{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:05:01Z","timestamp":1725858301280},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319396385"},{"type":"electronic","value":"9783319396392"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39639-2_40","type":"book-chapter","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T03:25:00Z","timestamp":1466133900000},"page":"457-467","source":"Crossref","is-referenced-by-count":4,"title":["Implementation Efficiency of BLAKE and Other Contemporary Hash Algorithms in Popular FPGA Devices"],"prefix":"10.1007","author":[{"given":"Jaros\u0142aw","family":"Sugier","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,18]]},"reference":[{"key":"40_CR1","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Phan, R.C.W.: Sha-3 proposal BLAKE, version 1.3. https:\/\/www.131002.net\/blake\/blake.pdf . Accessed March 2016"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: New Stream Cipher Designs. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"40_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family. http:\/\/keccak.noekeon.org . Accessed March 2016"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Gaj, K., Kaps J.P., Amirineni, V., Rogawski, M., Homsirikamol, E., Brewster, B.Y.: ATHENa\u2014Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs. In: 20th International Conference on Field Programmable Logic and Applications, Milano, Italy, (2010)","DOI":"10.1109\/FPL.2010.86"},{"key":"40_CR5","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The Third SHA-3 Candidate Conference. IACR Cryptology ePrint Archive, 2012, 368 (2012)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Junkg, B., Apfelbeck, J.: Area-efficient FPGA implementations of the SHA-3 finalists. In: 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 235\u2013241. IEEE (2011)","DOI":"10.1109\/ReConFig.2011.16"},{"issue":"1","key":"40_CR7","first-page":"121","volume":"4","author":"J Sugier","year":"2013","unstructured":"Sugier, J.: Low-cost hardware implementations of Salsa20 stream cipher in programmable devices. J. Polish Safety Reliab. Assoc. 4(1), 121\u2013128 (2013)","journal-title":"J. Polish Safety Reliab. Assoc."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Sugier, J.: Low cost FPGA devices in high speed implementations of\u00a0Keccak-f hash algorithm. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the 9th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. AISC, vol. 286, pp. 433\u2013441. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-319-07013-1_42"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Sugier, J.: Popular FPGA device families in implementation of cryptographic algorithms. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Theory and Engineering of Complex Systems and Dependability. Proceedings of the 11th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. AISC, vol. 365, pp. 485\u2013495. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-319-19216-1_46"},{"key":"40_CR10","unstructured":"Sugier, J.: Implementing SHA-3 candidate BLAKE algorithm in Field Programmable Gate Arrays. J. Polish Safety Reliab. Assoc. 7 (2016)"},{"key":"40_CR11","unstructured":"Xilinx, Inc.: Spartan-3 Family Data Sheet. DS099.PDF. www.xilinx.com . Accessed March 2016"},{"key":"40_CR12","unstructured":"Xilinx, Inc.: Spartan-6 Family Overview. DS160.PDF. www.xilinx.com . Accessed March 2016"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Yan, J., Heys, H.M.: Hardware implementation of the Salsa20 and Phelix stream ciphers. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering CCECE 2007, pp. 1125\u20131128. IEEE (2007)","DOI":"10.1109\/CCECE.2007.286"}],"container-title":["Advances in Intelligent Systems and Computing","Dependability Engineering and Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39639-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T17:38:36Z","timestamp":1568050716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39639-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319396385","9783319396392"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39639-2_40","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}