{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:36Z","timestamp":1750308156955,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,2,22]],"date-time":"2006-02-22T00:00:00Z","timestamp":1140566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,2,22]]},"DOI":"10.1145\/1117201.1117225","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"159-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A compact FPGA implementation of the hash function whirlpool"],"prefix":"10.1145","author":[{"given":"Norbert","family":"Pramstaller","sequence":"first","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"given":"Christian","family":"Rechberger","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"given":"Vincent","family":"Rijmen","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2006,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"R. Anderson and E. Biham. Tiger: A Fast New Hash Function. http:\/\/www.cs.technion.ac.il\/~biham\/-Reports\/Tiger\/tiger\/tiger.html]]  R. Anderson and E. Biham. Tiger: A Fast New Hash Function. http:\/\/www.cs.technion.ac.il\/~biham\/-Reports\/Tiger\/tiger\/tiger.html]]"},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Limited. AMBA 2.0 Specification. http:\/\/www.arm.com\/armtech\/.]]  ARM Limited. AMBA 2.0 Specification. http:\/\/www.arm.com\/armtech\/.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"The Whirlpool Hashing Function","author":"Baretto P. S.L.M.","year":"2000","unstructured":"P. S.L.M. Baretto and V. Rijmen . The Whirlpool Hashing Function , 2000 , revised in May 2003. http:\/\/paginas.terra.com.br\/informatica\/-paulobarreto\/WhirlpoolPage.html.]] P. S.L.M. Baretto and V. Rijmen. The Whirlpool Hashing Function, 2000, revised in May 2003. http:\/\/paginas.terra.com.br\/informatica\/-paulobarreto\/WhirlpoolPage.html.]]"},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-60865-6_44","volume-title":"Proceedings of Fast Software Encryption '96","author":"Dobbertin H.","year":"1996","unstructured":"H. Dobbertin , A. Bosselaers , and B. Preneel . RIPEMD-160: A strengthened version of RIPEMD . In Proceedings of Fast Software Encryption '96 , volume 1039 of LNCS , pages 71 -- 82 . Springer , 1996 .]] H. Dobbertin, A. Bosselaers, and B. Preneel. RIPEMD-160: A strengthened version of RIPEMD. In Proceedings of Fast Software Encryption '96, volume 1039 of LNCS, pages 71--82. Springer, 1996.]]"},{"volume-title":"IEE Proceedings on Information Security","author":"Feldhofer M.","key":"e_1_3_2_1_5_1","unstructured":"M. Feldhofer , J. Wolkerstorfer , and V. Rijmen . AES Implementation on a Grain of Sand . In IEE Proceedings on Information Security , to appear.]] M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a Grain of Sand. In IEE Proceedings on Information Security, to appear.]]"},{"key":"e_1_3_2_1_6_1","first-page":"319","volume-title":"Very Compact FPGA Implementation of the AES Algorithm. In Proceedings of CHES 2003","volume":"2779","author":"Chodowiec P.","year":"2003","unstructured":"P. Chodowiec and K. Gaj . Very Compact FPGA Implementation of the AES Algorithm. In Proceedings of CHES 2003 , volume 2779 of LNCS, pages 319 -- 333 . Springer , 2003 .]] P. Chodowiec and K. Gaj. Very Compact FPGA Implementation of the AES Algorithm. In Proceedings of CHES 2003, volume 2779 of LNCS, pages 319--333. Springer, 2003.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057661.1057677"},{"key":"e_1_3_2_1_8_1","unstructured":"International Organization for Standardization. ISO\/IEC 10118-3:2003. http:\/\/www.ncits.org\/ref-docs\/FDIS_10118-3.pdf]]  International Organization for Standardization. ISO\/IEC 10118-3:2003. http:\/\/www.ncits.org\/ref-docs\/FDIS_10118-3.pdf]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Efficient Architecture and Hardware Implementation of the Whirlpool Hash Function","author":"Kitsos P.","year":"2004","unstructured":"P. Kitsos and O. Koufopavlou . Efficient Architecture and Hardware Implementation of the Whirlpool Hash Function . IEEE Transactions on Consumer Electronics , 50(1):208--213, 2004 .]] P. Kitsos and O. Koufopavlou. Efficient Architecture and Hardware Implementation of the Whirlpool Hash Function. IEEE Transactions on Consumer Electronics, 50(1):208--213, 2004.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190589"},{"key":"e_1_3_2_1_11_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes , P. C. van Oorschot , and S. A. Vanstone . Handbook of Applied Cryptography . CRC Press , 1997 . Available online at http:\/\/www.cacr.math.uwaterloo.ca\/hac\/.]] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997. Available online at http:\/\/www.cacr.math.uwaterloo.ca\/hac\/.]]"},{"key":"e_1_3_2_1_12_1","unstructured":"NESSIE. New European Schemes for Signatures Integrity and Encryption. IST-1999-12324. http:\/\/cryptonessie.org\/]]  NESSIE. New European Schemes for Signatures Integrity and Encryption. IST-1999-12324. http:\/\/cryptonessie.org\/]]"},{"key":"e_1_3_2_1_13_1","volume-title":"November","author":"National Institute of Standards and Technology (NIST).","year":"2001","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard , November 2001 . Available online at http:\/\/www.itl.nist.gov\/fipspubs\/.]] National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http:\/\/www.itl.nist.gov\/fipspubs\/.