{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:00:08Z","timestamp":1761580808206},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/tvlsi.2010.2060373","type":"journal-article","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T14:45:43Z","timestamp":1282661143000},"page":"1746-1754","source":"Crossref","is-referenced-by-count":16,"title":["VLSI Characterization of the Cryptographic Hash Function BLAKE"],"prefix":"10.1109","volume":"19","author":[{"given":"Luca","family":"Henzen","sequence":"first","affiliation":[]},{"given":"Jean-Philippe","family":"Aumasson","sequence":"additional","affiliation":[]},{"given":"Willi","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Raphael C.-W.","family":"Phan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"317","author":"batina","year":"2009","journal-title":"RFID Security"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/978-3-642-04159-4_26","volume":"5381","author":"hein","year":"2009","journal-title":"Selected Areas in Cryptography SAC Lecture Notes in Computer Science"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/11894063_7","volume":"4249","author":"mangard","year":"2006","journal-title":"Cryptographic Hardware and Embedded SystemsCHES 2006 ser Lecture Notes in Computer Science"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/11545262_12","volume":"3659","author":"mangard","year":"2005","journal-title":"Cryptographic Hardware and Embedded SystemsCHES 2005 ser Lecture Notes in Computer Science"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805172"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378272"},{"key":"ref35","article-title":"Low-cost SHA-1 hash function architecture for RFID tags","author":"o'neill","year":"2008","journal-title":"Workshop on RFID Security (RFIDSEC)"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TVLSI.2005.863188","article-title":"An area-efficient universal cryptography processor for smart cards","volume":"14","author":"eslami","year":"2006","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"ref10","author":"tillich","year":"2009","journal-title":"Compact hardware implementations of the SHA-3 candidates ARIRANG BLAKE Grstl and Skein"},{"key":"ref40","first-page":"454","author":"sarma","year":"2002","journal-title":"Cryptographic Hardware and Embedded SystemsCHES 2002 ser Lecture Notes in Computer Science"},{"key":"ref11","year":"2007","journal-title":"SP 800-106 randomized hashing digital signatures"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/11426639_28","volume":"3494","author":"kelsey","year":"2005","journal-title":"Lecture Notes in Computer Science-Eurocrypt"},{"key":"ref13","volume":"2964","author":"lien","year":"2004","journal-title":"Topics in CryptologyCT-RSA 2004 ser Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2008.4746906"},{"key":"ref15","author":"bernstein","year":"2007","journal-title":"Chacha a variant of salsa20"},{"key":"ref16","author":"gauravaram","year":"2008","journal-title":"GrstlA SHA-3 Candidate Submission to NIST"},{"key":"ref17","first-page":"2917","article-title":"ASIC hardware implementations for 512-bit hash function whirlpool","author":"satoh","year":"2008","journal-title":"Proc IEEE Int Symp Circuits Syst (ISCAS)"},{"key":"ref18","author":"bernstein","year":"2008","journal-title":"CubeHash Specication (2 b 1) submission to NIST"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2009.5236043"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-01001-9_16","volume":"5479","author":"dinur","year":"2009","journal-title":"Lecture Notes in Computer Science-Eurocrypt"},{"key":"ref4","article-title":"MD5 considered harmful today. Creating a rogue CA certificate","author":"sotirov","year":"2008","journal-title":"25th Chaos Commun Congr"},{"key":"ref27","author":"wu","year":"2008","journal-title":"The hash function JH submission to NIST"},{"key":"ref3","first-page":"1","volume":"4515","author":"stevens","year":"2007","journal-title":"Advances in CryptologyEUROCRYPT 2007 ser Lecture Notes in Computer Science"},{"key":"ref6","year":"2007","journal-title":"Call for a new cryptographic hash algorithm (SHA-3) family federal register"},{"key":"ref29","author":"boura","year":"2010","journal-title":"A zero-sum property for the Keccak-f permutation with 18 rounds NIST mailing list"},{"key":"ref5","year":"2002","journal-title":"Announcing the Secure Hash Standard"},{"key":"ref8","author":"bernstein","year":"2010","journal-title":"eBACS ECRYPT Benchmarking of Cryptographic Systems"},{"key":"ref7","author":"aumasson","year":"2008","journal-title":"SHA-3 Proposal BLAKE submission to NIST"},{"key":"ref2","first-page":"1","volume":"4284","author":"cannire","year":"2006","journal-title":"Advances in CryptologyASIACRYPT 2006 Lecture Notes in Computer Science"},{"key":"ref9","author":"tillich","year":"2009","journal-title":"High-speed hardware implementations of BLAKE Blue Midnight Wish CubeHash ECHO Fugue Grstl Hamsi JH Keccak Luffa Shabal SHAvite-3 SIMD and Skein"},{"key":"ref1","first-page":"19","volume":"3494","author":"wang","year":"2005","journal-title":"Advances in CryptologyEUROCRYPT 2005 Lecture Notes in Computer Science"},{"key":"ref20","article-title":"Hardware evaluation of SHA-3 hash function candidate ECHO","author":"lu","year":"2009","journal-title":"Claude Shannon Workshop Coding Cryptography"},{"key":"ref22","author":"bertoni","year":"2008","journal-title":"Keccak sponge function family submission to NIST"},{"key":"ref21","author":"kk","year":"2008","journal-title":"The Hash Function Hamsi submission to NIST"},{"key":"ref42","first-page":"85","volume":"3156","author":"feldhofer","year":"2004","journal-title":"Cryptographic Hardware and Embedded SystemsCHES 2004 ser Lecture Notes in Computer Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77535-5_8"},{"key":"ref41","article-title":"Is elliptic-curve cryptography suitable to secure RFID tags?","author":"wolkerstorfer","year":"2005","journal-title":"Ecrypt Workshop on RFID and Lightweight Crypto"},{"key":"ref23","author":"canniere","year":"2008","journal-title":"Hash function luffa submission to NIST"},{"key":"ref26","year":"0"},{"key":"ref25","author":"halevi","year":"2008","journal-title":"The hash function fugue submission to NIST"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/92\/5978256\/05551268.pdf?arnumber=5551268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:44:11Z","timestamp":1633913051000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5551268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":42,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2010.2060373","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10]]}}}