{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:23Z","timestamp":1725475823952},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_7","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"74-88","source":"Crossref","is-referenced-by-count":0,"title":["High Performance Agile Crypto Modules"],"prefix":"10.1007","author":[{"given":"Chandana G.","family":"Gamage","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jussipekka","family":"Leiwo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuliang","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"The SafeNet ADSP2141L from Analog Devices, Inc. (March 1999), Available from \n                    \n                      http:\/\/www.analog.com\/"},{"key":"7_CR2","unstructured":"The ATM Forum, Mountain View, CA. ATM Security Specification, Version 1.0, af-sec-0100.000 edition (February 1999)"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1214\/aoms\/1177705674","volume":"31","author":"R.R. Bahadur","year":"1960","unstructured":"Bahadur, R.R., Rao, R.R.: On deviations of the simple mean. Annals of Mathematical Statistics\u00a031(2), 1015\u20131027 (1960)","journal-title":"Annals of Mathematical Statistics"},{"key":"7_CR4","unstructured":"Baudron, O., Gilbert, H., Granboulan, L., Handschuh, H., Joux, A., Nguyen, P., Noilhan, F., Pointcheval, D., Pornin, T., Poupard, G., Stern, J., Vaudenay, S.: Report on the AES candidates. In: Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy. NIST (1999)"},{"key":"7_CR5","unstructured":"CDI 2100 cryptographic processor from Cognitive Designs, Inc, (May 1999), Available from \n                    \n                      http:\/\/www.cognitive-designs.com\/"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/238168.238181","volume-title":"Proceedings of the Third ACM Conference on Computer and Communications Security (CCS 1996)","author":"S.-C. Chuang","year":"1996","unstructured":"Chuang, S.-C.: Securing ATM networks. In: Proceedings of the Third ACM Conference on Computer and Communications Security (CCS 1996), New Delhi, India, pp. 19\u201330. ACM Press, New York (1996)"},{"key":"7_CR7","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3233\/JCS-1996-4403","volume":"4","author":"S.-C. Chuang","year":"1996","unstructured":"Chuang, S.-C.: Securing ATM networks. Journal of Computer Security\u00a04, 289\u2013329 (1996)","journal-title":"Journal of Computer Security"},{"key":"7_CR8","first-page":"610","volume-title":"Proceedings of the IEEE International Conference on Computer Design: VLSI in Computers and Processors (ICCD 1993)","author":"L. Claesen","year":"1993","unstructured":"Claesen, L., Daemen, J., Genoe, M., Peeters, G.: Subterranean: A 600 Mbit\/sec cryptographic VLSI chip. In: Straub, E. (ed.) Proceedings of the IEEE International Conference on Computer Design: VLSI in Computers and Processors (ICCD 1993), Cambridge, MA, pp. 610\u2013613. IEEE Computer Society Press, Los Alamitos (1993)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of CAR-DIS 1998: Third Smart Card Research and Advanced Applications Conference","author":"J. Daemen","year":"1998","unstructured":"Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Proceedings of CAR-DIS 1998: Third Smart Card Research and Advanced Applications Conference, Louvain-la-Neuve, Belgium. LNCS, Springer, Heidelberg (1998)"},{"key":"7_CR10","volume-title":"Performance Evaluation of Computer Networks","author":"G.N. Higginbottom","year":"1998","unstructured":"Higginbottom, G.N.: Performance Evaluation of Computer Networks. Artech House, Inc., Norwood (1998)"},{"key":"7_CR11","unstructured":"National Bureau of Standards, U.S. Department of Commerce. Data Encryption Standard. Federal Information Processing Standards Publications (FIPS PUB) 46 (January 1977)"},{"key":"7_CR12","unstructured":"National Institute of Standards and Technology, U.S. Department of Commerce. DES Modes of Operation. Federal Information Processing Standards Publication (FIPS PUB) 