{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:20:57Z","timestamp":1725664857461},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540605904"},{"type":"electronic","value":"9783540478096"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60590-8_28","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T20:44:43Z","timestamp":1330289083000},"page":"359-362","source":"Crossref","is-referenced-by-count":4,"title":["Performance of block ciphers and hash functions \u2014 One year later"],"prefix":"10.1007","author":[{"given":"Michael","family":"Roe","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"R. J. Anderson, editor. Fast Software Encryption, number 809 in Lecture Notes in Computer Science. Springer-Verlag, December 1993.","DOI":"10.1007\/3-540-58108-1"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"B. Chambers. Two stream ciphers. In Anderson [1], pages 51\u201355.","DOI":"10.1007\/3-540-58108-1_7"},{"key":"28_CR3","unstructured":"CWI, Amsterdam. RIPE Integrity Primitives \u2014 Final Report of RACE Integrity Primitives Evaluation (R1040), June 1992."},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"J. Daemen, R. Govaerts, and J. Vandewalle. A new approach to block cipher design. In Anderson [1], pages 18\u201332.","DOI":"10.1007\/3-540-58108-1_2"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"B. Kaliski. RFC 1319: The MD2 Message-Digest Algorithm, April 1992.","DOI":"10.17487\/rfc1319"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"B. Kaliski and M. Robshaw. Fast block cipher proposal. In Anderson [1], pages 33\u201340.","DOI":"10.1007\/3-540-58108-1_3"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"J. L. Massey. SAFER K-64: A byte-oriented block-ciphering algorithm. In Anderson [1], pages 1\u201317.","DOI":"10.1007\/3-540-58108-1_1"},{"key":"28_CR8","unstructured":"C. H. Meyer and S. M. Matyas. Cryptography: a new dimension in computer data security. John Wiley and Sons, 1982."},{"key":"28_CR9","unstructured":"National Bureau of Standards. Federal Information Processing Standard \u2014 Publication 46: Data Encryption Standard, 1977."},{"key":"28_CR10","unstructured":"National Institute of Standards and Technology. Federal Information Processing Standard \u2014 Publication 180-1: Secure Hash Standard, May 1994."},{"key":"28_CR11","unstructured":"National Institute of Standards and Technology. NIST announces technical correction to secure hash standard. Press release, April 1994."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"R. L. Rivest. RFC 1320: The MD4 Message-Digest Algorithm, April 1992.","DOI":"10.17487\/rfc1320"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"R. L. Rivest. RFC 1321: The MD5 Message-Digest Algorithm, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"R. L. Rivest. The RC5 encryption algorithm. In Fast Software Encryption, Lecture Notes in Computer Science. Springer-Verlag, pages 86\u201396 (these proceedings).","DOI":"10.1007\/3-540-60590-8_7"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"M. Roe. Performance of symmetric ciphers and one-way hash functions. In Anderson [1].","DOI":"10.1007\/3-540-58108-1_11"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"P. Rogaway and D. Coppersmith. A software optimised encryption algorithm. In Anderson [1], pages 56\u201363.","DOI":"10.1007\/3-540-58108-1_8"},{"key":"28_CR17","unstructured":"[Russian] State Committee for Standardization, Metrology and Certification. GOST 28147: Cryptographic Protection for Data Processing Systems \u2014 Cryptographic Transformation Algorithm, 1990."},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"B. Schneier. Description of a new variable-length key, 64-bit block cipher (Blow-fish). In Anderson [1], pages 191\u2013204.","DOI":"10.1007\/3-540-58108-1_24"},{"key":"28_CR19","unstructured":"B. Schneier. The GOST encryption algorithm. Dr. Dobb's Journal, pages 143\u2013144, January 1995."},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"D. Wheeler. A bulk data encryption algorithm. In Anderson,[1], pages 127\u2013134.","DOI":"10.1007\/3-540-58108-1_16"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60590-8_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:00:17Z","timestamp":1605646817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60590-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540605904","9783540478096"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-60590-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}