{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:23:02Z","timestamp":1768706582227,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642150302","type":"print"},{"value":"9783642150319","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_19","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"279-293","source":"Crossref","is-referenced-by-count":14,"title":["Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures"],"prefix":"10.1007","author":[{"given":"Joppe W.","family":"Bos","sequence":"first","affiliation":[]},{"given":"Deian","family":"Stefan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"American National Standards Institute. ANSI X9.44-2007: Key Establishment Using Integer Factorization Cryptography (2007)"},{"key":"19_CR2","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE (2008)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/BFb0053428","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 92\u2013111. Springer, Heidelberg (1995)"},{"key":"19_CR4","unstructured":"Benadjila, R., Billet, O., Gilbert, H., Macario-Rat, G., Peyrin, T., Robshaw, M., Seurin, Y.: SHA-3 Proposal: ECHO (2009)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-10366-7_10","volume-title":"Asiacrypt 2009","author":"R. Benadjila","year":"2009","unstructured":"Benadjila, R., Billet, O., Gueron, S., Robshaw, M.J.B.: The Intel AES instructions set and the SHA-3 candidates. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol.\u00a05912, pp. 162\u2013178. Springer, Heidelberg (2009)"},{"key":"19_CR6","unstructured":"Bernstein, D.J.: CubeHash specification (2.B.1) (2009)"},{"key":"19_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Assche, G.V.: Keccak specifications (2009)"},{"key":"19_CR8","unstructured":"Bevand, M.: MD5 Chosen-Prefix Collisions on GPUs. Black Hat, Whitepaper (2009)"},{"key":"19_CR9","unstructured":"Biham, E., Dunkelman, O.: The SHAvite-3 Hash Function (2009)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"PARA","author":"J.W. Bos","year":"2008","unstructured":"Bos, J.W., Casati, N., Osvik, D.A.: Multi-Stream Hashing on the PlayStation\u00a03. In: PARA 2008. LNCS. Springer, Heidelberg (to appear 2008), http:\/\/documents.epfl.ch\/users\/b\/bo\/bos\/public\/PARA2008.pdf"},{"key":"19_CR11","unstructured":"Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.-F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.-R., Thuillet, C., Videau, M.: The Hash Function Shabal (2008)"},{"key":"19_CR12","unstructured":"Canniere, C.D., Sato, H., Watanabe, D.: Hash Function Luffa (2009)"},{"key":"19_CR13","unstructured":"Chen, T., Raghavan, R., Dale, J., Iwata, E.: Cell broadband engine architecture and its first implementation: A performance view (November 2005), http:\/\/www.ibm.com\/developerworks\/power\/library\/pa-cellperf\/"},{"key":"19_CR14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael. Springer, New York (2002)"},{"key":"19_CR15","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family (2009)"},{"key":"19_CR16","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl \u2013 a SHA-3 candidate (2008)"},{"key":"19_CR17","unstructured":"Gligoroski, D., Klima, V., Knapskog, S.J., El-Hadedy, M., Amundsen, J., Mjo lsnes, S.F.: Cryptographic Hash Function BLUE MIDNIGHT WISH (2009)"},{"key":"19_CR18","unstructured":"Halevi, S., Hall, W.E., Jutla, C.S.: The Hash Function Fugue (2009)"},{"key":"19_CR19","unstructured":"Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195\u2013210 (2008)"},{"key":"19_CR20","first-page":"258","volume-title":"HPCA 2005","author":"H.P. Hofstee","year":"2005","unstructured":"Hofstee, H.P.: Power Efficient Processor Architecture and The Cell Processor. In: HPCA 2005, pp. 258\u2013262. IEEE Computer Society, Los Alamitos (2005)"},{"key":"19_CR21","unstructured":"IEEE Std 1363-2000. IEEE Standard Specifications for Public-Key Cryptography. IEEE, New York (2000)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104, IETF (1997)","DOI":"10.17487\/rfc2104"},{"key":"19_CR23","unstructured":"K\u00fc\u00e7\u00fck, O.: The Hash Function Hamsi (2009)"},{"key":"19_CR24","unstructured":"Leurent, G., Bouillaguet, C., Fouque, P.