{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T05:28:53Z","timestamp":1738992533555,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642003059"},{"type":"electronic","value":"9783642003066"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00306-6_3","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T11:15:44Z","timestamp":1234869344000},"page":"28-40","source":"Crossref","is-referenced-by-count":0,"title":["Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool"],"prefix":"10.1007","author":[{"given":"Takeshi","family":"Sugawara","sequence":"first","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]},{"given":"Akashi","family":"Satoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"The Whirlpool Hash Function, http:\/\/paginas.terra.com.br\/informatica\/paulobarreto\/WhirlpoolPage.html"},{"key":"3_CR2","unstructured":"Barreto, P., Rijmen, V.: The Whirlpool Hash Function, http:\/\/planeta.terra.om.br\/informatica\/paulobarreto\/whirlpool.zip"},{"key":"3_CR3","unstructured":"ISO\/IEC 10118-3:2004, \"Information technology \u2013 Security techniques \u2013 Hash-functions \u2013 Part 3: Dedicated hash-functions, http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=39876"},{"key":"3_CR4","unstructured":"NIST, Advanced Encryption Standard (AES) FIPS Publication 197, (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Satoh, A.: ASIC Hardware Implementations for 512-Bit Hash Function Whirlpool. In: Proceedings ISCAS 2008, pp. 2917\u20132920 (May 2008)","DOI":"10.1109\/ISCAS.2008.4542068"},{"key":"3_CR6","unstructured":"NIST, Secure Hash Standard (SHS), FIPS PUB 180-2 (August 2002), http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2withchangenotice.pdf"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Pramstaller, N., Rechberger, C., Rijmen, V.: A Compact FPGA Implementation of the Hash Function Whirlpool. In: Proceedings of the 2006 ACM\/SIGDA, pp. 159\u2013166 (2006)","DOI":"10.1145\/1117201.1117225"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11265-006-0013-x","volume":"47","author":"M. McLoone","year":"2007","unstructured":"McLoone, M., McIvor, C.: High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. J. VLSI Signal Processing\u00a047(1), 47\u201357 (2007)","journal-title":"J. VLSI Signal Processing"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Alho, T., H\u00e4m\u00e4l\u00e4inen, P., H\u00e4nnik\u00e4inen, M., H\u00e4m\u00e4l\u00e4inen, T.: Compact Hardware Design of Whirlpool Hashing Core. In: Proceedings of the DATE 2007, pp. 1247\u20131252 (April 2007)","DOI":"10.1109\/DATE.2007.364468"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.vlsi.2005.12.006","volume":"40","author":"A. Satoh","year":"2007","unstructured":"Satoh, A., Inoue, T.: ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS. Integration, the VLSI Journal\u00a040(1), 3\u201310 (2007)","journal-title":"Integration, the VLSI Journal"},{"key":"3_CR11","unstructured":"Circuits Multi-Projets (CMP), CMOS 90 nm (CMOS090) from STMicroelectronics, http:\/\/cmp.imag.fr\/products\/ic\/?p=STCMOS090"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00306-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T19:24:27Z","timestamp":1738956267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00306-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642003059","9783642003066"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00306-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}