{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T19:43:41Z","timestamp":1743795821136,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714309"},{"type":"electronic","value":"9783540714316"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71431-6_7","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:06:50Z","timestamp":1180904810000},"page":"73-84","source":"Crossref","is-referenced-by-count":24,"title":["Authentication of FPGA Bitstreams: Why and How"],"prefix":"10.1007","author":[{"given":"Saar","family":"Drimer","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"NIST, U.S. Dept. of Commerce: FIPS 197: Advanced encryption standard (2001)"},{"key":"7_CR2","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley & Sons, New York (2003)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Special Publication 800-38A: Recommendation for block cipher modes of operation. NIST, U.S. Dept. of Commerce (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/978-3-540-48302-1_30","volume-title":"Field Programmable Logic and Applications","author":"I. Had\u017ei\u0107","year":"1999","unstructured":"Had\u017ei\u0107, I., Udani, S., Smith, J.M.: FPGA viruses. In: Lysaght, P., Irvine, J., Hartenstein, R.W. (eds.) FPL 1999. LNCS, vol.\u00a01673, pp. 291\u2013300. Springer, Heidelberg (1999)"},{"key":"7_CR5","unstructured":"Stigge, M., et al.: Reversing CRC \u2013 theory and practice. Technical Report SAR-PR-2006-05, Humboldt University Berlin (2006)"},{"key":"7_CR6","unstructured":"Baetoniu, C., Sheth, S.: XAPP780: FPGA IFF copy protection using Dallas Semiconductor\/Maxim DS2432 Secure EEPROM. Xilinx Inc. (2005)"},{"key":"7_CR7","unstructured":"Altera Corp.: FPGA design security solution using MAX II devices (2004)"},{"key":"7_CR8","unstructured":"Xilinx Inc.: UG332: Spartan-3 generation configuration user guide (2006)"},{"key":"7_CR9","unstructured":"Xilinx Inc.: DS202: Virtex-5 data sheet: DC and switching characteristics (2006)"},{"key":"7_CR10","unstructured":"Altera Corp.: Stratix III design handbook (2006)"},{"key":"7_CR11","unstructured":"Xilinx Inc.: DS099: Spartan-3 FPGA family: Complete data sheet (2006)"},{"key":"7_CR12","unstructured":"Parelkar, M.M.: Authenticated encryption in hardware. Master\u2019s thesis, George Mason University, Fairfax, VA, USA (2005)"},{"issue":"1-2","key":"7_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0167-9260(02)00053-6","volume":"34","author":"L. Batina","year":"2003","unstructured":"Batina, L., et al.: Hardware architectures for public key cryptography. VLSI Journal, Integration\u00a034(1-2), 1\u201364 (2003), http:\/\/www.cosic.esat.kuleuven.be\/publications\/article-31.pdf","journal-title":"VLSI Journal, Integration"},{"key":"7_CR14","unstructured":"NIST, U.S. Dept. of Commerce: FIPS 198: The keyed-hash message authentication code (HMAC) (2002)"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"7_CR16","unstructured":"NIST, U.S. Department of Commerce: FIPS 180-2: Secure hash standard (2002)"},{"key":"7_CR17","first-page":"10","volume-title":"Encyclopedia of Cryptography and Security","author":"J. Black","year":"2005","unstructured":"Black, J.: A. Authenticated encryption. In: Encyclopedia of Cryptography and Security, pp. 10\u201321. Springer, Heidelberg (2005)"},{"key":"7_CR18","unstructured":"Parelkar, M.M.: FPGA security \u2013 bitstream authentication. Technical report, George Mason University (2004), http:\/\/mason.gmu.edu\/~mparelka\/reports\/bitstream_auth.pdf"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Special Publication 800-38C: Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality. NIST, U.S. Dept. of Commerce (2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Parelkar, M.M., Gaj, K.: Implementation of EAX mode of operation for FPGA bitstream encryption and authentication. In: Field Programmable Technology, December 2005, pp. 335\u2013336 (2005), http:\/\/mason.gmu.edu\/~mparelka\/pdfs\/fpt05.pdf","DOI":"10.1109\/FPT.2005.1568588"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Special Publication 800-38B: Recommendation for block cipher modes of operation: The CMAC mode for authentication. NIST, U.S. Dept. of Commerce (2005)","DOI":"10.6028\/NIST.SP.800-38b-2005"}],"container-title":["Lecture Notes in Computer Science","Reconfigurable Computing: Architectures, Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71431-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T22:05:28Z","timestamp":1737065128000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71431-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714309","9783540714316"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71431-6_7","relation":{},"subject":[]}}