{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T02:48:55Z","timestamp":1761014935027},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_42","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"579-592","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Experience Using a Low-Cost FPGA Design to Crack DES Keys"],"prefix":"10.1007","author":[{"given":"Richard","family":"Clayton","sequence":"first","affiliation":[]},{"given":"Mike","family":"Bond","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"42_CR1","series-title":"Lect Notes Comput Sci","first-page":"220","volume-title":"Attacks on Cryptoprocessor Transaction Sets","author":"M. Bond","year":"1997","unstructured":"M. Bond: Attacks on Cryptoprocessor Transaction Sets. Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES 2001), LNCS 2162, Springer-Verlag, pp 220\u2013234 (2001)"},{"key":"42_CR2","series-title":"Lect Notes Comput Sci","first-page":"3","volume-title":"Advances in Cryptology-CRYPTO\u201986","author":"E. F. Brickell","year":"1987","unstructured":"E. F. Brickell, J. H. Moore and M. R. Purtill: Structure in the S-boxes of the DES (extended abstract). In A. M. Odlyzko (ed.), Advances in Cryptology-CRYPTO\u201986, LNCS 263, Springer-Verlag, pp 3\u20138 (1987)"},{"key":"42_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-39568-7_14","volume-title":"Advances in Cryptology-CRYPTO\u201984","author":"M. Davio","year":"1985","unstructured":"M. Davio, Y. Desmedt, J. Goubert, F. Hoornaert and J. Quisquater: Efficient hardware and software implementations for the DES. In G. R. Blakley and D. Chaum (ed.), Advances in Cryptology-CRYPTO\u201984, LNCS 196, Springer-Verlag, pp 144\u2013146 (1985)"},{"issue":"6","key":"42_CR4","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. E. Hellman: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. IEEE Computer 10(6), pp 74\u201384 (1977)","journal-title":"IEEE Computer"},{"key":"42_CR5","unstructured":"Electronic Frontier Foundation: Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O'Reilly. (May 1998)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"J. Gilmore: Personal communication. (17 Nov 2001)","DOI":"10.1023\/A:1017999421202"},{"key":"42_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-48059-5_3","volume-title":"Cryptographic Hardware and Embedded Systems","author":"I. Hamer","year":"1999","unstructured":"I. Hamer and P. Chow: DES Cracking on the Transmogrifier 2a. Cryptographic Hardware and Embedded Systems, LNCS 1717, Springer-Verlag, pp 13\u201324 (1999)"},{"key":"42_CR8","unstructured":"M. E. Hellman, R. Merkle, R. Schroppel, L. Washington, W. Diffie, S. Pohlig and P. Schweitzer: Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard. Information Systems Laboratory SEL 76-042, Stanford University (Sep 9 1976)"},{"key":"42_CR9","volume-title":"IBM 4758 PCI Cryptographic Coprocessor CCA Basic Services Reference and Guide for the IBM 4758-001, Release 1.31","author":"IBM Inc.","year":"1999","unstructured":"IBM Inc.: IBM 4758 PCI Cryptographic Coprocessor CCA Basic Services Reference and Guide for the IBM 4758-001, Release 1.31. IBM, Armonk, N.Y. (1999) \n                    ftp:\/\/www6.software.ibm.com\/software\/cryptocards\/bscsvc02.pdf"},{"key":"42_CR10","unstructured":"IBM Inc.: Update on CCA DES Key-Management. (Nov 2001) \n                    http:\/\/www-3.ibm.com\/security\/cryptocards\/html\/ccaupdate.shtml"},{"key":"42_CR11","unstructured":"IBM Inc.: CCA Version 2.41. (5 Feb 2002) \n                    http:\/\/www-3.ibm.com\/security\/cryptocards\/html\/release241.shtml"},{"key":"42_CR12","unstructured":"IBM Inc.: Version history of CCA Version 2.41, IBM 4758 PCI Cryptographic Coprocessor CCA Basic Services Reference and Guide for the IBM 4758-002. IBM, pg xv (Feb 2002)"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"J. Kaps and C. Paar: Fast DES Implementation for FPGAs and its Application to a Universal Key-Search Machine. Selected Areas in Cryptography, pp 234\u2013247 (1998)","DOI":"10.1007\/3-540-48892-8_19"},{"key":"42_CR14","unstructured":"National Bureau of Standards: Data Encryption Standard. Federal Information Processing Standard (FIPS), Publication 46, US Department of Commerce (Jan 1977)"},{"key":"42_CR15","unstructured":"RSA Security Inc.: Cryptographic Challenges. \n                    http:\/\/www.rsasecurity.com\/rsalabs\/challenges\/index.html"},{"key":"42_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-39799-X_22","volume-title":"Advances in Cryptology-CRYPTO\u201985","author":"A. Shamir","year":"1986","unstructured":"A. Shamir: On the security of DES. In Hugh C. Williams (ed.), Advances in Cryptology-CRYPTO\u201985, LNCS 218, Springer-Verlag, pp 280\u2013281 (1986)"},{"key":"42_CR17","unstructured":"M. Wiener: Efficient DES Key Search. TR-244, School of Computer Science, Carleton University (May 1994)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:25:59Z","timestamp":1558473959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_42","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}