{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T17:27:48Z","timestamp":1750094868255},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2008,5,31]],"date-time":"2008-05-31T00:00:00Z","timestamp":1212192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst Sign Image Video Technol"],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1007\/s11265-008-0168-8","type":"journal-article","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T09:37:14Z","timestamp":1212140234000},"page":"89-102","source":"Crossref","is-referenced-by-count":8,"title":["Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class"],"prefix":"10.1007","volume":"53","author":[{"given":"Yong Ki","family":"Lee","sequence":"first","affiliation":[]},{"given":"Herwin","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,31]]},"reference":[{"key":"168_CR1","unstructured":"Digital Signature Standard (2000). National Institute of Standards and Technology. Federal Information Processing Standards Publication 186-2. http:\/\/csrc.nist.gov\/publications\/fips\/fips186-2\/fips186-2-change1.pdf ."},{"key":"168_CR2","first-page":"43","volume-title":"VLSI digital signal processing systems: design and implementation","author":"K. K. Parhi","year":"1999","unstructured":"Parhi, K. K. (1999). VLSI digital signal processing systems: design and implementation (pp.\u00a043\u201361 and 119\u2013140). New York: Wiley."},{"key":"168_CR3","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Handbook of applied cryptography (Section 9.4.2. p.\u00a0343). Boca Raton: CRC Press."},{"key":"168_CR4","doi-asserted-by":"crossref","unstructured":"Dadda, L., Macchetti, M., & Owen, J. (2004). An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). In ACM Great Lakes symposium on VLSI (pp. 421\u2013425). Boston, MA, 26\u201328 April 2004.","DOI":"10.1145\/988952.989053"},{"key":"168_CR5","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/DATE.2004.1269207","volume-title":"Proc. of the conference on design, automation and test in Europe (DATE\u201904)","author":"L. Dadda","year":"2004","unstructured":"Dadda, L., Macchetti, M., Owen, J. (2004). The design of a high speed ASIC unit for the hash function SHA-256 (384, 512). In Proc. of the conference on design, automation and test in Europe (DATE\u201904) (pp.\u00a070\u201375). Los Alamitos: IEEE Computer Society."},{"key":"168_CR6","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/ARITH.2005.36","volume-title":"Proc. of the 17th IEEE symposium on computer arithmetic (ARITH\u201905)","author":"M. Macchetti","year":"2005","unstructured":"Macchetti, M., & Dadda, L. (2005). Quasi-pipelined hash circuits. In Proc. of the 17th IEEE symposium on computer arithmetic (ARITH\u201905) (pp.\u00a0222\u2013229). Piscataway: IEEE."},{"key":"168_CR7","doi-asserted-by":"crossref","first-page":"4086","DOI":"10.1109\/ISCAS.2005.1465529","volume-title":"IEEE International symposium on circuits and systems (ISCAS\u201905)","author":"H. Michail","year":"2005","unstructured":"Michail, H., Kakarountas, A. P., Koufopavlou, O., Goutis, C. E. (2005). A low-power and high-throughput implementation of the SHA-1 hash function. In IEEE International symposium on circuits and systems (ISCAS\u201905) (pp.\u00a04086\u20134089). Piscataway: IEEE."},{"key":"168_CR8","unstructured":"McEvoy, R. P., Crowe, F. M., Murphy, C. C., & Marnane, W. P. (2006). Optimisation of the SHA-2 family of Hah functions on FPGAs. In Proc. of the 2006 emerging VLAI technologies and architectures (ISVLSI\u201906) (pp.\u00a0317\u2013322)."},{"key":"168_CR9","doi-asserted-by":"crossref","unstructured":"Crowe, F., Daly, A., & Marnane, W. (2004). Single-chip FPGA implementation of a cryptographic co-processor. In Proc. of the international conference on field programmable technology (FPT\u201904) (pp.\u00a0279\u2013285).","DOI":"10.1109\/FPT.2004.1393279"},{"key":"168_CR10","first-page":"324","volume-title":"A 1 Gbit\/s partially unrolled architecture of hash functions SHA-1 and SHA-512. CT-RSA 2004. LNCS (Vol. 2964)","author":"R. Lien","year":"2004","unstructured":"Lien, R., Grembowski, T., & Gaj, K. (2004). A 1 Gbit\/s partially unrolled architecture of hash functions SHA-1 and SHA-512. CT-RSA 2004. LNCS (Vol. 2964, pp. 324\u2013338). New York: Springer."},{"key":"168_CR11","first-page":"873","volume-title":"The 2004 IEEE Asia-Pacific conference on circuits and systems","author":"Y. Ming-yan","year":"2004","unstructured":"Ming-yan, Y., Tong, Z., Jin-xiang, W., & Yi-zheng, Y. (2004). An efficient ASIC implementation of SHA-1 engine for TPM. In The 2004 IEEE Asia-Pacific conference on circuits and systems (pp.\u00a0873\u2013876). Piscataway: IEEE."