{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:00:07Z","timestamp":1761580807382},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642150302"},{"type":"electronic","value":"9783642150319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_17","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"248-263","source":"Crossref","is-referenced-by-count":13,"title":["Developing a Hardware Evaluation Method for SHA-3 Candidates"],"prefix":"10.1007","author":[{"given":"Luca","family":"Henzen","sequence":"first","affiliation":[]},{"given":"Pietro","family":"Gendotti","sequence":"additional","affiliation":[]},{"given":"Patrice","family":"Guillet","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Pargaetzi","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Zoller","sequence":"additional","affiliation":[]},{"given":"Frank K.","family":"G\u00fcrkaynak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11935230_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"C. Canni\u00e8re De","year":"2006","unstructured":"De Canni\u00e8re, C., Rechberger, C.: Finding SHA-1 characteristics: General results and applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 1\u201320. Springer, Heidelberg (2006)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-540-85174-5_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"C. Canni\u00e8re De","year":"2008","unstructured":"De Canni\u00e8re, C., Rechberger, C.: Preimages for reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 179\u2013202. Springer, Heidelberg (2008)"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"El-Hadedy, M., Gligoroski, D., Knapskog, S.J., Aas, E.J.: Low area FPGA and ASIC implementations of the hash function \u201cBlue Midnight Wish-256\u201d. In: International Conference on Computer Engineering & Systems, ICCES 2009, Cairo, pp. 10\u201314 (2009)","DOI":"10.1109\/ICCES.2009.5383318"},{"key":"17_CR4","unstructured":"G\u00fcrkaynak, F.K., Henzen, L., Gendotti, P., Guillet, P., Pargaetzi, E., Zoller, M.: Hardware evaluation of the second-round SHA-3 candidate algorithms (2010), http:\/\/www.iis.ee.ethz.ch\/~sha3\/"},{"key":"17_CR5","unstructured":"G\u00fcrkaynak, F.K., Luethi, P., Bernold, N., Blattmann, R., Goode, V., Marghitola, M., Kaeslin, H., Felber, N., Fichtner, W.: Hardware evaluation of eSTREAM candidates: Achterbahn, grain, mickey, mosquito, sfinks, trivium, vest, zk-crypt. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/015 (2006), http:\/\/www.ecrypt.eu.org\/stream"},{"key":"17_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511805172","volume-title":"Digital Integrated Circuit Design, from VLSI Architectures to CMOS Fabrication","author":"H. Kaeslin","year":"2008","unstructured":"Kaeslin, H.: Digital Integrated Circuit Design, from VLSI Architectures to CMOS Fabrication. Cambridge University Press, Cambridge (2008)"},{"key":"17_CR7","unstructured":"Kobayashi, K., Ikegami, J., Matsuo, S., Sakiyama, K., Ohta, K.: Evaluation of hardware performance for the SHA-3 candidates using SASEBO-GII. Cryptology ePrint Archive, Report 2010\/010 (2010), http:\/\/eprint.iacr.org\/"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Namin, A.H., Hasan, M.A.: Hardware implementation of the compression function for selected SHA-3 candidates. CACR 2009-28 (2009), http:\/\/www.vlsi.uwaterloo.ca\/~ahasan\/hasan_report.html","DOI":"10.1109\/IPDPSW.2010.5470742"},{"key":"17_CR9","unstructured":"NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register\u00a072(212) (2007), http:\/\/www.nist.gov\/hash-competition"},{"key":"17_CR10","unstructured":"Tillich, S., Feldhofer, M., Issovits, W., Kern, T., Kureck, H., M\u00fchlberghuber, M., Neubauer, G., Reiter, A., K\u00f6fler, A., Mayrhofer, M.: Compact hardware implementations of the SHA-3 candidates ARIRANG, BLAKE, Gr\u00f8stl, and Skein. Cryptology ePrint Archive: Report 2009\/349 (2009)"},{"key":"17_CR11","unstructured":"Tillich, S., Feldhofer, M., Kirschbaum, M., Plos, T., Schmidt, J.-M., Szekely, A.: High-speed hardware implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr\u00f8stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein. Cryptology ePrint Archive, Report 2009\/510 (2009)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 19\u201335. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:44Z","timestamp":1606186844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}