{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:49:04Z","timestamp":1725497344194},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.210","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1690-1695","source":"Crossref","is-referenced-by-count":2,"title":["Celerity Hardware Implementation of the AES with Data Parallel and Pipelining Architecture inside the Round Function"],"prefix":"10.1109","author":[{"given":"Shouwen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaotao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Steffen Fries Security Considerations for Voice over TP Systems","year":"2005","author":"kuhn","key":"3"},{"journal-title":"Federal Information Processing Standards Publication 46 Data Encryption Standard","year":"1999","key":"2"},{"journal-title":"Announcing the Advanced Encryption Standard (AES)","year":"2001","key":"1"},{"key":"7","first-page":"193","article-title":"A 2.3 gb s fully tntegrated and synthesizable aes rijndael core","author":"kim","year":"2003","journal-title":"Proc TEEE Custom Tntegrated Circuits Conference"},{"journal-title":"AES Algorithm Submission","article-title":"Aes proposal: Rijndael","year":"1999","author":"daemen","key":"6"},{"key":"5","first-page":"138","article-title":"Vulnerability analysis and best practices for adopting tp telephonyin critical tnfrastructure sectors","author":"cao","year":"2006","journal-title":"TEEE Communications Magazine"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.203"},{"journal-title":"International Conference on Advanced Encryption Conference","article-title":"The effects of multiple algorithms in the advanced encryption standard","year":"2000","author":"harvey","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.49"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681036.pdf?arnumber=6681036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:27:00Z","timestamp":1490228820000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.210","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}