{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:21:23Z","timestamp":1725549683948},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258612"},{"type":"electronic","value":"9783540320449"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11424826_70","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T16:53:24Z","timestamp":1268412804000},"page":"665-675","source":"Crossref","is-referenced-by-count":15,"title":["Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient Software Implementation of AES on 32-Bit platforms. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 159\u2013171. Springer, Heidelberg (2003)"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Merchan, J.G., Krummel, V.: Provably Secure Masking of AES. Cryptology ePrint Archive, Report 2004\/101, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-30564-4_5"},{"key":"70_CR3","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael (1999) Available for download at http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/rijndael\/Rijndael.pdf"},{"key":"70_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"70_CR5","unstructured":"Gaisler, J.: The LEON-2 Processor User\u2019s Manual (Version 1.0.24) (September 2004), Available for download at http:\/\/www.gaisler.com\/doc\/leon2-1.0.24-xst.pdf"},{"key":"70_CR6","unstructured":"Gladman, B.: Implementations of AES (Rijndael) in C\/C++, Available online at http:\/\/fp.gladman.plus.com\/cryptographytechnology\/rijndael\/index.htm"},{"key":"70_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-28632-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Savas, E.: Instruction Set Extensions for Fast arithmetic in Finite Fields GF(p) and GF(2 m ). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 133\u2013147. Springer, Heidelberg (2004)"},{"key":"70_CR8","unstructured":"Gro\u00dfsch\u00e4dl, J., Tillich, S.: Instruction Set Extensions for Cryptography (ISEC). Available online isec\/, at http:\/\/www.iaik.at\/research\/vlsi\/01projects\/01"},{"issue":"6","key":"70_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/40.977759","volume":"21","author":"R.B. Lee","year":"2001","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Efficient permutation instructions for fast software cryptography. IEEE Micro\u00a021(6), 56\u201369 (2001)","journal-title":"IEEE Micro"},{"issue":"4","key":"70_CR10","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/TC.2003.1190589","volume":"52","author":"S. Mangard","year":"2003","unstructured":"Mangard, S., Aigner, M., Dominikus, S.: A highly regular and scalable AES hardware architecture. IEEE Transactions on Computers\u00a052(4), 483\u2013491 (2003)","journal-title":"IEEE Transactions on Computers"},{"issue":"7","key":"70_CR11","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TVLSI.2004.830936","volume":"12","author":"S. Morioka","year":"2004","unstructured":"Morioka, S., Satoh, A.: A 10-Gbps full-AES crypto design with a twisted BDD S-box architecture. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a012(7), 686\u2013691 (2004)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"70_CR12","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001)"},{"key":"70_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/11502760_28","volume-title":"Fast Software Encryption","author":"E. Oswald","year":"2005","unstructured":"Oswald, E., Mangard, S., Pramstaller, N.: A Side-Channel Analysis Resistant Description of the AES S-box. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 413\u2013423. Springer, Heidelberg (2005)"},{"key":"70_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-540-45238-6_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"K. Tiri","year":"2003","unstructured":"Tiri, K., Verbauwhede, I.: Securing encryption algorithms against DPA at the logic level: Next generation smart card technology. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 137\u2013151. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11424826_70.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:54:44Z","timestamp":1605642884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11424826_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258612","9783540320449"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11424826_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}