{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:33:50Z","timestamp":1762004030680},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442707"},{"type":"electronic","value":"9783540458111"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_6","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T09:43:51Z","timestamp":1192787031000},"page":"75-89","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512"],"prefix":"10.1007","author":[{"given":"Tim","family":"Grembowski","sequence":"first","affiliation":[]},{"given":"Roar","family":"Lien","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]},{"given":"Nghi","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Bellows","sequence":"additional","affiliation":[]},{"given":"Jaroslav","family":"Flidr","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Lehman","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Schott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"6_CR1","unstructured":"Elbirt, A. J., Yip, W., Chetwynd, B., Paar, C.: An FPGA implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists. Proc. 3rd Advanced Encryption Standard (AES) Candidate Conference, New York, April 13\u201314, 2000."},{"key":"6_CR2","unstructured":"FIPS 185, Escrowed Encryption Standard (EES), February 1994."},{"key":"6_CR3","unstructured":"FIPS 186-2, Digital Signature Standard (DSS), February 2000, available at \nhttp:\/\/csrc.nist.gov\/encryption\/tkdigsigs.html"},{"key":"6_CR4","unstructured":"NIST, FIPS Publication 197, Specification for the Advanced Encryption Standard (AES), November 26, 2001, available at \nhttp:\/\/csrc.nist.gov\/encryption\/aes\/\n\n."},{"key":"6_CR5","unstructured":"FIPS 198, HMAC-Keyed-Hash Message Authentication Code, available at http:\/\/csrc.nist.gov\/encryption\/tkmac.html"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Gaj, K., and Chodowiec, P.: Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays, Proc. RSA Security Conference-Cryptographer\u2019s Track, April 2001.","DOI":"10.1007\/3-540-45353-9_8"},{"key":"6_CR7","unstructured":"NIST Cryptographic Toolkit, Secure Hashing, available at \nhttp:\/\/csrc.nist.gov\/encryption\/tkhash.html"},{"key":"6_CR8","unstructured":"IP Security Protocol (ipsec) Charter-Latest RFCs and Internet Drafts for IPSec, \nhttp:\/\/ietf.org\/html.charters\/ipsec-charter.html"},{"key":"6_CR9","unstructured":"Menezes, A. J., van Oorschot P. C., and Vanstone S. A.: Handbook of Applied Cryptography, CRC Press, Inc., Boca Raton, 1996."},{"key":"6_CR10","unstructured":"Parhami, B.: Computer Arithmetic: Algorithms and Hardware Design, Oxford University Press, 2000."},{"key":"6_CR11","unstructured":"Stallings, W.: Cryptography and Network Security, 1999 Prentice-Hall, Inc., Upper Saddle River, New Jersey. 2nd Edition."},{"key":"6_CR12","unstructured":"Xilinx, Inc.: Virtex 2.5 V Field Programmable Gate Arrays, available at \nhttp:\/\/www.xilinx.com\n\n."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T11:04:29Z","timestamp":1580123069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}