{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:37:14Z","timestamp":1742387834305},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540634652"},{"type":"electronic","value":"9783540695578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63465-7_220","type":"book-chapter","created":{"date-parts":[[2010,4,5]],"date-time":"2010-04-05T19:22:48Z","timestamp":1270495368000},"page":"151-160","source":"Crossref","is-referenced-by-count":25,"title":["A case study of partially evaluated hardware circuits: Key-specific DES"],"prefix":"10.1007","author":[{"given":"Jason","family":"Leonard","sequence":"first","affiliation":[]},{"given":"William H.","family":"Mangione-Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,7,29]]},"reference":[{"key":"16_CR1","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons, 1996."},{"key":"16_CR2","unstructured":"J. P. Gray and T. A. Kean, \u201cConfigurable Hardware: A New Paradigm for Computation,\u201d presented at Decennial Cal Tech Conference on VLSI, Pasadena, CA, 1989."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener, \u201cMinimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security: A Report by an ad hoc Group of Cryptographers and Computer Scientists,\u201d http:\/\/www.bsa.org\/policy\/eneryption\/cryptographers, 1996.","DOI":"10.21236\/ADA385264"},{"key":"16_CR4","unstructured":"I. Goldberg and D. Wagner, \u201cArchitectural Considerations for Cryptoanalytic Hardware,\u201d http:\/\/www.cs.berkeley.edu\/-iang\/isaac\/hardware, 1996."},{"key":"16_CR5","unstructured":"S. Son, \u201cFeasibility Study: DES Cryptanalysis Using Reconfigurable Hardware,\u201d ftp:\/\/ftp.et.byu.edu\/papers\/ desfpga.ps, 1996."},{"key":"16_CR6","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. E. Hellman, \u201cExhaustive Cryptanalysis of the NBS Data Encryption Standard,\u201d in IEEE Computer, vol. 10, 1977, pp. 74\u201384.","journal-title":"IEEE Computer"},{"key":"16_CR7","unstructured":"M. J. Wiener, \u201cEfficient DES Key Search,\u201d presented at CRYPTO '93, Santa Barbara, CA, 1993."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"J. Villasenor, B. Schoner, K. Chia, C. Zapata, H. J. Kim, C. Jones, S. Lansing, and W. H. Mangione-Smith \u201cConfigurable Computing Solutions for Automatic Target Recognition,\u201d in Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, J. Arnold and K. L. Pocek, Eds. Napa, CA, 1996, pp. 70\u201379.","DOI":"10.1109\/FPGA.1996.564749"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"S. Singh, J. Hogg, and D. McAuley, \u201cExpressing Dynamic Reconfiguration by Partial Evaluation,\u201d presented at Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, Napa, CA, 1996.","DOI":"10.1109\/FPGA.1996.564830"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Q. Wang and D. M. Lewis, \u201cAutomated Field-Programmable Compute Accelerator Design Using Partial Evaluation,\u201d presented at Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, Napa, CA, 1997.","DOI":"10.1109\/FPGA.1997.624614"}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63465-7_220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:14:41Z","timestamp":1559002481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63465-7_220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540634652","9783540695578"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-63465-7_220","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}