{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:24:43Z","timestamp":1774542283227,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.23919\/date.2017.7927078","type":"proceedings-article","created":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T20:34:41Z","timestamp":1494880481000},"page":"692-697","source":"Crossref","is-referenced-by-count":62,"title":["ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications"],"prefix":"10.23919","author":[{"given":"Fabrizio","family":"De Santis","sequence":"first","affiliation":[{"name":"Lehrstuhl f\u00fcr Sicherheit in der Informationstechnik, Technische Universitat M\u00fcnchen (TUM), Munich, Germany"}]},{"given":"Andreas","family":"Schauer","sequence":"additional","affiliation":[{"name":"Lehrstuhl f\u00fcr Sicherheit in der Informationstechnik, Technische Universitat M\u00fcnchen (TUM), Munich, Germany"}]},{"given":"Georg","family":"Sigl","sequence":"additional","affiliation":[{"name":"Lehrstuhl f\u00fcr Sicherheit in der Informationstechnik, Technische Universitat M\u00fcnchen (TUM), Munich, Germany"}]}],"member":"263","reference":[{"key":"ref10","year":"2016","journal-title":"The Cifra Project"},{"key":"ref11","author":"neikes","year":"2016","journal-title":"ARM Cortex-M0 implementation of ChaCha20"},{"key":"ref12","first-page":"446","article-title":"ARMed SPHINCS &#x2014; Computing a 41 KB Signature in 16 KB of RAM","author":"h\u00fclsing","year":"2016","journal-title":"PKC 2016"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"ref14","year":"2016","journal-title":"STM32F411RE High-performance access line"},{"key":"ref4","first-page":"32","article-title":"The Poly1305-AES Message-Authentication Code","author":"bernstein","year":"2005","journal-title":"FSE 2015"},{"key":"ref3","author":"bernstein","year":"2008","journal-title":"Chacha a variant of salsa20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7905"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7539"},{"key":"ref8","article-title":"A Security Analysis of the Composition of ChaCha20 and Poly1305","author":"procter","year":"2014","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref7","year":"2016","journal-title":"ARM&#x00AE; and Thumb&#x00AE;-2 Instruction Set"},{"key":"ref2","year":"2012","journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness"},{"key":"ref1","article-title":"Failures of Secret-Key Cryptography","author":"bernstein","year":"2013","journal-title":"Invited Talk at FSE 2013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38553-7_9"}],"event":{"name":"2017 Design, Automation & Test in Europe Conference & Exhibition (DATE)","location":"Lausanne, Switzerland","start":{"date-parts":[[2017,3,27]]},"end":{"date-parts":[[2017,3,31]]}},"container-title":["Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2017"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7919927\/7926947\/07927078.pdf?arnumber=7927078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T08:08:27Z","timestamp":1623139707000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7927078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/date.2017.7927078","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}