{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:06:01Z","timestamp":1773795961090,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642239502","type":"print"},{"value":"9783642239519","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23951-9_32","type":"book-chapter","created":{"date-parts":[[2011,9,26]],"date-time":"2011-09-26T05:17:11Z","timestamp":1317014231000},"page":"491-506","source":"Crossref","is-referenced-by-count":16,"title":["Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 SHA-3 Candidates Implemented Using Xilinx and Altera FPGAs"],"prefix":"10.1007","author":[{"given":"Ekawat","family":"Homsirikamol","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Rogawski","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Gaj","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Cryptographic Hash Algorithm Competition, http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3"},{"key":"32_CR2","unstructured":"SHA-3 Hardware Implementations, http:\/\/ehash.iaik.tugraz.at\/wiki\/SHA-3_Hardware_Implementations"},{"key":"32_CR3","unstructured":"ATHENa Project Website, http:\/\/cryptography.gmu.edu\/athena"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Akin, A., Aysu, A., Ulusel, O.C., Savas, E.: Efficient Hardware Implementation of High Throughput SHA-3 Candidates Keccak, Luffa and Blue Midnight Wish for Single- and Multi-Message Hashing. In: 2nd SHA-3 Candidate Conf. (2010)","DOI":"10.1145\/1854099.1854135"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Baldwin, B., et al.: FPGA Implementations of the Round Two SHA-3 Candidates. In: 2nd SHA-3 Candidate Conf. (2010)","DOI":"10.1109\/FPL.2010.84"},{"key":"32_CR6","unstructured":"Beuchat, J.-L., Okamoto, E., Yamazaki, T.: A Compact FPGA Implementation of the SHA-3 Candidate ECHO. Cryptology ePrint Archive, Report 2010\/364 (2010)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-642-19574-7_7","volume-title":"Selected Areas in Cryptography","author":"J. Detrey","year":"2011","unstructured":"Detrey, J., Gaudry, P., Khalfallah, K.: A Low-Area Yet Performant FPGA Implementation of Shabal. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 99\u2013113. Springer, Heidelberg (2011)"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-15031-9_18","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"K. Gaj","year":"2010","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M.: Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 264\u2013278. Springer, Heidelberg (2010)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Gaj, K., Kaps, et al.: ATHENa \u2013 Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs. In: Proc. FPL 2010 (2010)","DOI":"10.1109\/FPL.2010.86"},{"key":"32_CR10","unstructured":"Guo, X., Huang, S., Nazhandali, L., Schaumont, P.: Fair and Comprehensive Performance Evaluation of 14 Second Round SHA-3 ASIC Implementations. In: 2nd SHA-3 Candidate Conf. (2010)"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-15031-9_17","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L. Henzen","year":"2010","unstructured":"Henzen, L., Gendotti, P., Guillet, P., Pargaetzi, E., Zoller, M., G\u00fcrkaynak, F.K.: Developing a Hardware Evaluation Method for SHA-3 Candidates. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 248\u2013263. Springer, Heidelberg (2010)"},{"key":"32_CR12","unstructured":"Homsirikamol, E., Rogawski, M., Gaj, K.: Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs. Cryptology ePrint Archive, Report 2010\/445 (2010)"},{"key":"32_CR13","unstructured":"Matsuo, S., et al.: How Can We Conduct \u201cFair and Consistent\u201d Hardware Evaluation for SHA-3 Candidate? In: 2nd SHA-3 Candidate Conf. (2010)"},{"key":"32_CR14","unstructured":"Nechvatal, J., et al.: Report on the Development of the Advanced Encryption Standard (AES), http:\/\/csrc.nist.gov\/archive\/aes\/round2\/r2report.pdf"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Sklavos, N., Kitsos, P.: BLAKE HASH Function Family on FPGA: From the Fastest to the Smallest. In: Proc. ISVLSI 2010 (2010)","DOI":"10.1109\/ISVLSI.2010.115"},{"key":"32_CR16","unstructured":"Tilich, S., et al.: High-speed Hardware Implementations of Blake, Blue Midnight Wish, Cubehash, ECHO, Fugue, Groestl, Hamsi, JH, Keccak, Luffa, Shabal, Shavite-3, SIMD, and Skein, Cryptology ePrint Archive, Report 2009\/510 (2009)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23951-9_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:15:04Z","timestamp":1606187704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23951-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239502","9783642239519"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23951-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}