{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:19:18Z","timestamp":1725488358619},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_24","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:24:05Z","timestamp":1186349045000},"page":"348-362","source":"Crossref","is-referenced-by-count":9,"title":["SHA: A Design for Parallel Architectures?"],"prefix":"10.1007","author":[{"given":"Antoon","family":"Bosselaers","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"issue":"2","key":"24_CR1","first-page":"12","volume":"46","author":"M. Bass","year":"1995","unstructured":"M. Bass, P. Knebel, D.W. Quint, W.L. Walker, \u201cThe PA 7100LC microprocessor: a case study of IC design decisions in a competitive environment,\u201d HP Journal, Vol. 46, No. 2, April 1995, pp. 12\u201322.","journal-title":"HP Journal"},{"key":"24_CR2","volume-title":"Alpha implementations and architecture","author":"D.P. Bhandarkar","year":"1996","unstructured":"D.P. Bhandarkar, Alpha implementations and architecture, Digital Press, Boston, MA, 1996."},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/227234.227246","volume":"39","author":"G.E. Blelloch","year":"1996","unstructured":"G.E. Blelloch, \u201cProgramming parallel algorithms,\u201d Communications of the ACM, Vol. 39, No. 3, 1996, pp. 85\u201397.","journal-title":"Communications of the ACM"},{"key":"24_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/3-540-68697-5_23","volume-title":"Advances in Cryptology, Proceedings Crypto\u201996","author":"A. Bosselaers","year":"1996","unstructured":"A. Bosselaers, R. Govaerts, J. Vandewalle, \u201cFast hashing on the Pentium,\u201d Advances in Cryptology, Proceedings Crypto\u201996, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298\u2013312."},{"key":"24_CR5","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption","author":"C. Clapp","year":"1997","unstructured":"C. Clapp, \u201cOptimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,\u201d Fast Software Encryption, LNCS, E. Biham, Ed., Springer-Verlag, 1997, to appear."},{"key":"24_CR6","unstructured":"Alpha architecture handbook, Version 3, Digital Equipment Corp., Maynard, MA, 1996."},{"key":"24_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/3-540-60865-6_43","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, \u201cCryptanalysis of MD4,\u201d Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 53\u201369."},{"issue":"2","key":"24_CR8","first-page":"1","volume":"2","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, \u201cThe status of MD5 after a recent attack,\u201d CryptoBytes, Vol. 2, No. 2, 1996, pp. 1\u20136.","journal-title":"CryptoBytes"},{"key":"24_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Fast Software Encryption","author":"H. Dobbertin","year":"1996","unstructured":"H. Dobbertin, A. Bosselaers, B. Preneel, \u201cRIPEMD-160: A Strengthened Version of RIPEMD,\u201d Fast Software Encryption, LNCS 1039. D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71\u201382. Final version available via ftp at http:\/\/ftp.esat.kuleuven.ac.be\/pub\/COSIC\/bosselae\/ripemd\/ ."},{"key":"24_CR10","unstructured":"FIPS 180-1, \u201cSecure hash standard,\u201d US Department of Commerce\/NIST, Washington D.C., April 1995."},{"issue":"12","key":"24_CR11","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/PROC.1966.5273","volume":"54","author":"M. Flynn","year":"1966","unstructured":"M. Flynn, \u201cVery high-speed computing systems,\u201d Proceedings of the IEEE, Vol. 54, No. 12, 1966, pp. 1901\u20131909.","journal-title":"Proceedings of the IEEE"},{"key":"24_CR12","series-title":"Lect Notes Comput Sci","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"1997","unstructured":"S. Halevi and H. Krawczyk, \u201cMMH: Software message authentication in the Gbit\/second rates,\u201d Fast Software Encryption, LNCS, E. Biham, Ed., Springer-Verlag, 1997, to appear."