{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:03:22Z","timestamp":1751094202127,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_8","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T15:23:47Z","timestamp":1199805827000},"page":"102-114","source":"Crossref","is-referenced-by-count":19,"title":["Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Implementations"],"prefix":"10.1007","author":[{"given":"Yong Ki","family":"Lee","sequence":"first","affiliation":[]},{"given":"Herwin","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Digital Signature Standard. National Institute of Standards and Technology. Federal Information Processing Standards Publication 186-2, http:\/\/csrc.nist.gov\/publications\/fips\/fips186-2\/fips186-2-change1.pdf"},{"key":"8_CR2","unstructured":"Secure Hash Standard. National Institute of Standards and Technology. Federal Information Processing Standards Publication 180-2, http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"},{"key":"8_CR3","first-page":"119","volume-title":"VLSI Digital Signal Processing Systems: Design and Implementation","author":"K.K. Parhi","year":"1999","unstructured":"Parhi, K.K.: VLSI Digital Signal Processing Systems: Design and Implementation, pp. 43\u201361, 119\u2013140. Wiley, Chichester (1999)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Dadda, L., Macchetti, M., Owen, J.: An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). In: ACM Great Lakes Symposium on VLSI, pp. 421\u2013425 (2004)","DOI":"10.1145\/988952.989053"},{"key":"8_CR5","first-page":"70","volume-title":"DATE 2004. Proceedings of the conference on Design, Automation and Test in Europe","author":"L. Dadda","year":"2004","unstructured":"Dadda, L., Macchetti, M., Owen, J.: The design of a high speed ASIC unit for the hash function SHA-256 (384, 512). In: DATE 2004. Proceedings of the conference on Design, Automation and Test in Europe, pp. 70\u201375. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Macchetti, M., Dadda, L.: Quasi-pipelined hash circuits. In: ARITH 2005. Proceedings of the 17th IEEE Symposium on Computer Arithmetic, pp. 222\u2013229 (2005)","DOI":"10.1109\/ARITH.2005.36"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"McEvoy, R.P., Crowe, F.M., Murphy, C.C., Marnane, W.P.: Optimisation of the SHA-2 Family of Hah Functions on FPGAs. In: ISVLSI 2006. Proceedings of the 2006 Emerging VLAI Technologies and Architectures, pp. 317\u2013322 (2006)","DOI":"10.1109\/ISVLSI.2006.70"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Michail, H., Kakarountas, A.P., Koufopavlou, O., Goutis, C.E.: A Low-Power and High-Throughput Implementation of the SHA-1 Hash Function. In: ISCAS 2005. IEEE International Symposium on Circuits and Systems, pp. 4086\u20134089 (2005)","DOI":"10.1109\/ISCAS.2005.1465529"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Crowe, F., Daly, A., Marnane, W.: Single-chip FPGA implementation of a cryptographic co-processor. In: FPT 2004. Proceedings of the International Conference on Field Programmable Technology, pp. 279\u2013285 (2004)","DOI":"10.1109\/FPT.2004.1393279"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-540-24660-2_25","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"R. Lien","year":"2004","unstructured":"Lien, R., Grembowski, T., Gaj, K.: A 1 Gbit\/s partially unrolled architecture of hash functions SHA-1 and SHA-512. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 324\u2013338. Springer, Heidelberg (2004)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Ming-yan, Y., Tong, Z., Jin-xiang, W., Yi-zheng, Y.: An Efficient ASIC Implementation of SHA-1 Engine for TPM. In: The 2004 IEEE Asia-Pacific Conference on Circuits and Systems, pp. 873\u2013876 (2004)","DOI":"10.1109\/APCCAS.2004.1413018"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Ganesh, T.S., Sudarshan, T.S.B.: ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. In: ITCC 2005. Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 580\u2013585 (2005)","DOI":"10.1109\/ITCC.2005.91"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Satoh, A., Inoue, T.: ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. In: ITCC 2005. Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 532\u2013537 (2005)","DOI":"10.1109\/ITCC.2005.92"},{"key":"8_CR14","unstructured":"Helion IP Core Products. Helion Technology http:\/\/heliontech.com\/core.htm"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T12:24:22Z","timestamp":1737807862000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}