{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:32:00Z","timestamp":1725489120560},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_30","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:03:27Z","timestamp":1186830207000},"page":"367-376","source":"Crossref","is-referenced-by-count":11,"title":["Exploiting Parallelism in Hardware Implementation of the DES"],"prefix":"10.1007","author":[{"given":"Albert G.","family":"Broscius","sequence":"first","affiliation":[]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","volume-title":"High-Performance Interface Architectures for Cryptographic Hardware","author":"D. P. Anderson","year":"1987","unstructured":"David P. Anderson and P. Venkat Rangan, High-Performance Interface Architectures for Cryptographic Hardware, EUROCRYPT\u2019 87 Proceedings, Springer-Verlag, Amsterdam, 1987"},{"key":"30_CR2","unstructured":"Albert G. Broscius, Hardware Analysis and Implementation of the NBS Data Encryption Standard, MSE Thesis, CIS Dept., Univ. of Penn., May 1991"},{"key":"30_CR3","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 83","author":"M. Davio","year":"1984","unstructured":"Marc Davio, Yvo Desmedt, Marc Fosseprez, Rene Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle and Pascal Wouters, Analytical Characteristics of the DES Advances in Cryptology: Proceedings of CRYPTO 83, Plenum Press, New York, 1984"},{"key":"30_CR4","unstructured":"Dorothy Denning, Cryptography and Data Security, Addison-Wesley (1982)"},{"issue":"6","key":"30_CR5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Whitfield Diffie and Martin E. Hellman, Exhaustive Cryptanalysis of the NBS Data Encryption Standard, IEEE Computer Vol. 10 No. 6, June 1977 pp. 74\u201384","journal-title":"IEEE Computer"},{"key":"30_CR6","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 84","author":"R.C. Fairfield","year":"1985","unstructured":"R.C. Fairfield, A. Matsuevich and J. Plany, An LSI Digital Encryption Processor, Advances in Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, New York, 1985"},{"key":"30_CR7","unstructured":"National Bureau of Standards, Federal Information Processing Standard #46: The Data Encryption Standard"},{"key":"30_CR8","unstructured":"National Bureau of Standards, Federal Information Processing Standard #81: Operational Modes of the DES"},{"key":"30_CR9","unstructured":"Anthony McAuley and David C. Feldmeier, Minimizing Protocol Ordering Constraints to Improve Performance, Submitted for publication, Available via anonymous ftp from Internet host \n                    http:\/\/thumper.bellcore.com"},{"key":"30_CR10","unstructured":"Anonymous, Gigabit Network Testbeds, IEEE Computer, Vol. 23 No. 9"},{"issue":"3","key":"30_CR11","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/4.302","volume":"23","author":"I. Verbauwhede","year":"1988","unstructured":"Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle and Hugo de Man, Security and Performance Optimization of a New DES Data Encryption Chip, IEEE Journal of Solid State Circuits Vol. 23, No. 3, pp. 647\u2013656, June 1988","journal-title":"IEEE Journal of Solid State Circuits"},{"key":"30_CR12","unstructured":"VLSI Technology, Inc., VM007 Data Encryption Processor, Tempe, AZ 1991"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:13:32Z","timestamp":1605629612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_30","relation":{},"subject":[]}}