{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:31:53Z","timestamp":1761647513772},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540425212"},{"type":"electronic","value":"9783540447092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44709-1_16","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T10:04:18Z","timestamp":1186826658000},"page":"171-184","source":"Crossref","is-referenced-by-count":108,"title":["Efficient Rijndael Encryption Implementation with Composite Field Arithmetic"],"prefix":"10.1007","author":[{"given":"Atri","family":"Rudra","sequence":"first","affiliation":[]},{"given":"Pradeep K.","family":"Dubey","sequence":"additional","affiliation":[]},{"given":"Charanjit S.","family":"Jutla","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Josyula R.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Rohatgi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,20]]},"reference":[{"key":"16_CR1","unstructured":"Kazumaro Aoki and Helger Lipmaa, \u201dFast Implementations of AES candidates\u201d. In Proc.Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Eli Biham, \u201cA Fast New DES Implementation in Software\u201d. In Proc. Fast Software Encryption 4,1997. http:\/\/www.cs.technion.ac.il\/~biham\/publications.html","DOI":"10.1007\/BFb0052329"},{"key":"16_CR3","unstructured":"Joan Daemen and Vincent Rijmen, \u201cAES Proposal: Rijndael\u201d. http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael ."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Keith Diefendorff, Pradeep K. Dubey, Ron Hochsprung and Hunter Scales, \u201cAltiVec Extension to PowerPC Accelerates Media Processing\u201d. In IEEE Micro, March-April 2000, pp85\u201395.","DOI":"10.1109\/40.848475"},{"key":"16_CR5","unstructured":"AJ Elbirt, W Yip, B Chetwynd and C Paar, \u201cAn FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists\u201d. In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR6","unstructured":"Tetsuya Ichikawa, Tomomi Kasuya and Mitsuru Matsui, \u201cHardware Evaluation of the AES Finalists\u201d. In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR7","unstructured":"Charanjit S. Jutla, \u201cEncryption Modes with Almost Free Message Integrity\u201d. Manuscript."},{"key":"16_CR8","volume-title":"Introduction to finite fields and their applications","author":"R. Lidl","year":"1986","unstructured":"Rudolf Lidl and Harald Niederreiter, Introduction to finite fields and their applications. Cambridge University Press, Cambridge, Ma., 1986."},{"key":"16_CR9","series-title":"PhD Thesis","volume-title":"VLSI Architectures for Computations in Galois Fields","author":"E. D. Mastrovito","year":"1991","unstructured":"Edoardo D. Mastrovito, VLSI Architectures for Computations in Galois Fields. PhD Thesis, Dept. of EE, Link\u00f6ping University, Link\u00f6ping, Sweden 1991."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Christof Paar and Pedro Soria-Rodriguez, \u201cFast Arithmetic Architectures for Public-Key Algorithms over Galois Fields GF((2n)n)\u201d. In Proc. EUROCRYPT\u2019 97.","DOI":"10.1007\/3-540-69053-0_25"},{"key":"16_CR11","series-title":"PhD Thesis","volume-title":"Efficient VLSI Architectures for Bit-Parallel Computations in Galois Fields","author":"Chirstof Paar","year":"1994","unstructured":"Chirstof Paar, Efficient VLSI Architectures for Bit-Parallel Computations in Galois Fields. PhD Thesis, Institute for Experimental Mathematics, University of Essen, Germany, 1994. http:\/\/www.ece.wpi.edu\/Research\/crypt\/theses\/paarthesispage.html ."},{"key":"16_CR12","unstructured":"Bruce Schneier, Applied Cryptography, John Wiley and Sons, 1996."},{"key":"16_CR13","unstructured":"Bryan Weeks, Mark Bean, Tom Rozylowicz and Chris Ficke, \u201cHardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithm\u201d. In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR14","unstructured":"Richard Weiss and Nathan Binkert \u201cA comparison of AES candidates on the Alpha 21264\u201d. In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR15","unstructured":"Thomas J. Wollinger, Min Wang, Jorge Guajardo and Christof Paar, \u201cHow Well Are High-End DSPs suited for AES Algorithms?\u201d In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR16","unstructured":"John Worley, Bill Worley, Tom Christian and Christopher Worley, \u201cAES Finalists on PA-RISC and IA-64: Implementations & Performance. In Proc. Third AES Candidate Conference, April 13\u201314, 2000. http:\/\/csrc.nist.gov\/encryption\/aes\/round2\/conf3\/aes3papers.html"},{"key":"16_CR17","unstructured":"\u201cAmerican National Standard for Information Systems \u2014 Data Encryption Algorithm \u2014 Modes of Operation\u201d. ANSI X3.106, American National Standards Institute, 1983."},{"key":"16_CR18","unstructured":"\u201cInformation processing \u2014 Modes of operation for a 64-bit block cipher algorithm\u201d. ISO 8372, International Organisation for Standardisation, Geneva, Switzerland, 1987."},{"key":"16_CR19","unstructured":"\u201cDES modes of operation\u201d. NBS FIPS PUB 81, National Bureau of Standards, U.S. Department of Commerce, 1980."},{"key":"16_CR20","unstructured":"http:\/\/www.nist.gov\/publicaffairs\/releases\/g00-176.htm , US Commerce Department Press Release."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2014 CHES 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44709-1_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:25:07Z","timestamp":1556738707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44709-1_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425212","9783540447092"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-44709-1_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}