{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:04:00Z","timestamp":1729641840117,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/hst.2010.5513102","type":"proceedings-article","created":{"date-parts":[[2010,7,23]],"date-time":"2010-07-23T09:51:20Z","timestamp":1279878680000},"page":"130-134","source":"Crossref","is-referenced-by-count":0,"title":["Hardware implementations of hash function Luffa"],"prefix":"10.1109","author":[{"given":"Akashi","family":"Satoh","sequence":"first","affiliation":[]},{"given":"Toshihiro","family":"Katashita","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Sugawara","sequence":"additional","affiliation":[]},{"given":"Naofumi","family":"Homma","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"The Hash Function Family Luffa (Round 2)","year":"0","author":"hitachi","key":"ref4"},{"year":"0","key":"ref3","article-title":"Cryptographic Hash Algorithm Competition"},{"journal-title":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) HOST","article-title":"CMOS 90nm (CMOS090) from STMicroelectronics","year":"0","key":"ref10"},{"article-title":"The Keccak sponge function family","year":"0","author":"bertoni","key":"ref6"},{"key":"ref5","article-title":"Sponge Functions","author":"bertoni","year":"2007","journal-title":"ECRYPT Workshop on Hash Functions"},{"key":"ref8","article-title":"Hardware Evaluation of the Luffa Hash Family","author":"knezevic and","year":"0","journal-title":"4th Workshop on Embedded Systems Security (WESS 2009)"},{"article-title":"High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHo, Fugue, Grostl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein","year":"0","author":"tillich","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/11426639_2","article-title":"How to Break MD5 and Other Hash Functions","volume":"3494","author":"wang and","year":"2005","journal-title":"EUROCRYPT 2005 LNCS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.006"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"}],"event":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","start":{"date-parts":[[2010,6,13]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2010,6,14]]}},"container-title":["2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5507538\/5513098\/05513102.pdf?arnumber=5513102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T07:21:12Z","timestamp":1497856872000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/hst.2010.5513102","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}