{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:10:30Z","timestamp":1743095430950,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649489"},{"type":"electronic","value":"9783540680666"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055249","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T08:11:44Z","timestamp":1153987904000},"page":"218-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of the XC6200-series architecture for cryptographic applications"],"prefix":"10.1007","author":[{"given":"Stephen","family":"Charlwood","sequence":"first","affiliation":[]},{"given":"Philip","family":"James-Roxby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,27]]},"reference":[{"key":"23_CR1","unstructured":"M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, \u201cMinimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security\u201d, available on the Internet from http:\/\/www.counterpane.com\/"},{"key":"23_CR2","unstructured":"B. Schneier, \u201cApplied Cryptography\u201d, John Wiley & Sons (1994) ISBN 0-471-11709-9"},{"key":"23_CR3","unstructured":"Xilinx, Inc: \u201cXC6200 FPGA product description\u201d, 1997"},{"key":"23_CR4","unstructured":"C. Adams, \u201cConstructing Symmetric Ciphers Using the CAST Design Procedure\u201d, available on the Internet from http:\/\/www.entrust.com\/"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"B. Schneier, \u201cDescription of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)\u201d, Proc. of the Cambridge Security Workshop on Fast Software Encryption pp191\u2013204, Springer-Verlag (1994)","DOI":"10.1007\/3-540-58108-1_24"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"E. Biham, L. Knudsen, R. Anderson, \u201cSerpent: A New Block Cipher Proposal\u201d, Proc. of the 5th International Workshop on Fast Software Encryption, Springer-Verlag (1998)","DOI":"10.1007\/3-540-69710-1_15"},{"key":"23_CR7","unstructured":"L. Knudsen, \u201cDEAL \u2014 A 128-bit Block Cipher\u201d, available on the Internet at http:\/\/www.ii.uib.no\/~larsr\/papers\/deal2.ps.gz"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"M. Kwan, \u201cThe Design of the ICE Encryption Algorithm\u201d, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)","DOI":"10.1007\/BFb0052335"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"D. Wheeler, R. Needham, \u201cTEA, a Tiny Encryption Algorithm\u201d, available on the Internet at http:\/\/www.cl.cam.ac.uk\/ftp\/papers\/djw-rmn\/djw-rmn-tea.html (1994)","DOI":"10.1007\/3-540-60590-8_29"},{"key":"23_CR10","unstructured":"R. Rivest, \u201cThe RC5 Encryption Algorithm\u201d, available on the Internet at http:\/\/theory.lcs.mit.edu\/~rivest\/rc5rev.ps (1997)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"M. Matsui, \u201cNew Block Encryption Algorithm MISTY\u201d, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)","DOI":"10.1007\/BFb0052334"},{"key":"23_CR12","unstructured":"R. Rivest, M. Robshaw, R. Sidney, Y. Yin, \u201cThe RC6 Block Cipher\u201d, available on the Internet at http:\/\/theory.lcs.mit.edu\/~rivest\/rc6.ps (1998)"},{"key":"23_CR13","unstructured":"L. Brown, J. Pieprzyk, \u201cIntroducing the new LOKI97 Block Cipher\u201d, available on the Internet at http:\/\/www.adfa.oz.au\/~lpb\/research\/loki97\/loki97spec.ps (1998)"},{"key":"23_CR14","unstructured":"B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, \u201cTwofish: A 128-Bit Block Cipher\u201d, available on the Internet from http:\/\/www.counterpane.com\/ (1998)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"J. Massey, \u201cSAFER K-64: A Byte-Oriented Block-Ciphering Algorithm\u201d, Proc. of the Cambridge Security Workshop on Fast Software Encryption, Springer-Verlag (1994)","DOI":"10.1007\/3-540-58108-1_1"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"B. Schneier, D. Whiting, \u201cFast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor\u201d, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)","DOI":"10.1007\/BFb0052351"},{"key":"23_CR17","unstructured":"Xilinx, Inc. \u201cA Fast Constant-Coefficient Multiplier for the XC6200\u201d, Xilinx Application Note (1997)"},{"key":"23_CR18","unstructured":"A. Omondi, \u201cComputer Arithmetic Systems\u201d, Prentice-Hall (1994) ISBN 0-13-334301-4"},{"key":"23_CR19","unstructured":"R. Anderson, \u201cA5 \u2014 The GSM Encryption Algorithm\u201d, available on the Internet at http:\/\/chem.leeds.ac.uk\/ICAMS\/people\/jon\/a5.html (1994)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"C. Ding, V. Niemi, A. Renvall, A. Salomaa, \u201cTWOPRIME: A Fast Stream Ciphering Algorithm\u201d, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)","DOI":"10.1007\/BFb0052337"},{"key":"23_CR21","unstructured":"I. Goldberg, D. Wagner, \u201cArchitectural Considerations for Cryptanalytic Hardware\u201d, available on the Internet at http:\/\/www.cs.berkley.edu\/~iang\/isaac\/hardware\/ (1996)"}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications From FPGAs to Computing Paradigm"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T12:33:26Z","timestamp":1657197206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BFb0055249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649489","9783540680666"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0055249","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"27 May 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}