{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:29:58Z","timestamp":1729657798897,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/asap.2010.5540976","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"309-312","source":"Crossref","is-referenced-by-count":5,"title":["General-purpose FPGA platform for efficient encryption and hashing"],"prefix":"10.1109","author":[{"given":"Jakub","family":"Szefer","sequence":"first","affiliation":[]},{"given":"Yu-Yuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruby B.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_2"},{"key":"ref11","first-page":"227","article-title":"Multi-gigabit gcm-aes architecture optimized for fpgas","author":"lemsitzer","year":"2007","journal-title":"CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2007.371748"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2005.1568539"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1117201.1117225"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2007.364468"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1329416"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/ASAP.2005.49","article-title":"On-chip lookup tables for fast symmetrickey encryption","volume":"0","author":"fiskiran","year":"2005","journal-title":"Application-Specific Systems Architectures and Processors IEEE International Conference on"},{"journal-title":"Cryptographic hash algoirthm competition","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2000.862373"},{"journal-title":"Mathematical Theory of Connecting Networks and Telephone Traffic","year":"1965","author":"bene\u0161","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_11"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","author":"daemen","year":"2002","journal-title":"The design of Rijndael AES-the Advanced Enervation Standard"},{"journal-title":"Whirlpool Hash Function","year":"0","author":"barreto","key":"ref2"},{"journal-title":"FIPS-197 Advanced Encryption Standard (AES)","year":"2001","key":"ref1"},{"journal-title":"Helion Fast AES Encryptor","year":"0","author":"limited","key":"ref9"}],"event":{"name":"2010 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2010,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2010,7,9]]}},"container-title":["ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5523683\/5540749\/05540976.pdf?arnumber=5540976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T11:04:03Z","timestamp":1559387043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5540976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/asap.2010.5540976","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}