{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:58:29Z","timestamp":1774540709162,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540287919","type":"print"},{"value":"9783540319788","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11552055_2","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:50:33Z","timestamp":1127832633000},"page":"11-21","source":"Crossref","is-referenced-by-count":16,"title":["An Instruction Set Extension for Fast and Memory-Efficient AES Implementation"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Szekely","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/ISCAS.2003.1206212","volume-title":"Proceedings of the 36th IEEE International Symposium on Circuits and Systems (ISCAS 2003)","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Bircan, A., Breveglieri, L., Fragneto, P., Macchetti, M., Zaccaria, V.: About the performances of the Advanced Encryption Standard in embedded systems with cache memory. In: Proceedings of the 36th IEEE International Symposium on Circuits and Systems (ISCAS 2003), vol.\u00a05, pp. 145\u2013148. IEEE, Los Alamitos (2003)"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient software implementation of AES on 32-bit platforms. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 159\u2013171. Springer, Heidelberg (2003)"},{"key":"2_CR3","first-page":"586","volume-title":"Proceedings of the 6th International Conference on Information Technology: Coding and Computing (ITCC\u00a02005)","author":"G. Bertoni","year":"2005","unstructured":"Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES power attack based on induced cache miss and countermeasure. In: Proceedings of the 6th International Conference on Information Technology: Coding and Computing (ITCC\u00a02005), pp. 586\u2013591. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"2_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"2_CR6","unstructured":"Gaisler, J.: The LEON-2 Processor User\u2019s Manual (Version 1.0.24) (September 2004), Available for download at http:\/\/www.gaisler.com\/doc\/leon2-1.0.24-xst.pdf"},{"key":"2_CR7","unstructured":"Gladman, B.: Implementations of AES (Rijndael) in C\/C++ and assembler, Available for download at http:\/\/fp.gladman.plus.com\/cryptography_technology\/rijndael\/index.htm"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1109\/ASAP.2003.1212838","volume-title":"14th International Conference on Application-specific Systems, Architectures and Processors (ASAP\u00a02003)","author":"J. Irwin","year":"2003","unstructured":"Irwin, J., Page, D.: Using media processors for low-memory AES implementation. In: 14th International Conference on Application-specific Systems, Architectures and Processors (ASAP\u00a02003), pp. 144\u2013154. IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"6","key":"2_CR9","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/40.977759","volume":"21","author":"R.B. Lee","year":"2001","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Efficient permutation instructions for fast software cryptography. IEEE Micro.\u00a021(6), 56\u201369 (2001)","journal-title":"IEEE Micro"},{"key":"2_CR10","first-page":"152","volume-title":"Proceedings of the 18th IEEE Workshop on Signal Processing Systems (SIPS\u00a02004)","author":"K. Nadehara","year":"2004","unstructured":"Nadehara, K., Ikekawa, M., Kuroda, I.: Extended instructions for the AES cryptography and their efficient implementation. In: Proceedings of the 18th IEEE Workshop on Signal Processing Systems (SIPS\u00a02004), pp. 152\u2013157. IEEE, Los Alamitos (2004)"},{"key":"2_CR11","unstructured":"National Institute of Standards and Technology\u00a0(NIST). Advanced Encryption Standard (AES). Federal Information Processing Standards (FIPS) Publication 197 (November 2001)"},{"key":"2_CR12","unstructured":"Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, University of Bristol, Bristol, UK (2002)"},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/DAC.2002.1012728","volume-title":"Proceedings of the 39th Design Automation Conference (DAC\u00a02002)","author":"S. Ravi","year":"2002","unstructured":"Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: Proceedings of the 39th Design Automation Conference (DAC\u00a02002), pp. 777\u2013782. ACM Press, New York (2002)"},{"key":"2_CR14","first-page":"137","volume-title":"Proceedings fo the 18th International Parallel and Distributed Processing Symposium (IPDPS\u00a02004)","author":"P. Schaumont","year":"2004","unstructured":"Schaumont, P., Sakiyama, K., Hodjat, A., Verbauwhede, I.: Embedded software integration for coarse-grain reconfigurable systems. In: Proceedings fo the 18th International Parallel and Distributed Processing Symposium (IPDPS\u00a02004), pp. 137\u2013142. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"2_CR15","first-page":"220","volume-title":"Proceedings of the 38th Design Automation Conference (DAC\u00a02001)","author":"A. Sinha","year":"2001","unstructured":"Sinha, A., Chandrakasan, A.: Jouletrack \u2013 A web based tool for software energy profiling. In: Proceedings of the 38th Design Automation Conference (DAC\u00a02001), pp. 220\u2013225. ACM Press, New York (2001)"},{"key":"2_CR16","unstructured":"Tensilica Inc. Xtensa Application Specific Microprocessor Solutions. Overview handbook (2001), Available for download at http:\/\/www.tensilica.com"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/11424826_70","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2005","author":"S. Tillich","year":"2005","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: Accelerating AES using instruction set extensions for elliptic curve cryptography. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Lagan\u00e1, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol.\u00a03481, pp. 665\u2013675. Springer, Heidelberg (2005)"},{"key":"2_CR18","unstructured":"Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of block ciphers implemented on computers with cache. In: Proceedings of the 25th International Symposium on Information Theory and Its Applications (ISITA\u00a02002), SITA (2002)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES sboxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 67\u201378. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11552055_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T16:00:41Z","timestamp":1736006441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11552055_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287919","9783540319788"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11552055_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}