{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T10:10:02Z","timestamp":1755857402161,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T00:00:00Z","timestamp":1679616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,24]]},"DOI":"10.1145\/3592307.3592324","type":"proceedings-article","created":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:30:46Z","timestamp":1692019846000},"page":"105-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation and Evaluation of the Lightweight Cipher SPARKLE"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3728-0758","authenticated-orcid":false,"given":"Masato","family":"Sato","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Meijo University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1369-8500","authenticated-orcid":false,"given":"Yusuke","family":"Nozaki","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering, Meijo University, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9399-1902","authenticated-orcid":false,"given":"Masaya","family":"Yoshikawa","sequence":"additional","affiliation":[{"name":"Faculty of Information Engineering, Meijo University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.2.3.146-151"},{"issue":"6","key":"e_1_3_2_1_2_1","first-page":"638","article-title":"A Noval Method for Cloud Security and Privacy Using Homomorphic Encryption Based on Facial Key Templates","volume":"13","author":"Tadi Chandrasekhar","year":"2022","unstructured":"Tadi Chandrasekhar and Sumanth Kumar, \"A Noval Method for Cloud Security and Privacy Using Homomorphic Encryption Based on Facial Key Templates,\" Journal of Advances in Information Technology, Vol. 13, No. 6, pp. 638-644, December 2022.","journal-title":"Journal of Advances in Information Technology"},{"issue":"5","key":"e_1_3_2_1_3_1","first-page":"433","article-title":"A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling","volume":"13","author":"Kandala V. M.","year":"2022","unstructured":"Kandala Sree Rama Murthy and V. M. Manikandan, \"A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling,\" Journal of Advances in Information Technology, Vol. 13, No. 5, pp. 433-440, October 2022.","journal-title":"Journal of Advances in Information Technology"},{"key":"e_1_3_2_1_4_1","unstructured":"Beierle C. Biryukov A. Santos L. C. dos Gro\u00dfsch\u00e4dl J. Moradi A. Perrin L. Shahmirzadi A. R. Udovenko A. Velichkov V. and Wang Q.: Schwaemm and Esch: Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family available from \u3008https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/lightweightcryptography\/documents\/finalist-round\/updated-spec-doc\/sparklespec-final.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"e_1_3_2_1_7_1","first-page":"31","article-title":"Leakage Assessment Methodology - a clear roadmap for sidechannel evaluations","volume":"2015","author":"Schneider A.","year":"2015","unstructured":"T. Schneider and A. Moradi, \u201cLeakage Assessment Methodology - a clear roadmap for sidechannel evaluations,\u201d Cryptology ePrint Archive 2015\/207, Jun. 2015. Accessed: Dec. 31, 2021.","journal-title":"Cryptology ePrint Archive"},{"volume-title":"Proc. of 2019 International Conference on Reconfigurable Computing and FPGAs, ReConFig (2019)","author":"Abdulgadir A.","key":"e_1_3_2_1_8_1","unstructured":"Abdulgadir, A., Diehl, W., and Kaps, J.-P.: An open-source platform for evaluation of hardware implementations of lightweight authenticated ciphers, Proc. of 2019 International Conference on Reconfigurable Computing and FPGAs, ReConFig (2019)"},{"key":"e_1_3_2_1_9_1","unstructured":"Implementer's Guide to Hardware Implementations Compliant with the Hardware API for Lightweight Cryptography v1.2.0 (with support for SCA-protected implementations) by Kamyar Mohajerani Michael Tempelmeier Farnoud Farahmand Ekawat Homsirikamol William Diehl Jens-Peter Kaps and Kris Gaj last revised on February 24 2022"}],"event":{"name":"ICECC 2023: 2023 The 6th International Conference on Electronics, Communications and Control Engineering","acronym":"ICECC 2023","location":"Fukuoka Japan"},"container-title":["Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592324","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592307.3592324","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:33:10Z","timestamp":1755855190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592307.3592324"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,24]]},"references-count":9,"alternative-id":["10.1145\/3592307.3592324","10.1145\/3592307"],"URL":"https:\/\/doi.org\/10.1145\/3592307.3592324","relation":{},"subject":[],"published":{"date-parts":[[2023,3,24]]},"assertion":[{"value":"2023-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}