{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:38Z","timestamp":1725488318298},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_42","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"575-586","source":"Crossref","is-referenced-by-count":0,"title":["Content-Addressable Search Engines and DES-like Systems"],"prefix":"10.1007","author":[{"given":"Peter C.","family":"Wayner","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Sharon Marie Britton. 8k-trit Database Accelerator with Error Detection. PhD thesis, Massachusetts Institute of Technology, February 1990.","key":"42_CR1"},{"unstructured":"Eli Biham and Adi Shamir. Differential cryptanalysis of Snefru, Khafte. REDOC-II, LOKI, and lucifer. In Crypto 91, Santa Barbara, California, 1991.","key":"42_CR2"},{"issue":"6","key":"42_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"Whitfield Diffie and Martin Hellman. Exhaustive cryptanalysis of the nbs data encryption standard. Computer, 10(6):74\u201384, 1977.","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"David C. Feldmeier and Philip R. Karn. Unix password security-ten years later. In G. Brassard, editor, Advances in Cryptology: Proceedings of Crypto\u2019 89, pages 44\u201363, New York City, Berlin, 1989. Springer-Verlag.","key":"42_CR4","DOI":"10.1007\/0-387-34805-0_6"},{"doi-asserted-by":"crossref","unstructured":"Robert C. Fairfield, Alex Matusevich, and Joseph Plany. An Isi digital encryption processor. IEEE Communication, pages 23\u201327, July 1985.","key":"42_CR5","DOI":"10.1109\/MCOM.1985.1092609"},{"issue":"3","key":"42_CR6","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/0161-119191865849","volume":"15","author":"G. Garon","year":"1991","unstructured":"Gilles Garon and Richard Outerbridge. Des watch: And examination of the sufficiency of the data encryption standard for financial institution\u2019s information security in the 1990\u2019s. Cryptologia, 15(3):177\u2013193, July 1991.","journal-title":"Cryptologia"},{"key":"42_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83056-3","volume-title":"Content-Addressable Memories","author":"T. Kohonen","year":"1987","unstructured":"Teuvo Kohonen. Content-Addressable Memories. Springer-Verlag, Berlin, New York City, 1987."},{"unstructured":"Ralph Merkle. Fast software encryption function. In A.J. Menezes and S.A. Van Stone, editors, Crypto 90, Berlin, New York City, 1990. Springer Verlag.","key":"42_CR8"},{"key":"42_CR9","volume-title":"Cryptography: New Dimension in Computer Security","author":"C. H. Meyer","year":"1982","unstructured":"Carl H. Meyer and Stephen M. Matyas. Cryptography: New Dimension in Computer Security. John Wiley and Sons, New York, 1982."},{"key":"42_CR10","volume-title":"Data encryption standard (des)","author":"NBS.","year":"1977","unstructured":"NBS. Data encryption standard (des). Technical report, National Bureau of Standards (US), Federal Information Processing Standards, Publication 46, National Technical Information Services, Springfield, Virginia, April 1977."},{"key":"42_CR11","first-page":"163","volume":"133","author":"J.V. Oldfield","year":"1986","unstructured":"J.V. Oldfield. Logic programs and an experimental architecture for their execution. Proceedings of the I.E.E.E. Part E, 133:163\u2013167, 1986.","journal-title":"Proceedings of the I.E.E.E. Part E"},{"unstructured":"J.V. Oldfield, Charles D. Stormon, and M.R. Brule. The application of vlsi content-addressable memories to the acceleration of logic programming systems. In CompEuro 87, VLSI and Computers, pages 27\u201330, Hamburg, Germany, May 1987.","key":"42_CR12"},{"issue":"6","key":"42_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1049\/el:19870191","volume":"23","author":"J.V. Oldfield","year":"1987","unstructured":"J.V. Oldfield, R.D. Williams, and N.E. Wiseman. Content-addressable memories for storing and processing recursively-divided images and trees. Electronics Letters, 23(6):262\u2013263, 1987.","journal-title":"Electronics Letters"},{"key":"42_CR14","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris Sr","year":"1979","unstructured":"Robert Morris Sr. and Ken Thompson. Password security: A case history. Communications of the ACM, 22:594\u2013597, November 1979.","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, and Hugo J. De Man. Security and performance optimization of a new des encryption chip. IEEE Journal of Solid-State Circuits, pages 647\u2013656, June 1988.","key":"42_CR15","DOI":"10.1109\/4.302"},{"issue":"4","key":"42_CR16","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/4.34085","volume":"24","author":"J. Wade","year":"1989","unstructured":"John Wade and Charles Sodini. A ternary content-addressable search engine. IEEE Journal of Solid-State Circuits, 24(4):1003\u20131013, August 1989.","journal-title":"IEEE Journal of Solid-State Circuits"},{"doi-asserted-by":"crossref","unstructured":"Richard Zippel. Programming the data structure accelerator. In Proceedings of Jerusalem Conference on Information, Technology, Jerusalem, Israel, October 1990.","key":"42_CR17","DOI":"10.21236\/ADA226334"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:22Z","timestamp":1605647722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_42","relation":{},"subject":[]}}