{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:01:58Z","timestamp":1742994118737,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319192154"},{"type":"electronic","value":"9783319192161"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19216-1_46","type":"book-chapter","created":{"date-parts":[[2015,5,26]],"date-time":"2015-05-26T04:55:51Z","timestamp":1432616151000},"page":"485-494","source":"Crossref","is-referenced-by-count":3,"title":["Popular FPGA Device Families in Implementation of Cryptographic Algorithms"],"prefix":"10.1007","author":[{"given":"Jaros\u0142aw","family":"Sugier","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"46_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family, \n                    http:\/\/keccak.noekeon.org\n                   (access date: March 2015)"},{"key":"46_CR3","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The Third SHA-3 Candidate Conference. Available: IACR Cryptology ePrint Archive, 2012, 368 (2012)"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Gaj, K., Kaps, J.P., Amirineni, V., Rogawski, M., Homsirikamol, E., Brewster, B.Y.: ATHENa \u2013 Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs. In: 20th International Conference on Field Programmable Logic and Applications, Milano, Italy (2010)","DOI":"10.1109\/FPL.2010.86"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Junkg, B., Apfelbeck, J.: Area-efficient FPGA implementations of the SHA-3 finalists. In: 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 235\u2013241. IEEE (2011)","DOI":"10.1109\/ReConFig.2011.16"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Liberatori, M., Otero, F., Bonadero, J.C., Castineira, J.: AES-128 Cipher. High Speed, Low Cost FPGA Implementation. In: Proc. Third Southern Conference on Programmable Logic, Mar del Plata, Argentina. IEEE Comp. Soc. Press (2007)","DOI":"10.1109\/SPL.2007.371748"},{"key":"46_CR7","unstructured":"National Institute of Standards and Technology: Specification for the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197, \n                    http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html\n                   (2001; access date: March 2015)"},{"issue":"2","key":"46_CR8","first-page":"179","volume":"3","author":"J. Sugier","year":"2012","unstructured":"Sugier, J.: Implementation of symmetric block ciphers in popular-grade FPGA devices. J. Polish Safety and Reliability Association\u00a03(2), 179\u2013187 (2012)","journal-title":"J. Polish Safety and Reliability Association"},{"key":"46_CR9","series-title":"AISC","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-00945-2_39","volume-title":"New Results in Dependability and Computer Systems","author":"J. Sugier","year":"2013","unstructured":"Sugier, J.: Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol.\u00a0224, pp. 431\u2013438. Springer, Heidelberg (2013)"},{"issue":"1","key":"46_CR10","first-page":"121","volume":"4","author":"J. Sugier","year":"2013","unstructured":"Sugier, J.: Low-cost hardware implementations of Salsa20 stream cipher in programmable devices. J. Polish Safety and Reliability Association\u00a04(1), 121\u2013128 (2013)","journal-title":"J. Polish Safety and Reliability Association"},{"key":"46_CR11","unstructured":"Xilinx, Inc.: Spartan-3 Family Data Sheet. DS099.PDF, \n                    http:\/\/www.xilinx.com\n                   (access date: March 2015)"},{"key":"46_CR12","unstructured":"Xilinx, Inc.: Spartan-6 Family Overview. DS160.PDF, \n                    http:\/\/www.xilinx.com\n                   (access date: March 2015)"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Yan, J., Heys, H.M.: Hardware implementation of the Salsa20 and Phelix stream ciphers. In: Proc. Canadian Conf. Electrical and Computer Engineering, CCECE 2007, pp. 1125\u20131128. IEEE (2007)","DOI":"10.1109\/CCECE.2007.286"}],"container-title":["Advances in Intelligent Systems and Computing","Theory and Engineering of Complex Systems and Dependability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19216-1_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T12:44:24Z","timestamp":1674564264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19216-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319192154","9783319192161"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19216-1_46","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}