{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:30:52Z","timestamp":1725489052769},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_42","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"410-419","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing"],"prefix":"10.1007","author":[{"given":"Mooseop","family":"Kim","sequence":"first","affiliation":[]},{"given":"Youngse","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jaecheol","family":"Ryou","sequence":"additional","affiliation":[]},{"given":"Sungik","family":"Jun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","unstructured":"NIST: Secure Hash Standard FIPS-Pub 180-1. National Institute of Standard and Technology (1995)"},{"key":"42_CR2","unstructured":"NIST: The Keyed-Hash Message Authentication Code FIPS-Pub 198. National Institute of Standard and Technology (2002)"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Ming-yan, Y., Tong, Z., Jin-xiang, W., Yi-zheng, Y.: An Efficient ASIC Implementation of SHA-1 Engine for TPM. In: IEEE Asian-Pacific Conference on Circuits and Systems, pp. 873\u2013876 (2004)","DOI":"10.1109\/APCCAS.2004.1413018"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Dominikus, S.: A Hardware Implementation of MD4-Family Hash Algorithms. In: IEEE international Conference on Electronic Circuits and Systems. vol. 3, pp. 1143\u20131146 (2002)","DOI":"10.1109\/ICECS.2002.1046454"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Kang, Y.-K., et al.: An Efficient Implementation of Hash Function processor for IPSec. In: IEEE Asia-Pacific Conference on ASIC, pp. 93\u201396 (2002)","DOI":"10.1109\/APASIC.2002.1031540"},{"key":"42_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/11556930_60","volume-title":"Integrated Circuit and System Design","author":"H.E. Michail","year":"2005","unstructured":"Michail, H.E., Kakarountas, A.P., Selimis, G.N., Goutis, C.E.: Optimiizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. In: Paliouras, V., Vounckx, J., Verkest, D. (eds.) PATMOS 2005. LNCS, vol.\u00a03728, pp. 591\u2013600. Springer, Heidelberg (2005)"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Sklavos, N., Dimitroulakos, G., Koufopavlou, O.: An Ultra High Speed Architecture for VLSI Implementation of Hash Functions. In: 10th IEEE International Conference on Electronics, Circuits and Systems, pp. 990\u2013993 (2003)","DOI":"10.1109\/ICECS.2003.1301675"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Huang, A.L., Penzhorn, W.T.: Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware. In: IEEE ISIE 2005, pp. 1789\u20131794 (2005)","DOI":"10.1109\/ISIE.2005.1529204"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Selimis, G., Sklavos, N., Koufopavlou, O.: VLSI: Implementation of the Keyed-HASH Message Authentication Code for the Wireless Application Protocol. In: 10th IEEE International Conference on Electronics, Circuits and Systems, pp. 24\u201327 (2003)","DOI":"10.1109\/ICECS.2003.1301967"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Michail, M.K., Kakarountas, A.P., Milidonis, A., Goutis, C.E.: Efficient Implementation of the Keyed-Hash Message Authentication Code (HMAC) using the SHA-1 Hash Function. In: 11th IEEE International Conference on Electronics, Circuits and Systems, pp. 567\u2013570 (2004)","DOI":"10.1109\/ICECS.2004.1399744"},{"key":"42_CR11","unstructured":"AT97SC3203: Atmel corp. (2005), available at \n                    \n                      http:\/\/www.atmel.com\/"},{"key":"42_CR12","unstructured":"SLB 9635 TT1.2: Infineon (2005), available at: \n                    \n                      http:\/\/www.infineon.com\/"},{"key":"42_CR13","unstructured":"SSX35A: Sinosun (2005), available at \n                    \n                      http:\/\/www.trustedcomputinggroup.org\/"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:16:01Z","timestamp":1605762961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}