{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T14:24:15Z","timestamp":1743776655498},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_12","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"164-181","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hardware Design and Analysis of Block Cipher Components"],"prefix":"10.1007","author":[{"given":"Lu","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Howard M.","family":"Heys","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"C.E. Shannon, \u201cCommunication Theory of Secrecy Systems\u201d, Bell System Technical Journal, vol. 28, pp. 656\u2013715, 1949. 164","journal-title":"Bell System Technical Journal"},{"key":"12_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology-CRYPTO\u2019 90","author":"E. Biham","year":"1991","unstructured":"E. Biham and A. Shamir, \u201cDifferential cryptanalysis of DES-like cryptosystems\u201d, Advances in Cryptology-CRYPTO\u2019 90, Lecture Notes in Computer Science 537, pp. 2\u201321. Springer-Verlag, 1991. 164, 167"},{"key":"12_CR3","series-title":"Lect Notes Comput Sci","first-page":"386","volume-title":"Advances in Cryptology-Eurocrypt\u2019 93","author":"M. Matsui","year":"1993","unstructured":"M. Matsui, \u201cLinear Cryptanalysis Method for DES Cipher\u201d, Advances in Cryptology-Eurocrypt\u2019 93, Lecture Notes in Computer Science 765, Springer-Verlag, pp. 386\u2013397, 1993. 164, 167"},{"key":"12_CR4","unstructured":"J. Daemen and V. Rijmen, \u201cAES Proposal: Rijndael\u201d, Advanced Encryption Standard, available on: \n                    http:\/\/csrc.nist.gov\/encryption\/aes\/rijndael\n                    \n                  . 164, 165, 171, 174, 176"},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/3-540-44983-3_6","volume-title":"The Block Cipher Hierocrypt","author":"K. Ohkuma","year":"2001","unstructured":"K. Ohkuma, H. Muratani, F. Sano, and S. Kawamura, \u201cThe Block Cipher Hierocrypt\u201d, Workshop on Selected Areas in Cryptography-SAC 2000, Lecture Notes in Computer Science 2012, Springer-Verlag, pp. 72\u201388, 2001. 164, 171, 174"},{"key":"12_CR6","unstructured":"P. Barreto and V. Rijmen, \u201cThe Anubis Block Cipher\u201d, NESSIE Algorithm Submission, 2000, available on: \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\n                    \n                  . 164, 171"},{"key":"12_CR7","unstructured":"P. Barreto and V. Rijmen, \u201cThe Khazad Legacy-Level Block Cipher\u201d, NESSIE Algorithm Submission, 2000, available on: \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\n                    \n                  . 164, 171"},{"key":"12_CR8","unstructured":"A. Youssef, S. Mister, and S. Tavares, \u201cOn the Design of Linear Transformations for Substitution-Permutation Encryption Networks\u201d, Workshop on Selected Areas in Cryptography-SAC\u2019 97, Ottawa, 1997. 164, 171"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita, \u201cCamellia: a 128-bit Block Cipher Suitable for Multiple Platforms\u201d, NESSIE Algorithm Submission, 2000, available on: \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\n                    \n                  . 166, 174","DOI":"10.1007\/3-540-44983-3_4"},{"key":"12_CR10","unstructured":"J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback, \u201cReport on the Development of the Advanced Encryption Standard (AES)\u201d, Report on the AES Selection from U. S. National Institute of Standardsand Technology (NIST), available on: \n                    http:\/\/csrc.nist.gov\/encryption\/aes\n                    \n                  . 166"},{"key":"12_CR11","series-title":"Lect Notes Comput Sci","first-page":"99","volume-title":"The Cipher SHARK","author":"V. Rijmen","year":"1997","unstructured":"V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win, \u201cThe Cipher SHARK\u201d, Workshop on Fast Software Encryption-FSE\u2019 96, Lecture Notes in Computer Science 1039, Springer-Verlag, pp. 99\u2013112, 1997. 166, 171"},{"key":"12_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/3-540-51083-4_67","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes-AAECC-6","author":"E.D. Mastrovito","year":"1989","unstructured":"E.D. Mastrovito, \u201cVLSI Design for Multiplication over Finite Fields GF(2m)\u201d, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes-AAECC-6, Lecture Notes in Computer Science 357, pp. 297\u2013309, 1989. 167, 177, 178"},{"key":"12_CR13","unstructured":"C. Paar, \u201cEfficient VLSI Architectures for Bit-Parallel Computation in Galois Fields\u201d, PhD Thesis, Institute for Experimental Mathematics, University of Essen, Germany, 1994. 167, 170, 177, 178, 181"},{"key":"12_CR14","series-title":"Lect Notes Comput Sci","first-page":"54","volume-title":"The Block Cipher Square","author":"J. Daemen","year":"1997","unstructured":"J. Daemen, L.R. Knudsen, and V. Rijmen, \u201cThe Block Cipher Square\u201d, Workshop on Fast Software Encryption-FSE\u2019 97, Lecture Notes in Computer Science 1267, Springer-Verlag, pp. 54\u201368, 1997. 168, 171"},{"key":"12_CR15","unstructured":"F. J. MacWilliams and N. J.A. Sloane, The Theory of Error-Correcting Codes, North-Holland, Amsterdam, 1977. 168, 169"},{"key":"12_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"A Fast New DES Implementation in Software","author":"E. Biham","year":"1997","unstructured":"E. Biham, \u201cA Fast New DES Implementation in Software\u201d, Workshop on Fast Software Encryption-FSE\u2019 97, Lecture Notes in Computer Science 1267, Springer-Verlag, pp. 260\u2013272, 1997. 168, 175, 178"},{"key":"12_CR17","unstructured":"R. Anderson, E. Biham, and L. Knudsen, \u201cSerpent: a Proposal for the Advanced Encryption Standard\u201d, AES Algorithm Submission, available on: \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/serpent.html\n                    \n                  . 169"},{"key":"12_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-44709-1_6","volume-title":"Architectural Optimization for a 1.82Gbits\/sec VLSI Implementation of the AES Rijndael algorithm","author":"H. Kuo","year":"2001","unstructured":"H. Kuo and I. Verbauwhede, \u201cArchitectural Optimization for a 1.82Gbits\/sec VLSI Implementation of the AES Rijndael algorithm\u201d, Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, Lecture Notes in Computer Science 2162, Springer-Verlag, pp. 51\u201364, 2001. 176"},{"key":"12_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-44709-1_16","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2001","author":"A. Rudra","year":"2001","unstructured":"A. Rudra, P.K. Dubey, C. S. Jutla, V. Kumar, J.R. Rao, and P. Rohatgi, \u201cEffcient Rijndael Encryption Implementation with Composite Field Arithmetic\u201d, Cryptographic Hardware and Embedded Systems-CHES 2001, Lecture Notes in Computer Science 2162, Springer-Verlag, pp. 171\u2013184, 2001. 176, 177, 178"},{"key":"12_CR20","unstructured":"A. Rudra, Personal Communication. 176, 177, 178"},{"key":"12_CR21","unstructured":"V. Rijmen, \u201cEfficient Implementation of the Rijndael S-box\u201d, available on: \n                    http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\n                    \n                  . 177"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:45:12Z","timestamp":1558273512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}