-A.: SIMD Is a Message Digest (2009)"},{"key":"19_CR25","first-page":"65","volume-title":"ICSPC 2007","author":"S.A. Manavski","year":"2007","unstructured":"Manavski, S.A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: ICSPC 2007, November 2007, pp. 65\u201368. IEEE, Los Alamitos (2007)"},{"issue":"1","key":"19_CR26","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11416-007-0064-y","volume":"4","author":"S. Marechal","year":"2008","unstructured":"Marechal, S.: Advances in password cracking. Journal in Computer Virology\u00a04(1), 73\u201381 (2008)","journal-title":"Journal in Computer Virology"},{"key":"19_CR27","unstructured":"NIST. FIPS-197: Advanced Encryption Standard (AES) (2001), http:\/\/www.csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"19_CR28","unstructured":"NIST. Secure hash standard. FIPS 180-2 (August 2002), http:\/\/www.itl.nist.gov\/fipspubs\/fip180-2.htm"},{"key":"19_CR29","unstructured":"NIST. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Technical report, Department of Commerce (November 2007), http:\/\/csrc.nist.gov\/groups\/ST\/hash\/documents\/FR_Notice_Nov07.pdf"},{"key":"19_CR30","unstructured":"NVIDIA. NVIDIA Compute. PTX: Parallel Thread Execution (March 2008)"},{"key":"19_CR31","unstructured":"NVIDIA. NVIDIA CUDA Programming Guide 2.3 (2009)"},{"key":"19_CR32","unstructured":"NVIDIA. NVIDIA\u2019s Next Generation CUDA Compute Architecture: Fermi. Whitepaper (September 2009)"},{"key":"19_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-13858-4_5","volume-title":"FSE 2010","author":"D.A. Osvik","year":"2010","unstructured":"Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: beyer, i. (ed.) FSE 2010. LNCS, vol.\u00a06147, pp. 75\u201393. Springer, Heidelberg (2010)"},{"key":"19_CR34","volume-title":"Computer organization and design: the hardware\/software interface","author":"D. Patterson","year":"2008","unstructured":"Patterson, D., Hennessy, J.: Computer organization and design: the hardware\/software interface. Morgan Kaufmann, San Francisco (2008)"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Regenscheid, A., Perlner, R., jen Chang, S., Kelsey, J., Nandi, M., Paul., S.: Status report on the first round of the SHA-3 cryptographic hash algorithm competition. Technical Report 7620, NIST (September 2009), http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round1\/documents\/sha3_NISTIR7620.pdf","DOI":"10.6028\/NIST.IR.7620"},{"key":"19_CR36","unstructured":"RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard (2002)"},{"key":"19_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-03356-8_4","volume-title":"CRYPTO 2009","author":"M. Stevens","year":"2009","unstructured":"Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 55\u201369. Springer, Heidelberg (2009)"},{"key":"19_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"R. Szerwinski","year":"2008","unstructured":"Szerwinski, R., G\u00fcneysu, T.: Exploiting the power of GPUs for asymmetric cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 79\u201399. Springer, Heidelberg (2008)"},{"key":"19_CR39","first-page":"111","volume-title":"ICCAD 2005","author":"O. Takahashi","year":"2005","unstructured":"Takahashi, O., Cook, R., Cottier, S., Dhong, S.H., Flachs, B., Hirairi, K., Kawasumi, A., Murakami, H., Noro, H., Oh, H., Onish, S., Pille, J., Silberman, J.: The circuit design of the synergistic processor element of a Cell processor. In: ICCAD 2005, pp. 111\u2013117. IEEE Computer Society, Los Alamitos (2005)"},{"key":"19_CR40","unstructured":"Wu, H.: The Hash Function JH (2009)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:44Z","timestamp":1606186844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}