{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:33:07Z","timestamp":1725600787239},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642231407"},{"type":"electronic","value":"9783642231414"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23141-4_4","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:36:48Z","timestamp":1313584608000},"page":"33-42","source":"Crossref","is-referenced-by-count":12,"title":["GPU Implementation of the Keccak Hash Function Family"],"prefix":"10.1007","author":[{"given":"Pierre-Louis","family":"Cayrel","sequence":"first","affiliation":[]},{"given":"Gerhard","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"AMD: AMD fusion family of APUs (2010), \n                  \n                    http:\/\/sites.amd.com\/us\/Documents\/48423B_fusion_whitepaper_WEB.pdf"},{"key":"4_CR2","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Note on keccak parameters and usage, \n                  \n                    http:\/\/keccak.noekeon.org\/NoteOnKeccakParametersAndUsage.pdf"},{"key":"4_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Tune keccak to your requirements, \n                  \n                    http:\/\/keccak.noekeon.org\/tune.html"},{"key":"4_CR4","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: ECRYPT hash workshop (2007)"},{"key":"4_CR5","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak sponge function family - main document. In submission to NIST, Round 2 (2009), \n                  \n                    http:\/\/keccak.noekeon.org\/Keccak-main-2.1.pdf"},{"key":"4_CR6","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Cryptographic sponges (2011), \n                  \n                    http:\/\/sponge.noekeon.org\/"},{"key":"4_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The keccak sponge function family (2011), \n                  \n                    http:\/\/keccak.noekeon.org\/"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-15031-9_19","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"J.W. Bos","year":"2010","unstructured":"Bos, J.W., Stefan, D.: Performance analysis of the SHA-3 candidates on exotic multi-core architectures. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 279\u2013293. Springer, Heidelberg (2010)"},{"key":"4_CR9","unstructured":"Dally, B.: The future of GPU computing (2009), \n                  \n                    http:\/\/www.nvidia.com\/content\/GTC\/documents\/SC09_Dally.pdf"},{"key":"4_CR10","unstructured":"ECRYPT. SHA-3 hardware implementations (2011), \n                  \n                    http:\/\/ehash.iaik.tugraz.at\/wiki\/SHA-3_Hardware_Implementations"},{"key":"4_CR11","unstructured":"Fleischmann, E., Forler, C., Gorski, M.: Classification of the SHA-3 candidates (2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/511"},{"key":"4_CR12","unstructured":"Intel. Sandy bridge (2011), \n                  \n                    http:\/\/software.intel.com\/en-us\/articles\/sandy-bridge\/"},{"key":"4_CR13","unstructured":"Merkle, R.C.: Secrecy, authentication, and public key systems. PhD thesis, Stanford University (1979)"},{"key":"4_CR14","unstructured":"NVIDIA. NVIDIA CUDA programming guide 3.2 (2010), \n                  \n                    http:\/\/developer.download.nvidia.com\/compute\/cuda\/3_2\/toolkit\/docs\/CUDA_C_Programming_Guide.pdf"},{"key":"4_CR15","volume-title":"Computer Organization And Design","author":"D.A. Patterson","year":"2009","unstructured":"Patterson, D.A., Hennessey, J.L.: Computer Organization And Design. Morgan Kaufmann, Burlington (2009)"},{"key":"4_CR16","unstructured":"Sarkar, P., Schellenberg, P.J.: A parallelizable design principle for cryptographic hash functions. Cryptology ePrint Archive, Report 2002\/031 (2002), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"4_CR17","unstructured":"Sevestre, G.: Keccak tree hashing on GPU, using NVIDIA CUDA API (2010), \n                  \n                    http:\/\/sites.google.com\/site\/keccaktreegpu\/"}],"container-title":["Communications in Computer and Information Science","Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23141-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T15:10:42Z","timestamp":1554045042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23141-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642231407","9783642231414"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23141-4_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}