{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:06:20Z","timestamp":1743015980662,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009445"},{"type":"electronic","value":"9783319009452"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00945-2_39","type":"book-chapter","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T09:29:17Z","timestamp":1369906157000},"page":"431-438","source":"Crossref","is-referenced-by-count":2,"title":["Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices"],"prefix":"10.1007","author":[{"given":"Jaros\u0142aw","family":"Sugier","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Anderson, R., Biham, E., Knudsen, L.: Serpent: A Proposal for the Advanced Encryption Standard. In: The First Advanced Encryption Standard (AES) Candidate Conference, Ventura, California, August 20-22 (1998), \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html\n                   (accessed March 2012)"},{"key":"39_CR2","unstructured":"Bernstein, D.J.: The Salsa20 Stream Cipher. In: Proc. SKEW - Symmetric Key Encryption Workshop, Aarhus, Danemark, May 26-27, pp. 26\u201327 (2005), \n                    http:\/\/cr.yp.to\/snuffle.html\n                   (accessed April 2013)"},{"key":"39_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"39_CR4","unstructured":"Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. In: Proc. State of the Art of Stream Ciphers Workshop, eSTREAM, ECRYPT Stream Cipher Project, vol.\u00a026 (2007)"},{"key":"39_CR5","unstructured":"Good, T., Benaissa, M.: Hardware results for selected stream cipher candidates. In: Proc. State of the Art of Stream Ciphers Workshop, pp. 191\u2013204 (2007)"},{"key":"39_CR6","unstructured":"National Institute of Standards and Technology, Specification for the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197 (2001), \n                    http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html\n                   (accessed March 2012)"},{"key":"39_CR7","first-page":"159","volume-title":"Monographs of System Dependability: Technical Approach to Dependability","author":"J. Sugier","year":"2010","unstructured":"Sugier, J.: Low-cost hardware implementation of Serpent cipher in programmable devices. In: Monographs of System Dependability: Technical Approach to Dependability, vol.\u00a03, pp. 159\u2013172. Publishing House of Wroc\u0142aw University of Technology, Wroc\u0142aw (2010)"},{"key":"39_CR8","series-title":"AISC","first-page":"273","volume-title":"Complex Systems and Dependability","author":"J. Sugier","year":"2012","unstructured":"Sugier, J.: Implementing AES and Serpent ciphers in new generation of low-cost FPGA devices. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Complex Systems and Dependability. AISC, vol.\u00a0170, pp. 273\u2013287. Springer, Heidelberg (2012)"},{"key":"39_CR9","unstructured":"Sugier, J.: Low-cost hardware implementations of Salsa20 stream cipher in programmable devices. J. Polish Safety and Reliability Association\u00a04 (submitted for publication, 2013)"},{"key":"39_CR10","unstructured":"Xilinx, Inc., Spartan-3 Family Data Sheet. DS099.PDF (2009), \n                    http:\/\/www.xilinx.com\n                   (accessed April 2013)"},{"key":"39_CR11","unstructured":"Xilinx, Inc., Spartan-6 Family Overview. DS160.PDF (2011), \n                    http:\/\/www.xilinx.com\n                   (accessed April 2013)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Yan, J., Heys, H.M.: Hardware implementation of the Salsa20 and Phelix stream ciphers. In: Proc. Canadian Conf. Electrical and Computer Engineering, CCECE 2007, pp. 1125\u20131128. IEEE (2007)","DOI":"10.1109\/CCECE.2007.286"}],"container-title":["Advances in Intelligent Systems and Computing","New Results in Dependability and Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00945-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T14:37:39Z","timestamp":1676817459000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00945-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009445","9783319009452"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00945-2_39","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}