{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:34:39Z","timestamp":1725888879898},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594149"},{"type":"electronic","value":"9783319594156"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_38","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:42:30Z","timestamp":1496133750000},"page":"394-406","source":"Crossref","is-referenced-by-count":1,"title":["Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory Resources"],"prefix":"10.1007","author":[{"given":"Jaros\u0142aw","family":"Sugier","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"38_CR1","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Phan, R.C.W.: SHA-3 proposal BLAKE, version 1.3. https:\/\/www.131002.net\/blake\/blake.pdf . Accessed Mar 2017"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Aumasson, J.P., Neves, S., Wilcox-O\u2019Hearn, Z., Winnerlein, C.: BLAKE2: simpler, smaller, fast as MD5. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) Applied Cryptography and Network Security, ACNS 2013. LNCS, vol. 7954, pp. 119\u2013135. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"38_CR3","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20, 20 January 2008. http:\/\/cr.yp.to\/chacha\/chacha-20080128.pdf"},{"key":"38_CR4","unstructured":"Dunkelman, O., Biham, E.: A framework for iterative hash functions: Haifa. In: 2nd NIST Cryptographich Hash Workshop, vol. 22 (2006)"},{"key":"38_CR5","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The Third SHA-3 Candidate Conference, Available: IACR Cryptology ePrint Archive 2012, vol. 368 (2012)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Gaj, K., Kaps J.P., Amirineni, V., Rogawski, M., Homsirikamol, E., Brewster, B.Y.: ATHENa \u2013 automated tool for hardware evaluation: toward fair and comprehensive benchmarking of cryptographic hardware using FPGAs. In: 20th International Conference on Field Programmable Logic and Applications, Milano, Italy (2010)","DOI":"10.1109\/FPL.2010.86"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Junkg, B., Apfelbeck, J.: Area-efficient FPGA implementations of the SHA-3 finalists. In: 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 235\u2013241. IEEE (2011)","DOI":"10.1109\/ReConFig.2011.16"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Sugier, J.: Implementation efficiency of BLAKE and other contemporary hash algorithms in popular FPGA devices. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Proceedings of the 11th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. AISC, vol. 470, pp. 457\u2013467. Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-39639-2_40"},{"issue":"1","key":"38_CR9","first-page":"193","volume":"7","author":"J Sugier","year":"2016","unstructured":"Sugier, J.: Implementing SHA-3 candidate BLAKE algorithm in field programmable gate arrays. J. Pol. Saf. Reliab. Assoc. 7(1), 193\u2013200 (2016)","journal-title":"J. Pol. Saf. Reliab. Assoc."},{"key":"38_CR10","unstructured":"Sugier, J.: Memory resources in hardware implementations of BLAKE and BLAKE2 hash algorithms. J. Pol. Saf. Reliab. Assoc. (submitted for publication)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Sugier, J.: Popular FPGA device families in implementation of cryptographic algorithms. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Theory and Engineering of Complex Systems and Dependability, Proceedings of the 11th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. AISC, vol. 365, pp. 485\u2013495. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-319-19216-1_46"},{"key":"38_CR12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.proeng.2017.01.057","volume":"178","author":"J Sugier","year":"2017","unstructured":"Sugier, J.: Simplifying FPGA implementations of BLAKE hash algorithm with block memory resources. Procedia Eng. 178, 33\u201341 (2017)","journal-title":"Procedia Eng."},{"key":"38_CR13","unstructured":"Xilinx, Inc.: Spartan-3 Family Data Sheet. DS099.PDF. www.xilinx.com . Accessed Mar 2017"},{"key":"38_CR14","unstructured":"Xilinx, Inc.: Spartan-6 Family Overview. DS160.PDF. www.xilinx.com . Accessed Mar 2017"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T07:11:19Z","timestamp":1569395479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}