},{"key":"168_CR12","first-page":"580","volume-title":"Proc. of the international conference on information technology: coding and computing (ITCC\u201905)","author":"T. S. Ganesh","year":"2005","unstructured":"Ganesh, T. S., & Sudarshan, T. S. B. (2005). ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitives. In Proc. of the international conference on information technology: coding and computing (ITCC\u201905) (pp.\u00a0580\u2013585). Piscataway: IEEE."},{"key":"168_CR13","first-page":"532","volume-title":"Proc. of the international conference on information technology: coding and computing (ITCC\u201905)","author":"A. Satoh","year":"2005","unstructured":"Satoh, A., & Inoue, T. (2005). ASIC-Hardware-Focused comparison for hash functions MD5, RIPEMD-160, and SHS. In Proc. of the international conference on information technology: coding and computing (ITCC\u201905) (pp.\u00a0532\u2013537). Piscataway: IEEE."},{"key":"168_CR14","first-page":"456","volume-title":"Proc. of the 2004 Asia and South Pacific design automation conference (ASP-DAC\u201904)","author":"M. Wang","year":"2004","unstructured":"Wang, M., Su, C., Huang, C., & Wu, C. (2004). An HMAC processor with integrated SHA-1 and MD5 algorihtms. In Proc. of the 2004 Asia and South Pacific design automation conference (ASP-DAC\u201904) (pp.\u00a0456\u2013458). Piscataway: IEEE."},{"key":"168_CR15","first-page":"889","volume-title":"Proc. of the 2004 international symposium on circuits and systems (ISCAS\u201904)","author":"C. Ng","year":"2004","unstructured":"Ng, C., Ng, T., & Yip, K. (2004). A unified architecture of MD5 and RIPEMD-160 hash algorithms. In Proc. of the 2004 international symposium on circuits and systems (ISCAS\u201904) (pp.\u00a0889\u2013892). Piscataway: IEEE."},{"key":"168_CR16","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1109\/HICSS.2005.291","volume-title":"Proc. of the 38th annual Hawaii international conference on system science (HICSS 05)","author":"K. J\u00e4rvinen","year":"2005","unstructured":"J\u00e4rvinen, K., Tommiska, M., & Skytt\u00e4, J. (2005). Hardware implementation analysis of the MD5 hash algorihtm. In Proc. of the 38th annual Hawaii international conference on system science (HICSS 05) (p.\u00a0298). Piscataway: IEEE."},{"key":"168_CR17","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/ASAP.2006.68","volume-title":"IEEE 17th international conference on application-specific systems, architectures and processors (ASAP\u201906)","author":"Y. K. Lee","year":"2006","unstructured":"Lee, Y. K., Chan, H., & Verbauwhede, I. (2006). Throughput optimized SHA-1 architecture using unfolding transformation. In IEEE 17th international conference on application-specific systems, architectures and processors (ASAP\u201906) (pp.\u00a0354\u2013359). Piscataway: IEEE."},{"key":"168_CR18","first-page":"102","volume-title":"Information security applications, 8th international workshop, WISA 2007, Lecture notes in computer science (vol.\u00a04867)","author":"Y. K. Lee","year":"2007","unstructured":"Lee, Y. K., Chan, H., & Verbauwhede, I. (2007). Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations. In S. Kim, H. Lee, & M. Yung (Eds.), Information security applications, 8th international workshop, WISA 2007, Lecture notes in computer science (vol.\u00a04867, pp.\u00a0102\u2013114). New York: Springer-Verlag."},{"key":"168_CR19","unstructured":"Helion Technology (2008). Helion SHA-1 hashing cores. http:\/\/heliontech.com\/sha1.htm ."},{"key":"168_CR20","unstructured":"National Institute of Standards and Technology (2002). Secure Hash Standard. Federal Information Processing Standards Publication 180-2. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-2\/fips180-2.pdf ."},{"key":"168_CR21","unstructured":"Rivest, R. (1992). The MD5 message-digest algorithm. http:\/\/www.faqs.org\/rfcs\/rfc1321.html ."},{"key":"168_CR22","unstructured":"Dobbertin, H., Bosselaers, A., & Preneel, B. (1996). RIPEMD-160: A strengthened version of RIPEMD. http:\/\/homes.esat.kuleuven.be\/~cosicart\/pdf\/AB-9601\/AB-9601.pdf ."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-008-0168-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-008-0168-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-008-0168-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T08:19:27Z","timestamp":1559377167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-008-0168-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,31]]},"references-count":22,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2008,11]]}},"alternative-id":["168"],"URL":"https:\/\/doi.org\/10.1007\/s11265-008-0168-8","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,31]]}}}