{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T23:22:37Z","timestamp":1648682557785},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s13389-015-0109-y","type":"journal-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T05:59:19Z","timestamp":1441605559000},"page":"245-254","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Throughput-optimized implementations of QUAD"],"prefix":"10.1007","volume":"5","author":[{"given":"Jason R.","family":"Hamlet","sequence":"first","affiliation":[]},{"given":"Robert W.","family":"Brocato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"109_CR1","unstructured":"Altera, Cyclone V Device Handbook (CV-5V2) (2012)"},{"key":"109_CR2","doi-asserted-by":"crossref","unstructured":"Arditti, D., et al.: Compact FPGA implementations of QUAD. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM (2007)","DOI":"10.1145\/1229285.1229323"},{"key":"109_CR3","unstructured":"Arditti, D., et al.: QUAD: overview and recent developments. In: Symmetric Cryptography 7021 (2007)"},{"key":"109_CR4","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Gilbert, H.: Efficient implementations of multivariate quadratic systems. In: Selected Areas in Cryptography. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74462-7_13"},{"key":"109_CR5","doi-asserted-by":"crossref","unstructured":"Berbain, C., Gilbert, H., Patarin, J.: QUAD: a practical stream cipher with provable security. In: Advances in Cryptology-EUROCRYPT, 2006, pp. 109\u2013128. Springer, Berlin (2006)","DOI":"10.1007\/11761679_8"},{"issue":"2","key":"109_CR6","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM J. Comput. 15(2), 364\u2013383 (1986)","journal-title":"SIAM J. Comput."},{"key":"109_CR7","unstructured":"Bulens, P., et al.: FPGA implementations of eSTREAM phase-2 focus candidates with hardware profile. In: State of the Art of Stream Ciphers Workshop (SASC\u201907), eSTREAM, ECRYPT Stream Cipher Project, Report, vol. 24 (2007)"},{"key":"109_CR8","doi-asserted-by":"crossref","unstructured":"Gennaro, R.: An improved pseudo-random generator based on discrete log. In: Advances in Cryptology (CRYPTO 2000). Springer, Berlin (2000)","DOI":"10.1007\/3-540-44598-6_29"},{"key":"109_CR9","unstructured":"Gierlichs, B., et al.: Susceptibility of eSTREAM candidates towards side channel analysis. In: Proceedings of SASC, pp. 123\u2013150 (2008)"},{"key":"109_CR10","unstructured":"International Organization for Standardization, ISO\/IEC 18031:2011. Random bit generation (2011)"},{"key":"109_CR11","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology (CRYPTO\u201999). Springer, Berlin (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"109_CR12","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Advances in Cryptology (CRYPTO96). Springer, Berlin (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"109_CR13","unstructured":"OpenSSL: The open source toolkit for SSL\/TLS. http:\/\/www.openssl.org\/ Accessed 28 Jan 2013"},{"key":"109_CR14","unstructured":"Rogawski, M.: Hardware evaluation of estream candidates: grain, lex, mickey128, salsa20 and trivium. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report, vol. 25 (2007)"},{"key":"109_CR15","doi-asserted-by":"crossref","unstructured":"Rouvroy, G., et al.: Compact and efficient encryption\/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications. In: Proceedings of International Information Technology: Coding and Computing 2004 (ITCC 2004), Conference on, vol. 2. IEEE (2004)","DOI":"10.1109\/ITCC.2004.1286716"},{"key":"109_CR16","doi-asserted-by":"crossref","unstructured":"Rouvroy, G., et al.: Design strategies and modified descriptions to optimize cipher FPGA implementations: fast and compact results for DES and triple-DES. In: Proceedings of the 2003 ACM\/SIGDA eleventh International Symposium on Field Programmable Gate Arrays. ACM (2003)","DOI":"10.1145\/611817.611879"},{"key":"109_CR17","unstructured":"Storer, J.A.: An Introduction to Data Structures and Algorithms. Springer Science & Business Media, Berlin (2012)"},{"key":"109_CR18","unstructured":"Xilinx, Virtex-4 FPGA User Guide UG070 (v2.6) (2008)"},{"key":"109_CR19","doi-asserted-by":"crossref","unstructured":"Yang, B.-Y., et al.: Analysis of QUAD. In: Fast Software Encryption. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-74619-5_19"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0109-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-015-0109-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-015-0109-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T06:55:46Z","timestamp":1567148146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-015-0109-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["109"],"URL":"https:\/\/doi.org\/10.1007\/s13389-015-0109-y","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,7]]}}}