting David Wagner Chris Hall Bruce Schneier John Kelsey. 1999. Performance Comparison of the AES Submissions."},{"key":"e_1_3_2_1_7_1","unstructured":"Brad Conte. 2015. Basic implementations of standard cryptography algorithms like AES and SHA-1. https:\/\/github.com\/B-Con\/crypto-algorithms.  Brad Conte. 2015. Basic implementations of standard cryptography algorithms like AES and SHA-1. https:\/\/github.com\/B-Con\/crypto-algorithms."},{"volume-title":"The design of Rijndael: AES --- the Advanced Encryption Standard","author":"Daemen Joan","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"volume-title":"Recommendation for Block Cipher Modes of Operation: Methods and Techniques","author":"Dworkin Morris J.","key":"e_1_3_2_1_10_1"},{"volume-title":"Retrieved","year":"2019","author":"Gutekunst John","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2006.40"},{"volume-title":"Evaluation of encryption algorithms for IOT security. Master's thesis","author":"Abdalla Yousif Hassan Abdalla Adam","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Mark Hung. 2017. Leading the IoT. Gartner. https:\/\/www.gartner.com\/imagesrv\/books\/iot\/iotEbook_digital.pdf  Mark Hung. 2017. Leading the IoT. Gartner. https:\/\/www.gartner.com\/imagesrv\/books\/iot\/iotEbook_digital.pdf"},{"key":"e_1_3_2_1_15_1","unstructured":"kokke. 2019. Small portable AES128\/192\/256 in C. https:\/\/github.com\/kokke\/tiny-AES-c.  kokke. 2019. Small portable AES128\/192\/256 in C. https:\/\/github.com\/kokke\/tiny-AES-c."},{"key":"e_1_3_2_1_16_1","unstructured":"Uli Kretzschmar. 2009. AES128 - A C Implementation for Encryption and Decryption. Texas Instruments.  Uli Kretzschmar. 2009. AES128 - A C Implementation for Encryption and Decryption. Texas Instruments."},{"volume-title":"Recall: Abbott Pacemakers for Hacking Threat. https:\/\/www.webmd.com\/heart\/news\/20170905\/recall-abbott-pacemakers-for-hacking-threat","year":"2017","author":"Linsalata Kristen","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"Mentor [n. d.]. Sourcery CodeBench. Mentor.  Mentor [n. d.]. Sourcery CodeBench. Mentor."},{"volume-title":"Retrieved","year":"2019","author":"Mikulic Matej","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Mastooreh Salajegheh. 2013. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. Open Access Dissertations.  Mastooreh Salajegheh. 2013. Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions. Open Access Dissertations."},{"volume-title":"Description of a new variable-length key, 64-bit block cipher (Blowfish)","author":"Schneier Bruce","key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-58108-1_24"},{"volume-title":"TWINE: A Lightweight Block Cipher for Multiple Platforms. In Selected Areas in Cryptography","year":"2013","author":"Suzaki Tomoyasu","key":"e_1_3_2_1_22_1"},{"volume-title":"Lightweight Cryptography Applicable to Various IoT Devices. NEC Technical Journal 12","year":"2017","author":"Toshihiko Okamura","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/103135.103136"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"}],"event":{"name":"MobiQuitous: Computing, Networking and Services","acronym":"MobiQuitous","location":"Houston Texas USA"},"container-title":["Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3368202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360774.3368202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360774.3368202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":25,"alternative-id":["10.1145\/3360774.3368202","10.1145\/3360774"],"URL":"https:\/\/doi.org\/10.1145\/3360774.3368202","relation":{},"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"2020-02-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}