{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:13:12Z","timestamp":1725577992292},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540364108"},{"type":"electronic","value":"9783540364115"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11796435_43","type":"book-chapter","created":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T14:56:43Z","timestamp":1153148203000},"page":"425-434","source":"Crossref","is-referenced-by-count":2,"title":["Rescheduling for Optimized SHA-1 Calculation"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Chaves","sequence":"first","affiliation":[]},{"given":"Georgi","family":"Kuzmanov","sequence":"additional","affiliation":[]},{"given":"Leonel","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Stamatis","family":"Vassiliadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Klima, V.: Finding MD5 collisions a toy for a notebook. Cryptology ePrint Archive, Report 2005\/075 (2005)"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full sha-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-540-24660-2_25","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"R. Lien","year":"2004","unstructured":"Lien, R., Grembowski, T., Gaj, K.: A 1 gbit\/s partially unrolled architecture of hash functions SHA-1 and SHA-512. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 324\u2013338. Springer, Heidelberg (2004)"},{"key":"43_CR4","unstructured":"Sklavos, N., Alexopoulos, E., Koufopavlou, O.G.: Networking data integrity: High speed architectures and hardware implementations. Int. Arab J. Inf. Technol.\u00a01 (2003)"},{"key":"43_CR5","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/TC.2004.104","volume":"53","author":"S. Vassiliadis","year":"2004","unstructured":"Vassiliadis, S., Wong, S., Gaydadjiev, G.N., Bertels, K., Kuzmanov, G.K., Panainte, E.M.: The Molen Polymorphic Processor. IEEE Transactions on Computers\u00a053, 1363\u20131375 (2004)","journal-title":"IEEE Transactions on Computers"},{"key":"43_CR6","unstructured":"NIST: Announcing the standard for secure hash standard, FIPS 180-1. Technical report, National Institute of Standards and Technology (1995)"},{"key":"43_CR7","unstructured":"NIST: The keyed-hash message authentication code (HMAC), FIPS 198. Technical report, National Institute of Standards and Technology (2002)"},{"key":"43_CR8","unstructured":"CAST: SHA-1 Secure Hash Algorithm Cryptoprocessor Core (2005), \n                    \n                      http:\/\/www.cast-inc.com\/"},{"key":"43_CR9","unstructured":"HELION: Fast SHA-1 Hash Core for Xilinx FPGA (2005), \n                    \n                      http:\/\/www.heliontech.com\/"},{"key":"43_CR10","unstructured":"Lu, J., Lockwood, J.: IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application. In: Proceedings. 19th IEEE International Parallel and Distributed Processing Symposium, p. 158b (2005)"}],"container-title":["Lecture Notes in Computer Science","Embedded Computer Systems: Architectures, Modeling, and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11796435_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:10:58Z","timestamp":1605643858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11796435_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540364108","9783540364115"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11796435_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}