{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:38:52Z","timestamp":1725550732300},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540296430"},{"type":"electronic","value":"9783540321088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11572961_51","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T11:06:07Z","timestamp":1129633567000},"page":"625-639","source":"Crossref","is-referenced-by-count":3,"title":["DRIL\u2013 A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques"],"prefix":"10.1007","author":[{"given":"T. S. B.","family":"Sudarshan","sequence":"first","affiliation":[]},{"given":"Rahil Abbas","family":"Mir","sequence":"additional","affiliation":[]},{"given":"S.","family":"Vijayalakshmi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"51_CR1","volume-title":"Cryptography and Network Security principles and practice","author":"W. Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security principles and practice, 3rd edn. Pearson Education, London (2003)","edition":"3"},{"key":"51_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms and Source code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source code in C, 2nd edn. John Wiley & Sons, Chichester (1996)","edition":"2"},{"key":"51_CR3","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/3-540-58108-1_24","volume-title":"Proc. of Fast Software Encryption Cambridge Security Workshop","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: Description of a New Variable-Length Key, 64 bit Block Cipher (Blowfish). In: Proc. of Fast Software Encryption Cambridge Security Workshop, pp. 191\u2013204. Springer, Heidelberg (1994)"},{"key":"51_CR4","unstructured":"Schneier, B.: The Blowfish Encryption Algorithm -One year later. Dr. Dobb\u2019S Journal (September 1995s)"},{"key":"51_CR5","doi-asserted-by":"crossref","unstructured":"Compton, K., Hauck, S.: Reconfigurable Computing: A Survey of Systems and Software. ACM Computing Surveys\u00a034(2) (June 2002)","DOI":"10.1145\/508352.508353"},{"key":"51_CR6","doi-asserted-by":"crossref","unstructured":"Wollinger, T., Paar, C.: How Secure Are FPGAs in cryptographic Applications? In: Int\u2019l Conference on Field Programmable Logic and Applications (FPL 2003), Lisbon, Portugal, September 1-3 (2003)","DOI":"10.1007\/978-3-540-45234-8_10"},{"key":"51_CR7","unstructured":"Lai, Y.K., Shu, Y.C.: A novel VLSI architecture for a variable-length key, 64-bit blowfish Block cipher. In: Proc. of IEEE Int\u2019l Workshop on Signal Processing System Design and Implementation (SiPS 1999), Taipei, Taiwan, pp. 568\u2013577 (1999)"},{"key":"51_CR8","unstructured":"Lai, Y.K., Shu, Y.C.: VLSI Architecture Design and Implementation for Blowfish BlockCipher with Secure Modes of Operation. In: Proc.of IEEE Int\u2019l. Symposium on Circuits and Systems (ISCAS 2001), May, pp. 57\u201360 (2001)"},{"key":"51_CR9","doi-asserted-by":"crossref","unstructured":"Lin, M.C.J., Lin, Y.-L.: A VLSI Implementation of the BlowfishEncryption\/Decryption Algorithm. In: Asia and South Pacific Design Automation Conference (ASPDAC), Yokohama, Japan (Janaury 2000)","DOI":"10.1145\/368434.368449"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Salomao, S.L.C., de Alcantra, J.M.S., Alves, V.C., Vieria, A.C.C.: SCOB, a soft-core for the Blowfish Cryptographic algorithm. In: Proc. IEEE Int\u2019l Conf. Integrated Circuit and System Design, pp. 220\u2013223 (1999)","DOI":"10.1109\/SBCCI.1999.803126"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Singpiel, H., Simmler, H., Kugel, A., Manner, R., Vieira, A.C.C., Galvez-Durand, F., de Alcantara, J.M.S., Alves, V.C.: Implementation of Cryptographic Application on the Reconfigurable FPGA Coprocessor. In: 13th Symposium on Integrated Circuits and Systems Design (SBCCI 2000), Manaus, Brazil, September 18-24 (2000)","DOI":"10.1109\/SBCCI.2000.876055"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Chodowiec, P., Khuon, P., Gaj, K.: Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. In: Proc. of the 2001 ACM\/SIGDA 9th Int\u2019l symposium on Field programmable gate arrays, Monterey, California, February 11-13, pp. 94\u2013102 (2001)","DOI":"10.1145\/360276.360309"},{"key":"51_CR13","unstructured":"Elbirt, A.J., Yip, W., Chetwynd, B., Paar, C.: An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists. In: Proc. of the 3rd Advanced Encryption Standard (AES) Candidate Conference, New York, April 13-14 (2000)"},{"key":"51_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-48059-5_20","volume-title":"Cryptographic Hardware and Embedded Systems","author":"R.R. Taylor","year":"1999","unstructured":"Taylor, R.R., Goldstein, S.C.: A high Performance flexible architecture for cryptography. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 231\u2013245. Springer, Heidelberg (1999)"},{"key":"51_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-48892-8_19","volume-title":"Selected Areas in Cryptography","author":"J. Kaps","year":"1999","unstructured":"Kaps, J., Paar, C.: Fast DES implementations for FPGAs and its Applications to a Universal Key Search Machine. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, p. 234. Springer, Heidelberg (1999)"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Patterson, C.: High Performance DES Encryption in Virtex(tm) FPGAs Using Jbits(tm). In: Proc. of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, Napa Valley, California, April 17-19 (2000)","DOI":"10.1109\/FPGA.2000.903398"},{"key":"51_CR17","doi-asserted-by":"crossref","unstructured":"Hodjat, A., Verbauwhede, I.: A 21.54 Gbits\/s fully pipelined AES processor on FPGA. In: IEEE Symposium on Field-Programmable Custom Computing Machines (April 2004)","DOI":"10.1109\/FCCM.2004.1"},{"key":"51_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-44709-1_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"V. Fischer","year":"2001","unstructured":"Fischer, V., Drutarovsky, M.: Two Methods of Rijndael implementation in Reconfigurable hardware. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 77\u201392. Springer, Heidelberg (2001)"},{"key":"51_CR19","unstructured":"Backup for Workgroups, Automatic backup and restore software, http:\/\/www.backup-forworkgroups.com\/A"},{"key":"51_CR20","unstructured":"Encryption Plus Hard disk, http:\/\/www.pcguardiantechnologies.com\/Encryption_Plus_Hard_Disk\/"},{"key":"51_CR21","unstructured":"Encryption Tools, http:\/\/www.parisien.org\/pet.htm"},{"key":"51_CR22","unstructured":"Ultra Scan, True Identity biometrics, http:\/\/www.ultra-scan.com"},{"key":"51_CR23","unstructured":"Cryptography: Protecting your Geographic Data, http:\/\/www.geodyssey.com\/cryptography\/cryptography.html"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Systems Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11572961_51.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:55:50Z","timestamp":1605642950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11572961_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540296430","9783540321088"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11572961_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}