{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:47Z","timestamp":1725496367569},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_57","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T12:19:26Z","timestamp":1196079566000},"page":"617-626","source":"Crossref","is-referenced-by-count":1,"title":["The Secure DAES Design for Embedded System Application"],"prefix":"10.1007","author":[{"given":"Ming-Haw","family":"Jing","sequence":"first","affiliation":[]},{"given":"Jian-Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zih-Heng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yaotsu","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-36178-2_10","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Barkan","year":"2002","unstructured":"Barkan, E., Biham, E.: In How Many Ways Can You Write Rijndael? In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"key":"57_CR2","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.micpro.2006.02.018","volume":"31","author":"M.H. Jing","year":"2007","unstructured":"Jing, M.H., Chen, Z.H., Chen, J.H., Chen, Y.H.: Reconfigurable System for High-Speed and Diversified AES using FPGA. Microprocessors & Microsystems\u00a031, 94\u2013102 (2007)","journal-title":"Microprocessors & Microsystems"},{"key":"57_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-39887-5_17","volume-title":"Fast Software Encryption","author":"B. Song","year":"2003","unstructured":"Song, B., Seberry, J.: Further Observations on the Structure of the AES Algorithm. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 223\u2013234. Springer, Heidelberg (2003)"},{"key":"57_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/b137765","volume-title":"Advanced Encryption Standard \u2013 AES","author":"H. Dobbertin","year":"2005","unstructured":"Dobbertin, H., Knudsen, L., Robshaw, M.: The Cryptanalysis of the AES - a Brief Survey. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) Advanced Encryption Standard \u2013 AES. LNCS, vol.\u00a03373, pp. 1\u201310. Springer, Heidelberg (2005)"},{"key":"57_CR5","volume-title":"Introduction to Finite Fields and Their Applications","author":"R. Lidl","year":"1986","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Rijndael Block Cipher (1999)","DOI":"10.1007\/10721064_22"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:50Z","timestamp":1619506730000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_57","relation":{},"subject":[]}}