186 (May 1994)"},{"key":"7_CR13","volume-title":"Asynchronous Transfer Mode Networks: Performance Issues","author":"R.O. Onvural","year":"1994","unstructured":"Onvural, R.O.: Asynchronous Transfer Mode Networks: Performance Issues. Ar-tech House, Inc., Norwood (1994)"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/505754.505757","volume":"29","author":"L.G. Pierson","year":"1999","unstructured":"Pierson, L.G., Witzke, E.L., Bean, M.O., Trombley, G.J.: Context-agile encryption for high speed communication networks. SIGCOMM Computer Communication Review\u00a029(1), 9\u20139 (1999)","journal-title":"SIGCOMM Computer Communication Review"},{"key":"7_CR15","unstructured":"Rueppel, R.A.: Stream ciphers. In: Simmons, G.J. (ed.) Contemporary Cryptology: The Science of Information Integrity, pp. 65\u2013134. IEEE Press, New York (1992)"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-48892-8_3","volume-title":"Selected Areas in Cryptography","author":"B. Schneier","year":"1998","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C.: On the twofish key schedule. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 27\u201342. Springer, Heidelberg (1998)"},{"key":"7_CR17","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Performance comparison of the AES submissions. In: Second Advanced Encryption Standard (AES) Candidate Conference, Rome, Italy. NIST (March 1999)"},{"key":"7_CR18","first-page":"470","volume-title":"Proceedings of IEEE GLOBECOM 1997","author":"P.E. Sholander","year":"1997","unstructured":"Sholander, P.E., et al.: The effect of algorithm-agile encryption on ATM quality of service. In: Proceedings of IEEE GLOBECOM 1997, Phoenix, AZ, pp. 470\u2013474. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"7_CR19","unstructured":"Smart, N.P.: One key to rule them all. Technical Report HPL-1999-26, Extended Enterprise Laboratory, HP Laboratories Bristol, UK (March 1999)"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/204826.204844","volume":"38","author":"D. Stevenson","year":"1995","unstructured":"Stevenson, D., Hillery, N., Byrd, G.: Secure communications in ATM networks. Communications of the ACM\u00a038(2), 45\u201352 (1995)","journal-title":"Communications of the ACM"},{"issue":"9","key":"7_CR21","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/2.708451","volume":"31","author":"T.D. Tarman","year":"1998","unstructured":"Tarman, T.D., Hutchinson, R.L., Pierson, L.G., Sholander, P.E., Witzke, E.L.: Algorithm-agile encryption in ATM networks. IEEE Computer\u00a031(9), 57\u201364 (1998)","journal-title":"IEEE Computer"},{"key":"7_CR22","unstructured":"Tarman, T.D., Hutchinson, R.L., Sholander, P.E., Granfield, R.J., Pierson, L.G., Robertson, P.J., Witzke, E.L.: Final report for the robustness-agile asynchronous transfer mode (ATM) encryption laboratory directed research and development project. Technical Report SAND97-2902, Sandia National Laboratories, Albuquerque, NM (December 1997)"},{"key":"7_CR23","volume-title":"High-Performance Communication Networks","author":"J. Walrand","year":"1996","unstructured":"Walrand, J., Varaiya, P.: High-Performance Communication Networks. Morgan Kaufmann Publishers, Inc., San Francisco (1996)"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/65.238150","volume":"7","author":"L. Zhang","year":"1993","unstructured":"Zhang, L., Deering, S., Estrin, D., Shenker, S., Zappala, D.: Rsvp: A new resource reservation protocol. IEEE Network Magazine\u00a07, 8\u201318 (1993)","journal-title":"IEEE Network Magazine"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-63594-7_68","volume-title":"Financial Cryptography","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: The SPEED cipher. In: Hirschfeld, R. (ed.) FC 1997. LNCS, vol.\u00a01318, pp. 71\u201389. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T23:00:47Z","timestamp":1552863647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/10718964_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}