{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:08:13Z","timestamp":1725664093379},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602941"},{"type":"electronic","value":"9783540447863"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60294-1_103","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T13:07:56Z","timestamp":1330261676000},"page":"104-110","source":"Crossref","is-referenced-by-count":0,"title":["Customised hardware based on the REDOC III algorithm for high performance data ciphering"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Guerrero","sequence":"first","affiliation":[]},{"given":"James M.","family":"Noras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"11_CR1","unstructured":"ANSI X3.92, \u201cAmerican National Standard for Data Encryption Algorithm (DEA)\u201d, American National Standards Institute, 1981."},{"key":"11_CR2","first-page":"224","volume-title":"Applied Cryptography: protocols, algorithms, and source code in C","author":"B. Schneier","year":"1994","unstructured":"Schneier, B.: \u201cApplied Cryptography: protocols, algorithms, and source code in C\u201d, John Wiley & Sons, New York, USA, pp. 224\u2013230, 1994."},{"key":"11_CR3","first-page":"238","volume-title":"Applied Cryptography: protocols, algorithms, and source code in C","author":"B. Schneier","year":"1994","unstructured":"Ibidem, pp. 238\u2013239."},{"key":"11_CR4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/BF02620231","volume":"6","author":"U.M. Maurer","year":"1993","unstructured":"Maurer, U.M. and Massey, J.L.: \u201cCascade Ciphers: The Importance of Being First\u201d, Journal of Cryptology, vol. 6, pp. 55\u201361, 1993.","journal-title":"Journal of Cryptology"},{"key":"11_CR5","unstructured":"Wood, M.C., 1991, US Patent 5,003,596, 26 March 1991, \u201cMethod of Cryptographically Transforming Electronic Digital Data from One Form to Another.\u201d"},{"key":"11_CR6","unstructured":"Shepherd, S.J. and Noras, J.M., 1994, \u201cA very fast hardware replacement for the DES\u201d, 3rd UK\/Australian International Symposium of \u201cDSP for Communication Systems\u201d, 12\u201314 December, University of Warwick."}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60294-1_103.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T21:35:48Z","timestamp":1619559348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60294-1_103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602941","9783540447863"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/3-540-60294-1_103","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}