{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:01:00Z","timestamp":1729616460029,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/date.2011.5763162","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T17:45:16Z","timestamp":1361295916000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["The potential of reconfigurable hardware for HPC cryptanalysis of SHA-1"],"prefix":"10.1109","author":[{"given":"A","family":"Cilardo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Finding SHA-1 characteristics: General results and applications","author":"de","year":"2006","journal-title":"Advances in Cryptology - ASIACRYPT 2006"},{"key":"ref11","first-page":"56","article-title":"Collisions for 70-step SHA-1: On the full cost of collision search","volume":"4876","author":"de","year":"2007","journal-title":"Proceedings of SAC 2007 ser LNCS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71039-4_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2010.113"},{"journal-title":"Secure hash standard Federal Information Processing Standard FIPS-180-1 NIST Std","year":"1995","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2007.12"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88353-1_4"},{"journal-title":"MD5 considered harmful today Creating a rogue CA certificate","year":"2011","author":"sotirov","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11426639_3","article-title":"Collisions of SHA-O and reduced SHA-1","volume":"3494","author":"biham","year":"2005","journal-title":"Proceedings of EURO-CRYPT 2005 ser LNCS"},{"key":"ref7","first-page":"56","article-title":"Differential collisions in SHA-O","volume":"1462","author":"chabaud","year":"1999","journal-title":"Proceedings of CRYPTO &#x2018;98 ser LNCS"},{"journal-title":"Rivyera S3&#x2013;5000 [Online]","year":"2011","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.80"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/11535218_2","article-title":"Finding collisions in the full SHA-1","volume":"3621","author":"wang","year":"2005","journal-title":"Proceedings of Advances in Cryptology - CRYPTO 2005 ser LNCS"}],"event":{"name":"2011 Design, Automation & Test in Europe","start":{"date-parts":[[2011,3,14]]},"location":"Grenoble","end":{"date-parts":[[2011,3,18]]}},"container-title":["2011 Design, Automation &amp; Test in Europe"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5754459\/5762992\/05763162.pdf?arnumber=5763162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:50:04Z","timestamp":1498017004000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5763162\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/date.2011.5763162","relation":{},"subject":[],"published":{"date-parts":[[2011,3]]}}}