{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:34:28Z","timestamp":1725521668146},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540896401"},{"type":"electronic","value":"9783540896418"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89641-8_24","type":"book-chapter","created":{"date-parts":[[2008,11,26]],"date-time":"2008-11-26T13:02:53Z","timestamp":1227704573000},"page":"332-348","source":"Crossref","is-referenced-by-count":2,"title":["High-Speed Search System for PGP Passphrases"],"prefix":"10.1007","author":[{"given":"Koichi","family":"Shimizu","sequence":"first","affiliation":[]},{"given":"Daisuke","family":"Suzuki","sequence":"additional","affiliation":[]},{"given":"Toyohiro","family":"Tsurumaru","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"The Electric Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design. O\u2019Reilly & Associates, Inc., Sebastopol (1998)"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-45146-4_1","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"A. Shamir","year":"2003","unstructured":"Shamir, A., Tromer, E.: Factoring Large Numbers with the TWIRL Devices. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 1\u201326. Springer, Heidelberg (2003)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-74735-2_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"T. Izu","year":"2007","unstructured":"Izu, T., Kogure, J., Shimoyama, S.: CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 364\u2013377. Springer, Heidelberg (2007)"},{"key":"24_CR4","unstructured":"Izu, T., Kogure, J., Shimoyama, S.: CAIRN 3: An FPGA Implementation of the Sieving Step with the Lattice Sieving. In: Proc. of the 2007 Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2007), pp. 33\u201339 (2007)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/978-3-540-76843-2_30","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"Y. Liu","year":"2007","unstructured":"Liu, Y., Kasper, T., Lemke-Rust, K., Paar, C.: E-Passport: Cracking Basic Access Control Keys. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1531\u20131547. Springer, Heidelberg (2007)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11894063_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Kumar","year":"2006","unstructured":"Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 101\u2013118. Springer, Heidelberg (2006)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-540-74735-2_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"D. Suzuki","year":"2007","unstructured":"Suzuki, D.: How to Maximize the Potential of FPGA Resources for Modular Exponentiation. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 272\u2013288. Springer, Heidelberg (2007)"},{"key":"24_CR8","unstructured":"Network Working Group, OpenPGP Message Format, RFC 4880 (2007), \n                    \n                      http:\/\/tools.ietf.org\/pdf\/rfc4880.pdf"},{"key":"24_CR9","unstructured":"PGP Corporation Home Page, \n                    \n                      http:\/\/www.pgp.com\/"},{"key":"24_CR10","unstructured":"The GNU Privacy Guard, \n                    \n                      http:\/\/www.gnupg.org\/"},{"key":"24_CR11","unstructured":"NIST, Secure Hash Standard (SHS), FIPS-PUB 180-2 (2002), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf"},{"key":"24_CR12","unstructured":"NIST, Advanced Encryption Standard (AES), FIPS-PUB 197 (2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips197.pdf"},{"key":"24_CR13","unstructured":"NIST, Digital Signature Standard (DSS), FIPS-PUB 186-2 (2000), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips186-2\/fips186-2-change1.pdf"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11894063_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"R. Chaves","year":"2006","unstructured":"Chaves, R., Kuzmanov, G., Sousa, L., Vassiliadis, S.: Improving SHA-2 Hardware Implementations. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 298\u2013310. Springer, Heidelberg (2006)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"McEvoy, R.P., Crowe, F.M., Murphy, C.C., Marnane, W.P.: Optimisation of the SHA-2 family of hash functions on FPGAs. In: Proc. of the 2006 IEEE Computer Society Annual Symposium on Emerging VLSI Technologies and. Architectures (ISVLSI 2006), pp. 317\u2013322 (2006)","DOI":"10.1109\/ISVLSI.2006.70"},{"key":"24_CR16","unstructured":"Helion Technology, \n                    \n                      http:\/\/www.heliontech.com\/"},{"key":"24_CR17","unstructured":"Xilinx, Inc., Virtex-4 User Guide (2007), \n                    \n                      http:\/\/www.xilinx.com\/support\/documentation\/user_guides\/ug070.pdf"},{"key":"24_CR18","unstructured":"Xilinx, Inc., Virtex-4 Family Overview (2007), \n                    \n                      http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds112.pdf"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11799313_22","volume-title":"Fast Software Encryption","author":"M. Matsui","year":"2006","unstructured":"Matsui, M.: How Far Can We Go on the x64 Processors? In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 341\u2013358. Springer, Heidelberg (2006)"},{"issue":"4","key":"24_CR20","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1093\/applin\/11.4.341","volume":"11","author":"R. Goulden","year":"1990","unstructured":"Goulden, R., Nation, P., Read, J.: How large can a receptive vocabulary be? Applied Linguistics\u00a011(4), 341\u2013363 (1990)","journal-title":"Applied Linguistics"},{"key":"24_CR21","unstructured":"Reinhold, A.G.: The Diceware Passphrase Home Page (2003), \n                    \n                      http:\/\/world.std.com\/~reinhold\/diceware.html"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89641-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T23:50:29Z","timestamp":1551657029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89641-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540896401","9783540896418"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89641-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}