{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:17:16Z","timestamp":1729642636114,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/iscas.2009.5118412","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T14:59:27Z","timestamp":1246460367000},"page":"2914-2917","source":"Crossref","is-referenced-by-count":0,"title":["VLSI implementations of the cryptographic hash functions MD6 and &amp;#x00EF;rRUPT"],"prefix":"10.1109","author":[{"given":"L.","family":"Henzen","sequence":"first","affiliation":[]},{"given":"F.","family":"Carbognani","sequence":"additional","affiliation":[]},{"given":"J.-Ph.","family":"Aumassony","sequence":"additional","affiliation":[]},{"given":"S.","family":"O'Neilz","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Fichtner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2008.4484896"},{"key":"11","article-title":"sha-3 proposal blake","author":"aumasson","year":"2008","journal-title":"Submission to NIST"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000450"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-89754-5_8","article-title":"new collision attacks against up to 24-step sha-2","author":"sanadhya","year":"2008"},{"year":"0","key":"2"},{"article-title":"finding md5 collisions - a toy for a notebook","year":"2005","author":"klima","key":"1"},{"key":"10","article-title":"grostl - a sha-3 candidate","author":"gauravaram","year":"2008","journal-title":"Submission to NIST"},{"article-title":"the md6 hash function a proposal to nist for sha-3","year":"2008","author":"rivest","key":"7"},{"key":"6","article-title":"call for a new cryptographic hash algorithm (sha-3) family","volume":"72","year":"2007","journal-title":"Federal Register"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","first-page":"2917","article-title":"asic hardware implementations for 512-bit hash function whirlpool","author":"satoh","year":"2008","journal-title":"Proc IEEE Int Conf Circuits Syst"},{"key":"8","article-title":"enrupt hash function specification","author":"o'neil","year":"2008","journal-title":"Submission to NIST"}],"event":{"name":"2009 IEEE International Symposium on Circuits and Systems - ISCAS 2009","start":{"date-parts":[[2009,5,24]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2009,5,27]]}},"container-title":["2009 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076158\/5117665\/05118412.pdf?arnumber=5118412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T21:28:43Z","timestamp":1497821323000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5118412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscas.2009.5118412","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}