{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:23:20Z","timestamp":1743063800498,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030926656"},{"type":"electronic","value":"9783030926663"}],"license":[{"start":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T00:00:00Z","timestamp":1638921600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T00:00:00Z","timestamp":1638921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-92666-3_34","type":"book-chapter","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T10:02:54Z","timestamp":1638871374000},"page":"392-401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of XTS - GOST 28147-89 with Pipeline Structure on FPGA"],"prefix":"10.1007","author":[{"given":"Binh-Nhung","family":"Tran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ngoc-Quynh","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ba-Anh","family":"Dao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chung-Tien","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,12,8]]},"reference":[{"key":"34_CR1","unstructured":"National Standard of Russian Federation: GOST 28147-89, Data Security Algorithm (2012)."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Kaps, J.P., Paar, C.: Fast DES implementations for FPGAs and its application to a universal key-search machine. In: 5th Annual Workshop on Selected Areas in Cryptography, pp.234\u2013247. Canada (1998)","DOI":"10.1007\/3-540-48892-8_19"},{"key":"34_CR3","unstructured":"Akta\u015f, H.: Implementation of GOST 28147-89 encryption and decryption algorithm on FPGA. In: International Conference on Cyber Security and Computer Science (ICONCS\u201918), Safranbolu, Turkey. October 18\u201320 2018"},{"key":"34_CR4","unstructured":"Markku-Juhani, O., Saarinen: Cryptographic Analysis of All 4 \u00d7 4 - Bit S-Boxes. http:\/\/eprint.iacr.org\/2011\/218"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Kris, G., Pawel, C.: FPGA and ASIC implementations of AES. In: Cryptographic Engineering, pp. 235\u2013294. Springer, Boston (2009)","DOI":"10.1007\/978-0-387-71817-0_10"},{"key":"34_CR6","unstructured":"Schneier, B., Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edn. Wiley (1996)"},{"issue":"1","key":"34_CR7","first-page":"123","volume":"20","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: The GOST Encryption Algorithm. Dr. Doob\u2019s J. 20(1), 123\u2013124 (1995)","journal-title":"Dr. Doob\u2019s J."},{"key":"34_CR8","unstructured":"NIST Computer Security Division's, Security Technology Group: Block cipher modes. Cryptographic Toolkit. NIST. Archived from the original on 6 November 2012. Accessed 12 Apr 2013"},{"key":"34_CR9","unstructured":"NIST Computer Security Division's, Security Technology Group: Proposed modes. Cryptographic Toolkit. NIST. Archived from the original on April 2, 2013. Retrieved April 14 (2013)."},{"key":"34_CR10","unstructured":"Shrestha, M.: Parallel implementation of AES using XTS mode of operation. Culminating Projects in Computer Science and Information Technology 21 (2018)"},{"key":"34_CR11","unstructured":"Cadence Design Systems, Inc., Application Note: Implementing the XTS-AES Standard on Xtensa\u00ae Processors. 2566 Seely Ave, San Jose, CA 95134 (2013)"}],"container-title":["Lecture Notes in Networks and Systems","Modelling, Computation and Optimization in Information Systems and Management Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-92666-3_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T10:10:56Z","timestamp":1638871856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-92666-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,8]]},"ISBN":["9783030926656","9783030926663"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-92666-3_34","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,12,8]]},"assertion":[{"value":"8 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MCO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanoi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mco2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mco2021.event.univ-lorraine.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}