{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:09:45Z","timestamp":1725793785348},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319070124"},{"type":"electronic","value":"9783319070131"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07013-1_42","type":"book-chapter","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T06:59:59Z","timestamp":1400223599000},"page":"433-441","source":"Crossref","is-referenced-by-count":6,"title":["Low Cost FPGA Devices in High Speed Implementations of Keccak-f Hash Algorithm"],"prefix":"10.1007","author":[{"given":"Jaros\u0142aw","family":"Sugier","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"ATHENa Database of FPGA Results, http:\/\/cryptography.gmu.edu\/athenadb\/fpga_hash"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G., Van Keer, R.: Keccak implementation overview, http:\/\/keccak.noekeon.org (retrieved March 2014)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponge functions. PDF file, http:\/\/keccak.noekeon.org (retrieved March 2014)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Hardware implementation of Keccak in VHDL. KeccakVHDL-3.1.zip, http:\/\/keccak.noekeon.org (retrieved March 2014)","DOI":"10.1080\/01611194.2013.856818"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak reference. PDF file, http:\/\/keccak.noekeon.org (retrieved March 2014)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family, http:\/\/keccak.noekeon.org (accessed March 2014)","DOI":"10.1007\/978-3-642-38348-9_19"},{"key":"42_CR7","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The Third SHA-3 Candidate Conference. Available: IACR Cryptology ePrint Archive, 2012, 368 (2012)"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Gaj, K., Kaps, J.P., Amirineni, V., Rogawski, M., Homsirikamol, E., Brewster, B.Y.: ATHENa \u2013 Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs. In: 20th International Conference on Field Programmable Logic and Applications, Milano, Italy (2010)","DOI":"10.1109\/FPL.2010.86"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Junkg, B., Apfelbeck, J.: Area-efficient FPGA implementations of the SHA-3 finalists. In: 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 235\u2013241. IEEE (2011)","DOI":"10.1109\/ReConFig.2011.16"},{"key":"42_CR10","unstructured":"National Institute of Standards and Technology: Announcing Request for Candidate Algorithm Nominations for a New Cryptographic Hash Algorithm (SHA\u20133) Family. U.S. Federal Register\u00a0vol. 72(212), pp. 62212\u201362220 (2007)"},{"key":"42_CR11","unstructured":"Str\u00f6mbergson, J.: Implementation of the Keccak hash function in FPGA devices, http:\/\/www.strombergson.com\/files\/Keccak_in_FPGAs.pdf (retrieved March 2014)"},{"key":"42_CR12","series-title":"AISC","first-page":"273","volume-title":"Complex Systems and Dependability","author":"J. Sugier","year":"2012","unstructured":"Sugier, J.: Implementing AES and Serpent ciphers in new generation of low-cost FPGA devices. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Complex Systems and Dependability. AISC, vol.\u00a0170, pp. 273\u2013287. Springer, Heidelberg (2012)"},{"key":"42_CR13","series-title":"AISC","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/978-3-319-00945-2_39","volume-title":"New Results in Dependability and Computer Systems","author":"J. Sugier","year":"2013","unstructured":"Sugier, J.: Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol.\u00a0224, pp. 431\u2013438. Springer, Heidelberg (2013)"},{"key":"42_CR14","first-page":"159","volume-title":"Monographs of System Dependability: Technical Approach to Dependability","author":"J. Sugier","year":"2010","unstructured":"Sugier, J.: Low-cost hardware implementation of Serpent cipher in programmable devices. In: Monographs of System Dependability: Technical Approach to Dependability, vol.\u00a03, pp. 159\u2013172. Publishing House of Wroc\u0142aw University of Technology, Wroc\u0142aw (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 \u2013 July 4, 2014, Brun\u00f3w, Poland"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07013-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T01:25:32Z","timestamp":1689211532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07013-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070124","9783319070131"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07013-1_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}