{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:30:24Z","timestamp":1729657824655,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/trustcom.2014.111","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:37:37Z","timestamp":1421851057000},"page":"846-850","source":"Crossref","is-referenced-by-count":9,"title":["A Compact Hardware Implementation of SM3 Hash Function"],"prefix":"10.1109","author":[{"given":"Tianyong","family":"Ao","sequence":"first","affiliation":[]},{"given":"Zhangqing","family":"He","sequence":"additional","affiliation":[]},{"given":"Jinli","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Xuecheng","family":"Zou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"26","article-title":"Design and implementation of sm3 algorithm on fpga","volume":"31","author":"ding","year":"2012","journal-title":"Microcomputer & Its Applications"},{"key":"2","first-page":"191","article-title":"Implementation of sm3 hash function on fpga","volume":"12","author":"liu","year":"2011","journal-title":"Netinfo Security"},{"key":"1","first-page":"244","article-title":"Optimization design and implementation of sm3 algorithm based on fpga","volume":"38","author":"wang","year":"2012","journal-title":"Computer Engineering"},{"journal-title":"Sepecification of SM3 Cryptographic Hash Algorithm","article-title":"Office of security commercial cryptography administration","year":"2010","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9125-6"},{"key":"5","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","article-title":"Spongent: A lightweight hash function","author":"bogdanov","year":"2011","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2011"},{"key":"4","first-page":"105","article-title":"Hardware performance optimization and evaluation of sm3 hash algorithm on fpga","author":"yuan","year":"2012","journal-title":"Proceedings of the 14th International Conference on Information and Communications Security"},{"journal-title":"Proceedings of the 22nd IET Irish Signals and Systems Conference","article-title":"A compact sha-256 architecture for rfid tags","year":"2011","author":"cao","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-642-01440-6_19","article-title":"Efficient hardware architecture of sha-256 algorithm for trusted mobile computing","author":"kim","year":"2009","journal-title":"Information Security and Cryptology"}],"event":{"name":"2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2014,9,24]]},"location":"Beijing, China","end":{"date-parts":[[2014,9,26]]}},"container-title":["2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008824\/7011202\/07011336.pdf?arnumber=7011336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:42Z","timestamp":1498176222000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7011336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2014.111","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}