{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341487,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_46","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"520-529","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments"],"prefix":"10.1007","author":[{"given":"P.","family":"Jilna","sequence":"first","affiliation":[]},{"given":"P. P.","family":"Deepthi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"46_CR2","unstructured":"National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standards Publication HMAC (2001)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Deepakumara, J., Heys, H.M., Venkatesan, R.: Fpga implementation of md5 hash algorithm. In: Canadian Conference on Electrical and Computer Engineering, vol.\u00a02, pp. 919\u2013924. IEEE (2001)","DOI":"10.1109\/CCECE.2001.933564"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Docherty, J., Koelmans, A.: A flexible hardware implementation of sha-1 and sha-2 hash functions. In: International Symposium on Circuits and Systems (ISCAS), pp. 1932\u20131935. IEEE (2011)","DOI":"10.1109\/ISCAS.2011.5937967"},{"key":"46_CR5","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer"},{"key":"46_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/978-3-642-01001-9_33","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"C. Chevalier","year":"2009","unstructured":"Chevalier, C., Fouque, P.-A., Pointcheval, D., Zimmer, S.: Optimal randomness extraction from a diffie-hellman element. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 572\u2013589. Springer, Heidelberg (2009)"},{"issue":"1-3","key":"46_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10623-008-9187-5","volume":"49","author":"R.R. Farashahi","year":"2008","unstructured":"Farashahi, R.R., Pellikaan, R., Sidorenko, A.: Extractors for binary elliptic curves. Designs, Codes and Cryptography\u00a049(1-3), 171\u2013186 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-642-21969-6_18","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"A.A. Ciss","year":"2011","unstructured":"Ciss, A.A., Sow, D.: On randomness extraction in elliptic curves. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 290\u2013297. Springer, Heidelberg (2011)"},{"key":"46_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: Lfsr-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"issue":"1","key":"46_CR10","first-page":"23","volume":"7","author":"K.J. Dhanaraj","year":"2007","unstructured":"Dhanaraj, K.J., Deepthi, P.P., Sathidevi, P.S.: FPGA Implementation of a Pseudo Random Bit Sequence Generator Based on Elliptic Curves. ICGST-Programmable Devices, Circuits and Systems Journal\u00a07(1), 23\u201331 (2007)","journal-title":"ICGST-Programmable Devices, Circuits and Systems Journal"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:49Z","timestamp":1746130669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}