},{"key":"24_CR13","volume-title":"Computer architecture: a quantitative approach","author":"J.L. Hennessy","year":"1996","unstructured":"J.L. Hennessy and D.A. Patterson, Computer architecture: a quantitative approach, 2nd edition, Morgan Kaufmann Publishers, San Francisco, 1996.","edition":"2nd edition"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/40.372347","volume":"15","author":"R. Lee","year":"1995","unstructured":"R. Lee, \u201cAccelerating multimedia with enhanced microprocessors,\u201d IEEE Micro, Vol. 15, No. 2, April 1995, pp. 22\u201332.","journal-title":"IEEE Micro"},{"issue":"4","key":"24_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/40.526925","volume":"16","author":"R. Lee","year":"1996","unstructured":"R. Lee, \u201cSubword parallelism with MAX-2,\u201d IEEE Micro, Vol. 16, No. 4, August 1996, pp. 51\u201359","journal-title":"IEEE Micro"},{"key":"24_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BFb0053426","volume-title":"Advances in Cryptology, Proceedings Eurocrypt\u201994","author":"D. Naccache","year":"1995","unstructured":"D. Naccache, D. M\u2019Ra\u00efhi, S. Vaudenay, D. Raphaeli, \u201cCan DSA be improved? Complexity trade-offs with the Digital Signature Standard,\u201d Advances in Cryptology, Proceedings Eurocrypt\u201994, LNCS 950, A. De Santis, Ed., Springer-Verlag, 1995, pp. 77\u201385."},{"key":"24_CR17","unstructured":"K.S. McCurley, \u201cA fast portable implementation of the secure hash algorithm, III,\u201d Technical Report SAND93-2591, Sandia National Laboratories, 1994."},{"issue":"4","key":"24_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/40.526924","volume":"16","author":"A. Peleg","year":"1996","unstructured":"A. Peleg and U. Weiser, \u201cMMX technology extension to the Intel architecture,\u201d IEEE Micro, Vol. 16, No. 4, August 1996, pp. 42\u201350.","journal-title":"IEEE Micro"},{"key":"24_CR19","series-title":"Lect Notes Comput Sci","volume-title":"Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040)","author":"RIPE","year":"1995","unstructured":"RIPE, \u201cIntegrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040),\u201d LNCS 1007, A. Bosselaers and B. Preneel, Eds., Springer-Verlag, 1995."},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cThe MD4 message-digest algorithm,\u201d Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1320"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cThe MD5 message-digest algorithm,\u201d Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.","DOI":"10.17487\/rfc1321"},{"key":"24_CR22","unstructured":"M. Robshaw, \u201cOn recent results for MD2, MD4 and MD5,\u201d Bulletin No. 4, RSA Laboratories, November 1996."},{"key":"24_CR23","unstructured":"G.A. Slavenburg, S. Rathnam, H. Dijkstra, \u201cThe Trimedia TM-1 PCI VLIW media processor,\u201d Hot Chips VIII Conference, Stanford University, Palo Alto, CA, 1996."},{"issue":"5","key":"24_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MM.1994.363071","volume":"14","author":"S.P. Song","year":"1994","unstructured":"S.P. Song, M. Denman, J. Chang, \u201cThe PowerPc 604 RISC microprocessor,\u201d IEEE Micro, Vol. 14, No. 5, October 1994, pp. 8\u201317.","journal-title":"IEEE Micro"},{"key":"24_CR25","volume-title":"A practitioner\u2019s guide to RISC microprocessor architecture","author":"P.H. Stakem","year":"1996","unstructured":"P.H. Stakem, A practitioner\u2019s guide to RISC microprocessor architecture, John Wiley & Sons, New York, 1996."},{"issue":"4","key":"24_CR26","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/217391.217414","volume":"25","author":"J. Touch","year":"1995","unstructured":"J. Touch, \u201cPerformance analysis of MD5,\u201d Proceedings of ACM SIGCOMM\u201995, Comp. Comm. Review, Vol. 25, No. 4, 1995, pp. 77\u201386.","journal-title":"Proceedings of ACM SIGCOMM\u201995, Comp. Comm. Review"},{"issue":"4","key":"24_CR27","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/40.526921","volume":"16","author":"M. Tremblay","year":"1996","unstructured":"M. Tremblay, J.M. O\u2019Connor, V. Narayanan, L. He, \u201cVIS speeds new media processing,\u201d IEEE Micro, Vol. 16, No. 4, August 1996, pp. 10\u201320.","journal-title":"IEEE Micro"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:15Z","timestamp":1556724735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}