{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:38:11Z","timestamp":1725849491063},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319285597"},{"type":"electronic","value":"9783319285610"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-28561-0_15","type":"book-chapter","created":{"date-parts":[[2016,2,23]],"date-time":"2016-02-23T10:15:04Z","timestamp":1456222504000},"page":"189-200","source":"Crossref","is-referenced-by-count":1,"title":["Hardware Implementation of Rainbow Tables Generation for Hash Function Cryptanalysis"],"prefix":"10.1007","author":[{"given":"J\u0119drzej","family":"Bieniasz","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Skowron","sequence":"additional","affiliation":[]},{"given":"Mateusz","family":"Trzepi\u0144ski","sequence":"additional","affiliation":[]},{"given":"Mariusz","family":"Rawski","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Sapiecha","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"Tomaszewicz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Ko\u00e7, \u00c7.K. (ed.): Cryptographic Engineering. Springer, Berlin (2008)","DOI":"10.1007\/978-0-387-71817-0"},{"key":"15_CR2","unstructured":"Rodr\u00edguez-Henr\u00edquez, F., Saqib, N.A., D\u00edaz-P\u00e9rez, A., Ko\u00e7, \u00c7.K.: Cryptographic Algorithms on Reconfigurable Hardware. Springer, Berlin (2007)"},{"key":"15_CR3","unstructured":"Hulton, D., Pellerin, D.: Accelerating cryptography with FPGA clusters. \n                    http:\/\/mil-embedded.com\/articles\/accelerating-cryptography-fpga-clusters\/"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Shi, Z., Ma, C., Cote, J., Wang, B.: Hardware implementation of hash functions. In: Tehranipoor, M., Wang, C. (eds.) Introduction to Hardware Security and Trust. Springer, Berlin (2012)","DOI":"10.1007\/978-1-4419-8080-9_2"},{"key":"15_CR5","volume-title":"Attacks on Hash Functions and Applications","author":"M Stevens","year":"2012","unstructured":"Stevens, M.: Attacks on Hash Functions and Applications. CWI, Amsterdam (2012)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Mentens, N., Batina, L., Preneel, B., Verbauwhede, I.: \u201cTime-memory trade-off Attack on FPGA\u201d, platforms: UNIX password cracking. In: Bertels, K., Cardoso, J.M.P., Vassiliadis, S. (eds.) ARC 2006, LNCS 3985, pp. 323\u2013334. Springer, Berlin (2006)","DOI":"10.1007\/11802839_41"},{"key":"15_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07324-7","volume-title":"Fundamentals of Computer Security","author":"Josef Pieprzyk","year":"2003","unstructured":"Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)"},{"key":"15_CR8","unstructured":"Oliveira, S., Soares, F., Flach, G., Johann, M., Reis, R.: Building a bitcoin miner on an FPGA. In: XXVII SIM\u2014South Symposium on Microelectronics (2012)"},{"issue":"4","key":"15_CR9","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TIT.1980.1056220","volume":"26","author":"M. Hellman","year":"1980","unstructured":"Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Trans. Inf. Theor. 26(4) (1980)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR10","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Philippe Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Advance in Cryptology\u2014CRYPTO 2003, LNCS 2729, p. 617 (2003)"},{"key":"15_CR11","unstructured":"Terasic: DE5-Net FPGA Development Kit. \n                    http:\/\/www.terasic.com.tw\/cgi-bin\/page\/archive.pl?Language=English&CategoryNo=158&No=526"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Pieprzyk, J., Sadeghiyan, B.: Design of Hashing Algorithms. Springer, Berlin (1993)","DOI":"10.1007\/3-540-57500-6"},{"key":"15_CR13","unstructured":"FIPS 180-4: Secure Hash Standard (SHS). \n                    http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2015 \u2013 Part II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28561-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:37:02Z","timestamp":1559389022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28561-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319285597","9783319285610"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28561-0_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}