{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:48Z","timestamp":1750220448515,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,28]]},"DOI":"10.1145\/3448734.3450882","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:47:36Z","timestamp":1621266456000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimization and Design of Eaglesong Hash Based on FPGA"],"prefix":"10.1145","author":[{"given":"Xiao","family":"Xiao","sequence":"first","affiliation":[{"name":"East China Normal University"}]},{"given":"Xiaojin","family":"Li","sequence":"additional","affiliation":[{"name":"East China Normal University"}]},{"given":"Yabin","family":"Sun","sequence":"additional","affiliation":[{"name":"East China Normal University"}]},{"given":"Yanling","family":"Shi","sequence":"additional","affiliation":[{"name":"East China Normal University"}]},{"given":"Tongquan","family":"Wei","sequence":"additional","affiliation":[{"name":"East China Normal University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"69","article-title":"Eaglesong: an ARX hash with fast diffusion","volume":"21","author":"Ashur A.","year":"2020","unstructured":"T. Ashur , and A. Szepieniec , \u201c Eaglesong: an ARX hash with fast diffusion ,\u201d Proceedings of the Romanian Academy, Series A , vol. 21 , no. 1 , pp. 69 - 76 , 3\/10, 2020 . T. Ashur, and A. Szepieniec, \u201cEaglesong: an ARX hash with fast diffusion,\u201d Proceedings of the Romanian Academy, Series A, vol. 21, no. 1, pp. 69-76, 3\/10, 2020.","journal-title":"Proceedings of the Romanian Academy, Series A"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"15","article-title":"Implementation of Pipeline Structure of SM3 Algorithm on FPGA","volume":"32","author":"Cai B Q","year":"2015","unstructured":"Cai B Q , Bai G Q . \u201c Implementation of Pipeline Structure of SM3 Algorithm on FPGA ,\u201d Microelectronics and Computer , vol. 32 , no. 1 , pp. 15 - 18 , 2015 . Cai B Q, Bai G Q. \u201cImplementation of Pipeline Structure of SM3 Algorithm on FPGA,\u201d Microelectronics and Computer, vol.32, no. 1, pp. 15-18, 2015.","journal-title":"Microelectronics and Computer"},{"issue":"06","key":"e_1_3_2_1_3_1","first-page":"259","article-title":"Fast Implementation of SM3 Algorithm Based on FPGA","volume":"37","author":"Fang Y","year":"2020","unstructured":"Fang Y , Cong L H , Deng J Q and Chen Z Y . \u201c Fast Implementation of SM3 Algorithm Based on FPGA ,\u201d Computer Applications and Software , vol. 37 , no. 06 , pp. 259 - 262 , 2020 . Fang Y, Cong L H, Deng J Q and Chen Z Y. \u201cFast Implementation of SM3 Algorithm Based on FPGA,\u201d Computer Applications and Software, vol.37, no.06, pp. 259-262, 2020.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Florence","author":"Wong J.","year":"2018","unstructured":"M. M. Wong , J. Haj-Yahya , S. Sau and A. Chattopadhyay , \" A New High Throughput and Area Efficient SHA-3 Implementation,\"\u00a02018 IEEE International Symposium on Circuits and Systems (ISCAS) , Florence , pp. 1 - 5 , 2018 . M. M. Wong, J. Haj-Yahya, S. Sau and A. Chattopadhyay, \"A New High Throughput and Area Efficient SHA-3 Implementation,\"\u00a02018 IEEE International Symposium on Circuits and Systems (ISCAS), Florence, pp. 1-5, 2018."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07013-1_42"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2015.7181868"},{"key":"e_1_3_2_1_7_1","first-page":"445","article-title":"Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs","volume":"2010","author":"Homsirikamol M.","year":"2010","unstructured":"E. Homsirikamol , M. Rogawski , and K. Gaj , \u201c Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs ,\u201d IACR Cryptology ePrint Archive , vol. 2010 , pp. 445 , 01\/01, 2010 . E. Homsirikamol, M. Rogawski, and K. Gaj, \u201cComparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs,\u201d IACR Cryptology ePrint Archive, vol. 2010, pp. 445, 01\/01, 2010.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","volume-title":"Hardware Design and Implementation of Secure Hash Algorithms SM3\/SHA256\/SHA3","author":"Miao J.","year":"2018","unstructured":"Miao J. \u201c Hardware Design and Implementation of Secure Hash Algorithms SM3\/SHA256\/SHA3 ,\u201d Tsinghua University , 2018 . Miao J. \u201cHardware Design and Implementation of Secure Hash Algorithms SM3\/SHA256\/SHA3,\u201d Tsinghua University, 2018."},{"issue":"10","key":"e_1_3_2_1_9_1","first-page":"40","article-title":"Design and implementation of an energy-efficient Keccak algorithm ASIC","volume":"45","author":"Tuo Z","year":"2019","unstructured":"Tuo Z , Chen T , Li W and Nan L M . \u201c Design and implementation of an energy-efficient Keccak algorithm ASIC ,\u201d Application of Electronic Technique , vol. 45 , no. 10 , pp. 40 - 44 , 49, 2019 . Tuo Z, Chen T, Li W and Nan L M. \u201cDesign and implementation of an energy-efficient Keccak algorithm ASIC,\u201d Application of Electronic Technique, vol. 45, no.10, pp.40 -44, 49, 2019.","journal-title":"Application of Electronic Technique"}],"event":{"name":"CONF-CDS 2021: The 2nd International Conference on Computing and Data Science","acronym":"CONF-CDS 2021","location":"Stanford CA USA"},"container-title":["The 2nd International Conference on Computing and Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448734.3450882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:47Z","timestamp":1750193267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448734.3450882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":9,"alternative-id":["10.1145\/3448734.3450882","10.1145\/3448734"],"URL":"https:\/\/doi.org\/10.1145\/3448734.3450882","relation":{},"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}