{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T11:26:58Z","timestamp":1750505218040},"reference-count":6,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"13","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1587\/elex.11.20140535","type":"journal-article","created":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T23:01:46Z","timestamp":1403737306000},"page":"20140535-20140535","source":"Crossref","is-referenced-by-count":4,"title":["Data security concurrent with homogeneous by AES algorithm in SSD controller"],"prefix":"10.1587","volume":"11","author":[{"given":"Lingyan","family":"Fan","sequence":"first","affiliation":[{"name":"Micro-Electronics Research Institute, Hangzhou Dianzi University"}]},{"given":"Jianjun","family":"Luo","sequence":"additional","affiliation":[{"name":"Micro-Electronics Research Institute, Hangzhou Dianzi University"}]},{"given":"Hailuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Sage Microelectronics Corporation"}]},{"given":"Xuan","family":"Geng","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, College of Information Engineering of Shanghai Maritime University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] R. H. Morelos-Zaragoza: <i>The Art of Error Correcting Coding<\/i> (Wiley Press, West Sussex, 2006) 2nd ed. 39.","DOI":"10.1002\/0470035706"},{"key":"2","unstructured":"[2] Federal Information Processing Standards Publication 197, Specification for the ADVANCED ENCRYPTION STANDARD (AES) (2001)."},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"4","unstructured":"[4] Micron: L74A NAND flash memory data sheet, Rev.E3\/11EN (2009)."},{"key":"5","unstructured":"[5] Micron: M73A NAND Flash memory data sheet, Rev.B7\/10EN (2010)."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Dworkin: Recommendation for Block Cipher Modes of Operation Methods and Techniques, NIST Special Publication 800-38A 2001 Edition.","DOI":"10.6028\/NIST.SP.800-38a"}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/11\/13\/11_11.20140535\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T19:19:58Z","timestamp":1619205598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/11\/13\/11_11.20140535\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":6,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.11.20140535","relation":{},"ISSN":["1349-2543"],"issn-type":[{"value":"1349-2543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}