{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:18:46Z","timestamp":1729657126972,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/vlsisoc.2007.4402513","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T15:01:08Z","timestamp":1197990068000},"page":"284-287","source":"Crossref","is-referenced-by-count":6,"title":["High speed SOC design for blowfish cryptographic algorithm"],"prefix":"10.1109","author":[{"given":"Brian","family":"Cody","sequence":"first","affiliation":[]},{"given":"Justin","family":"Madigan","sequence":"additional","affiliation":[]},{"given":"Spencer","family":"MacDonald","sequence":"additional","affiliation":[]},{"given":"Kenneth W.","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/368434.368449"},{"key":"ref11","first-page":"57","article-title":"VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation","author":"lai","year":"2001","journal-title":"IEEE International Symposium on Circuits and Systems"},{"journal-title":"Journal","year":"1995","author":"dobb's","key":"ref12"},{"article-title":"Blowfish: One Year Later","year":"0","author":"schneier","key":"ref13"},{"journal-title":"Ibid","year":"0","key":"ref14"},{"article-title":"Cryptanalysis and design of iterated block ciphers","year":"1997","author":"rijmen","key":"ref15"},{"key":"ref16","article-title":"On the Key Schedule of Blowfish","author":"schmidt","year":"2005","journal-title":"Cryptology ePrint Archive"},{"journal-title":"Ibid","year":"0","key":"ref4"},{"journal-title":"The Blowfish encryption algorithm","year":"0","author":"schneier","key":"ref3"},{"journal-title":"Ibid","year":"0","key":"ref6"},{"key":"ref5","first-page":"191","article-title":"Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)","author":"schneier","year":"1994","journal-title":"Fast Software Encryption Second International Workshop Leuven Belgium December 1994 Proceedings"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/BFb0052351","article-title":"Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor","volume":"1267","author":"schneier","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Speed Comparisons of Block Ciphers on a Pentium","year":"0","author":"schneier","key":"ref7"},{"article-title":"Applied Cryptography","year":"1996","author":"schneier","key":"ref2"},{"year":"1977","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SBCCI.1999.803126"}],"event":{"name":"2007 IFIP International Conference on Very Large Scale Integration","start":{"date-parts":[[2007,10,15]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2007,10,17]]}},"container-title":["2007 IFIP International Conference on Very Large Scale Integration"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4402461\/4402462\/04402513.pdf?arnumber=4402513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T22:17:40Z","timestamp":1497737860000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4402513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/vlsisoc.2007.4402513","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}