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"August","author":"National Institute of Standards and Technology (NIST).","year":"2002","unstructured":"National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard , August 2002 . Available online at http:\/\/www.itl.nist.gov\/fipspubs\/.]] National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http:\/\/www.itl.nist.gov\/fipspubs\/.]]"},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"565","volume-title":"Proceedings of FPL","author":"Pramstaller N.","year":"2004","unstructured":"N. Pramstaller and J. Wolkerstorfer . A Universal and Efficient AES Co-processor for Field Programmable Logic Arrays . In Proceedings of FPL 2004 , volume 3203 of LNCS , pages 565 -- 574 . Springer , 2004.]] N. Pramstaller and J. Wolkerstorfer. A Universal and Efficient AES Co-processor for Field Programmable Logic Arrays. In Proceedings of FPL 2004, volume 3203 of LNCS, pages 565--574. Springer, 2004.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"The MD4 Message Digest Algorithm. Internet RFC 1320 (April","author":"Rivest R.L.","year":"1992","unstructured":"R.L. Rivest . The MD4 Message Digest Algorithm. Internet RFC 1320 (April 1992 ).]] R.L. Rivest. The MD4 Message Digest Algorithm. Internet RFC 1320 (April 1992).]]"},{"key":"e_1_3_2_1_18_1","volume-title":"The MD5 Message Digest Algorithm. Internet RFC 1321 (April","author":"Rivest R.L.","year":"1992","unstructured":"R.L. Rivest . The MD5 Message Digest Algorithm. Internet RFC 1321 (April 1992 ).]] R.L. Rivest. The MD5 Message Digest Algorithm. Internet RFC 1321 (April 1992).]]"},{"key":"e_1_3_2_1_19_1","first-page":"583","volume-title":"Legat. Compact and Efficient Encryption\/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. In Proceedings of ITCC 2004","author":"Rouvroy G.","year":"2004","unstructured":"G. Rouvroy , F.-X. Standaert , J.-J. Quisquater , and J.- D. Legat. Compact and Efficient Encryption\/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. In Proceedings of ITCC 2004 , pages 583 -- 587 . IEEE Computer Society , 2004 .]] G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, and J.-D. Legat. Compact and Efficient Encryption\/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. In Proceedings of ITCC 2004, pages 583--587. IEEE Computer Society, 2004.]]"},{"key":"e_1_3_2_1_20_1","first-page":"239","volume-title":"A Compact Rijndael Hardware Architecture with S-Box Optimization. In Proceedings of ASIACRYPT 2001","volume":"2248","author":"Satoh A.","year":"2001","unstructured":"A. Satoh , S. Morioka , K. Takano , and S. Munetoh . A Compact Rijndael Hardware Architecture with S-Box Optimization. In Proceedings of ASIACRYPT 2001 , volume 2248 of LNCS, pages 239 -- 254 . Springer , 2001 .]] A. Satoh, S. Morioka, K. Takano, and S. Munetoh. A Compact Rijndael Hardware Architecture with S-Box Optimization. In Proceedings of ASIACRYPT 2001, volume 2248 of LNCS, pages 239--254. Springer, 2001.]]"},{"key":"e_1_3_2_1_21_1","first-page":"334","volume-title":"Legat. Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. In Proceedings of CHES 2003","volume":"2779","author":"Standaert F.-X.","year":"2003","unstructured":"F.-X. Standaert , G. Rouvroy , J.-J. Quisquater , and J.- D. Legat. Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. In Proceedings of CHES 2003 , volume 2779 of LNCS, pages 334 -- 350 . Springer , 2003 .]] F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, and J.-D. Legat. Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs. In Proceedings of CHES 2003, volume 2779 of LNCS, pages 334--350. Springer, 2003.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"e_1_3_2_1_24_1","unstructured":"Xilinx Incorporated. Silicon Solutions --- Virtex Series FPGAs. http:\/\/www.xilinx.com\/products\/.]]  Xilinx Incorporated. Silicon Solutions --- Virtex Series FPGAs. http:\/\/www.xilinx.com\/products\/.]]"}],"event":{"name":"FPGA06: ACM\/SIGDA International Symposium on Field Programmable Gate Arrays","sponsor":["ACM Association for Computing Machinery","SIGDA ACM Special Interest Group on Design Automation"],"location":"Monterey California USA","acronym":"FPGA06"},"container-title":["Proceedings of the 2006 ACM\/SIGDA 14th international symposium on Field programmable gate arrays"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1117201.1117225","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1117201.1117225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:55Z","timestamp":1750263535000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1117201.1117225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2,22]]},"references-count":23,"alternative-id":["10.1145\/1117201.1117225","10.1145\/1117201"],"URL":"https:\/\/doi.org\/10.1145\/1117201.1117225","relation":{},"subject":[],"published":{"date-parts":[[2006,2,22]]},"assertion":[{"value":"2006-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}