{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:45:20Z","timestamp":1774129520323,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.23919\/icact48636.2020.9061457","type":"proceedings-article","created":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T04:06:01Z","timestamp":1586491561000},"page":"1242-1247","source":"Crossref","is-referenced-by-count":6,"title":["A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC"],"prefix":"10.23919","author":[{"given":"Ruizhen","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaoyong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingming","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2018.2818713"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2017.2702632"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196135"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341985"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2018.00135"},{"key":"ref15","author":"yao","year":"2014","journal-title":"SuperScalar RISC Processor Design"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1269207"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2017.8303943"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2990299.2990318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2012.06.007"},{"key":"ref5","first-page":"1","article-title":"Design of high-throughput SHA-256 hash function based on FPGA","author":"suhaili","year":"2017","journal-title":"Proc IEEE 6th International Conference on Electrical Engineering and Informatics (ICEEI)"},{"key":"ref8","article-title":"Secure Hash Standard (SHS), N.1 of Standards and Technology","year":"2012","journal-title":"FIBS PUB 180&#x2013;1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2015.01.02"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271509"},{"key":"ref1","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2967064"}],"event":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","location":"Phoenix Park, PyeongChang,, Korea (South)","start":{"date-parts":[[2020,2,16]]},"end":{"date-parts":[[2020,2,19]]}},"container-title":["2020 22nd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9046057\/9061230\/09061457.pdf?arnumber=9061457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T00:37:42Z","timestamp":1589243862000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9061457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.23919\/icact48636.2020.9061457","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}