{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:30:36Z","timestamp":1747906236026,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666462"},{"type":"electronic","value":"9783540480594"}],"license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48059-5_5","type":"book-chapter","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T18:18:49Z","timestamp":1195237129000},"page":"37-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond"],"prefix":"10.1007","author":[{"given":"D. Craig","family":"Wilcox","sequence":"first","affiliation":[]},{"given":"Lyndon G.","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Perry J.","family":"Robertson","sequence":"additional","affiliation":[]},{"given":"Edward L.","family":"Witzke","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Gass","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,8]]},"reference":[{"key":"5_CR1","series-title":"STR-SECURITY-01.00","volume-title":"Straw Ballot","author":"The ATM Forum Technical Committee","year":"1997","unstructured":"The ATM Forum Technical Committee, ATM Security Specification Version 1.0, Straw Ballot, STR-SECURITY-01.00, The ATM Forum, Mountain View, CA, December 1997."},{"key":"5_CR2","volume-title":"Federal Information Processing Standards Publication 46-2","author":"Data Encryption Standard (FIPS PUB 46-2)","year":"1993","unstructured":"Data Encryption Standard (FIPS PUB 46-2), Federal Information Processing Standards Publication 46-2, National Bureau of Standards, Washington, D.C., December 30, 1993."},{"key":"5_CR3","volume-title":"Federal Information Processing Standards Publication 81","author":"DES Modes of Operation (FIPS PUB 81)","year":"1980","unstructured":"DES Modes of Operation (FIPS PUB 81), Federal Information Processing Standards Publication 81, mNational Bureau of Standards, Washington, D.C., December 2, 1980."},{"key":"5_CR4","unstructured":"http:\/\/www.eff.org\/descracker\n\n, January 1999."},{"key":"5_CR5","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"Menezes, Alfred J., et al., Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997."},{"issue":"7","key":"5_CR6","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"R. C. Merkle","year":"1981","unstructured":"Merkle, Ralph C., and Martin E. Hellman, \u201cOn the Security of Multiple Encryption,\u201d Communications of the ACM, Vol. 24, No. 7, p. 465\u2013467, July 1981.","journal-title":"Communications of the ACM"},{"key":"5_CR7","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, Bruce, Applied Cryptography, 2nd edition, John Wiley & Sons, New York, 1996.","edition":"2nd edition"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48059-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T09:50:55Z","timestamp":1589881855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48059-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666462","9783540480594"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-48059-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]},"assertion":[{"value":"8 February 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}