{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T15:57:48Z","timestamp":1761580668878},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642006401"},{"type":"electronic","value":"9783642006418"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00641-8_19","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T08:41:46Z","timestamp":1236328906000},"page":"181-192","source":"Crossref","is-referenced-by-count":4,"title":["Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm"],"prefix":"10.1007","author":[{"given":"Jaeyoung","family":"Yi","sequence":"first","affiliation":[]},{"given":"Karam","family":"Park","sequence":"additional","affiliation":[]},{"given":"Joonseok","family":"Park","sequence":"additional","affiliation":[]},{"given":"Won W.","family":"Ro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Federal Information Processing Standards Publication 46-3: Data Encryption Standard (1999)","key":"19_CR1"},{"unstructured":"Federal Information Processing Standards Publication 197: Advanced Encryption Standard (2001)","key":"19_CR2"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","first-page":"627","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"S. Miyaguchi","year":"1991","unstructured":"Miyaguchi, S.: The FEAL Cipher Family. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 627\u2013637. Springer, Heidelberg (1991)"},{"unstructured":"Korea Information Security Agency: A Design and Analysis of 128-bit Symmetric Block Cipher (SEED) (1999)","key":"19_CR4"},{"doi-asserted-by":"crossref","unstructured":"Beuchat, J.L.: FPGA Implementations of the RC6 Block Cipher. In: Proc. of the 13th Int\u2019l Conference on Field-Programmable Logic and its Applications, Portugal (2003)","key":"19_CR5","DOI":"10.1007\/978-3-540-45234-8_11"},{"unstructured":"NESSIE: NESSIE Project Announces Final Selection of Crypto Algorithms, IST-199-12324 (2003)","key":"19_CR6"},{"unstructured":"Information-Technology Promotion Agency, Japan, CRYPTREC Report (2002)","key":"19_CR7"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-540-30117-2_56","volume-title":"Field Programmable Logic and Application","author":"D. Denning","year":"2004","unstructured":"Denning, D., Irvine, J., Delvin, M.: A KeyAgile 4Gbit\/sec Camellia Implementation. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 546\u2013554. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Zambreno, J., Nguyen, D., Choudhary, A.: Exploring Area\/Delay Tradeoffs in an AES FPGA Implementation. In: Proc of Int\u2019l Conference on Field-Programmable Logic and its Applications, Belguim (2004)","key":"19_CR9","DOI":"10.1007\/978-3-540-30117-2_59"},{"doi-asserted-by":"crossref","unstructured":"Rouvroy, G., Standaert, F.X.: Efficient FPGA Implementation of Block Cipher MISTY1. In: Proc of IEEE International Parallel & Distributed Processing Symposium, France (2003)","key":"19_CR10","DOI":"10.1109\/IPDPS.2003.1213343"},{"key":"19_CR11","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)"},{"doi-asserted-by":"crossref","unstructured":"Seo, Y.H., Kim, I.H., Kim, D.W.: Hardware Implementation of 128-bit Symmetric Cipher SEED. In: Proc. of the Second IEEE Asia Pacific Conference on AP-SIC 2000, pp. 183\u2013186 (2000)","key":"19_CR12","DOI":"10.1109\/APASIC.2000.896939"}],"container-title":["Lecture Notes in Computer Science","Reconfigurable Computing: Architectures, Tools and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00641-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T04:35:22Z","timestamp":1551846922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00641-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642006401","9783642006418"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00641-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}