{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:36Z","timestamp":1725566136663},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229896"},{"type":"electronic","value":"9783540301172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30117-2_114","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T05:01:02Z","timestamp":1284786062000},"page":"996-1000","source":"Crossref","is-referenced-by-count":2,"title":["High Throughput Serpent Encryption Implementation"],"prefix":"10.1007","author":[{"given":"Jes\u00fas","family":"L\u00e1zaro","sequence":"first","affiliation":[]},{"given":"Armando","family":"Astarloa","sequence":"additional","affiliation":[]},{"given":"Jagoba","family":"Arias","sequence":"additional","affiliation":[]},{"given":"Unai","family":"Bidarte","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cuadrado","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"114_CR1","unstructured":"US NIST: (Advanced Encryption Standard), http:\/\/csrc.nist.gov\/encryption\/aes"},{"key":"114_CR2","unstructured":"IST-1999-12324: (New European Schemes for Signatures, Integrity, and Encryption), http:\/\/www.cryptonessie.org\/"},{"key":"114_CR3","doi-asserted-by":"crossref","unstructured":"Matsui, M.: New Block Encryption Algorithm MISTY. LNCS, pp. 54\u201368 (1997)","DOI":"10.1007\/BFb0052334"},{"key":"114_CR4","doi-asserted-by":"crossref","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. In: Selected Areas in Cryptography, pp. 39\u201356 (2000)","DOI":"10.1007\/3-540-44983-3_4"},{"key":"114_CR5","unstructured":"Handschuh, H., Naccache, D.: SHACAL. 1st NESSIE Workshop (2000), https:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/workshop\/"},{"key":"114_CR6","unstructured":"(Burwick, C., Coppersmith, D., D\u2019Avignon, E., Gennaro, R., Halevi, S., Jutla, C., Jr., S.M.M., O\u2019Connor, L., Peyravian, M., Safford, D., Zunicof, N.)"},{"key":"114_CR7","unstructured":"Rivest, R., Robshaw, M., Sidney, R., Yin, Y.L.: The RC6TM Block Cipher (1998), http:\/\/www.rsasecurity.com\/rsalabs\/rc6\/"},{"key":"114_CR8","unstructured":"Daemen, J., Rijmen, V.: (Aes proposal: Rijndael), http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/"},{"key":"114_CR9","unstructured":"Anderson, R., Biham, E., Knudsen, L.: (Serpent: A Proposal for the Advanced Encryption Standard), http:\/\/www.ftp.cl.cam.ac.uk\/ftp\/users\/rja14\/serpent.pdf"},{"key":"114_CR10","unstructured":"Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: (Twofish: A 128-Bit Block Cipher), http:\/\/www.schneier.com\/paper-twofish-paper.pdf"},{"key":"114_CR11","unstructured":"George, M.: The Virtex-II DCM Digital Clock Manager. Xcell Journal Online 7\/1\/01 (2001), http:\/\/www.xilinx.com\/publications\/products\/v2\/v2dcm.htm"},{"key":"114_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-45234-8_12","volume-title":"Field Programmable Logic and Application","author":"M. McLoone","year":"2003","unstructured":"McLoone, M., McCanny, J.: Very High Speed 17 Gbps SHACAL Encryption Architecture. In: Y. K. Cheung, P., Constantinides, G.A. (eds.) FPL 2003. LNCS, vol.\u00a02778, pp. 111\u2013120. Springer, Heidelberg (2003)"},{"key":"114_CR13","doi-asserted-by":"crossref","unstructured":"Leong, M., Cheung, O., Tsoi, K., Leong, P.: A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA. In: IEEE Symposium on FCCMs (2000)","DOI":"10.1109\/FPGA.2000.903399"},{"key":"114_CR14","unstructured":"Standaert, F., Rouvroy, G.: Efficient FPGA Implementation of Block Ciphers Khazad and MISTY1. In: 3rd NESSIE Workshop (2002), http:\/\/www.di.ens.fr\/~wwwgrecc\/NESSIE3\/"},{"key":"114_CR15","unstructured":"Ichikawa, T., Sorimachi, T., Kasuya, T., Matsui, M.: On the criteria of hardware evaluation of block ciphers(1). Technical report, IEICE, ISEC2001-53 (2001)"},{"key":"114_CR16","unstructured":"Beuchat, J.: High Throughput Implementations of the RC6 Block Cipher Using Virtex-E and Virtex-II Devices. Technical report, INRIA Research Report (2002), http:\/\/www.ens-lyon.fr\/~jlbeucha\/publications.html"},{"key":"114_CR17","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/TC.2003.1190588","volume":"52","author":"G. Rouvroy","year":"2003","unstructured":"Rouvroy, G., Standaert, F.X., Quisquater, J.J., Legat, J.D.: Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. IEEE Transactions on Computers\u00a052, 473\u2013482 (2003)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Field Programmable Logic and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30117-2_114.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:41:07Z","timestamp":1605742867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30117-2_114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229896","9783540301172"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30117-2_114","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}