{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:29:39Z","timestamp":1758893379073,"version":"3.41.0"},"reference-count":28,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1587\/elex.12.20150371","type":"journal-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T22:06:40Z","timestamp":1433369200000},"page":"20150371-20150371","source":"Crossref","is-referenced-by-count":3,"title":["Parallelizing SHA-1"],"prefix":"10.1587","volume":"12","author":[{"given":"Hu-ung","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Computer and Software, Hanyang University"}]},{"given":"Seongjing","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer and Software, Hanyang University"}]},{"given":"Jae-woon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer and Software, Hanyang University"}]},{"given":"Youjip","family":"Won","sequence":"additional","affiliation":[{"name":"Department of Computer and Software, Hanyang University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] V. Klima: IACR Cryptology ePrint Archive <b>2005<\/b> (2005) 75."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] X. Wang, Y. Yin and H. Yu: Advances in Cryptology - CRYPTO 2005, LNCS <b>3621<\/b> (2005) 17. DOI:10.1007\/11535218_2","DOI":"10.1007\/11535218_2"},{"key":"3","unstructured":"[3] M. Lillibridge, K. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezise and P. Camble: USENIX FAST (2009) 111."},{"key":"4","unstructured":"[4] W. Dong, F. Douglis, K. Li, H. Patterson, S. Reddy and P. Shilane: USENIX FAST (2011) 2:1."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] H. Lim, B. Fan, D. G. Andersen and M. Kaminsky: ACM SOSP (2011) 1. DOI:10.1145\/2043556.2043558","DOI":"10.1145\/2043556.2043558"},{"key":"6","unstructured":"[6] K. Srinivasan, T. Bisson, G. Goodson and K. Voruganti: USENIX FAST (2012) 24:1."},{"key":"7","unstructured":"[7] W. Xia, H. Jiang, D. Feng and L. Tian: USENIX FAST (2012) 1:1."},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] J. Min, D. Yoon and Y. Won: IEEE Trans. Comput. <b>60<\/b> (2011) 824. DOI:10.1109\/TC.2010.263","DOI":"10.1109\/TC.2010.263"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] L. Jiang, Y. Wang, Q. Zhao, Y. Shao and X. Zhao: CiSE (2009) 1.","DOI":"10.1109\/CISE.2009.5363077"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] R. Chaves, G. Kuzmanov, L. Sousa and S. Vassiliadis: IEEE Trans. Very Large Scale Integr. (VLSI) Syst. <b>16<\/b> (2008) 999. DOI:10.1109\/TVLSI.2008.2000450","DOI":"10.1109\/TVLSI.2008.2000450"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] H. Michail and C. Goutis: EDSSC (2008) 1. DOI:10.1109\/EDSSC.2008.4760668","DOI":"10.1109\/EDSSC.2008.4760668"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] H. Michail, A. Kakarountas, A. Milidonis and C. Goutis: IEEE Trans. Dependable Secure Comput. <b>6<\/b> (2009) 255. DOI:10.1109\/TDSC.2008.15","DOI":"10.1109\/TDSC.2008.15"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] E.-H. Lee, J.-H. Lee, I.-H. Park and K.-R. Cho: IEICE Electron. Express <b>6<\/b> (2009) 1174. DOI:10.1587\/elex.6.1174","DOI":"10.1587\/elex.6.1174"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] L. Dadda, M. Macchetti and J. Owen: ACM GLSVLSI (2004) 421. DOI:10.1145\/988952.989053","DOI":"10.1145\/988952.989053"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] F. Crowe, A. Daly, T. Kerins and W. Marnane: ICFPT (2004) 279. DOI:10.1109\/FPT.2004.1393279","DOI":"10.1109\/FPT.2004.1393279"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] K. Ting, S. Yuen, K. Lee and P. Leong: Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream, LNCS <b>2438<\/b> (2002) 577. DOI:10.1007\/3-540-46117-5_60","DOI":"10.1007\/3-540-46117-5_60"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] M. Macchetti and L. Dadda: ARITH-17 (2005) 222. DOI:10.1109\/ARITH.2005.36","DOI":"10.1109\/ARITH.2005.36"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] R. Lien, T. Grembowski and K. Gaj: CT-RSA 2004, LNCS <b>2964<\/b> (2004) 324. DOI:10.1007\/978-3-540-24660-2_25","DOI":"10.1007\/978-3-540-24660-2_25"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] R. P. McEvoy, F. Crowe, C. Murphy and W. P. Marnane: IEEE ISVLSI\u201906 (2006) 6. DOI:10.1109\/ISVLSI.2006.70","DOI":"10.1109\/ISVLSI.2006.70"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] R. Chaves, G. Kuzmanov, L. Sousa and S. Vassiliadis: CHES LNCS <b>4249<\/b> (2006) 298. DOI:10.1007\/11894063_24","DOI":"10.1007\/11894063_24"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] N. Sklavos and O. Koufopavlou: J. Supercomput. <b>31<\/b> (2005) 227. DOI:10.1007\/s11227-005-0086-5","DOI":"10.1007\/s11227-005-0086-5"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] H. Michail, A. Kakarountas, O. Koufopavlou and C. Goutis: IEEE ISCAS <b>4<\/b> (2005) 4086. DOI:10.1109\/ISCAS.2005.1465529","DOI":"10.1109\/ISCAS.2005.1465529"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] I. Ahmad and A. S. Das: Comput. Electr. Eng. <b>31<\/b> (2005) 345. DOI:10.1016\/j.compeleceng.2005.07.001","DOI":"10.1016\/j.compeleceng.2005.07.001"},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] Y. K. Lee, H. Chan and I. Verbauwhede: ASAP \u201906 (2006) 354. DOI:10.1109\/ASAP.2006.68","DOI":"10.1109\/ASAP.2006.68"},{"key":"25","unstructured":"[25] P. FIPS: 180-1. Secure Hash Standard, National Institute of Standards and Technology, <b>17<\/b> (1995)."},{"key":"26","unstructured":"[26] M.-G. Transceivers: Ml605 evaluation board\u2013ML605 Hardware User Guide (2009)."},{"key":"27","unstructured":"[27] I. Xilinx: Microblaze processor reference guide\u2013reference manual (2006) 23."},{"key":"28","unstructured":"[28] H.-P. Rosinger: Connecting customized IP to the MicroBlaze soft processor using the fast simplex link (FSL) channel, XILINX (2004)."}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/12\/12\/12_12.20150371\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T08:53:37Z","timestamp":1748422417000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/12\/12\/12_12.20150371\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":28,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.12.20150371","relation":{},"ISSN":["1349-2543"],"issn-type":[{"type":"electronic","value":"1349-2543"}],"subject":[],"published":{"date-parts":[[2015]]}}}