{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:49:07Z","timestamp":1761896947351},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_15","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"271-290","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of High Throughput XTS-SM4 Module for Data Storage Devices"],"prefix":"10.1007","author":[{"given":"Liang","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Changting","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongbin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Cunqing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2598-0_69","volume-title":"IT Convergence and Services","author":"I Abbasi","year":"2011","unstructured":"Abbasi, I., Afzal, M.: A compact S-Box design for SMS4 block cipher. In: Park, J., Arabnia, H., Chang, H.B., Shon, T. (eds.) IT Convergence and Services, vol. 107. Springer, Dordrecht (2011)"},{"issue":"6","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-016-1945-y","volume":"73","author":"T Bhatia","year":"2017","unstructured":"Bhatia, T., Verma, A.K.: Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J. Supercomput. 73(6), 1\u201374 (2017)","journal-title":"J. Supercomput."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Canright, D.: A very compact Rijndael S-box. Tech. Rep. Collect. (Jan), 4\u20135 (2005)","DOI":"10.21236\/ADA434781"},{"key":"15_CR4","unstructured":"Chinese Commercial Cryptography Administration Office: Sepecification of SM4 block cipher algorithm (2010). http:\/\/dacas.cn\/sharedimages\/ARTICLES\/SMAlgorithms\/SM4.pdf"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Dworkin, M.J.: SP 800\u201338E. Recommendation for block cipher modes of operation: the XTS-AES mode for confidentiality on storage devices. National Institute of Standards & Technology (2010)","DOI":"10.6028\/NIST.SP.800-38e"},{"key":"15_CR6","unstructured":"IP Cores. Inc.: XTS3 family of cores, IEEE P1619 XTS-AES cores. http:\/\/www.ipcores.com\/xts_aes_p1619_ip_core.htm"},{"key":"15_CR7","unstructured":"James, P.: Securing data at rest. In: Australian Information Security Management Conference, pp. 94\u2013103 (2004)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Jin, Y., Shen, H., You, R.: Implementation of SMS4 block cipher on FPGA. In: International Conference on Communications and Networking in China, pp. 1\u20134 (2006)","DOI":"10.1109\/CHINACOM.2006.344900"},{"key":"15_CR9","unstructured":"Lv, S., Su, B., Wang, P., Mao, Y., Huo, L.: Overview of SM4 algorithm. J. Inf. Secur. Res. 995\u20131007 (2016). http:\/\/ris.sic.gov.cn\/CN\/Y2016\/V2\/I11\/995"},{"key":"15_CR10","unstructured":"1619\u20132007 - IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices. In: IEEE Approved Draft Std P1619\/d18, October, pp. c1\u201332 (2007)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30539-2_2"},{"key":"15_CR12","unstructured":"S Ahmed, M.N.: Efficient AES-XTS Pipelined Implementation on FPGA. http:\/\/sirsyeduniversity.edu.pk\/ssurj\/rj\/file\/article\/WSDDHXCVVN.pdf"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-60865-6_49","volume-title":"Fast Software Encryption","author":"B Schneier","year":"1996","unstructured":"Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121\u2013144. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-60865-6_49"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Sethi, K., Majumdar, A., Bera, P.: A novel implementation of parallel homomorphic encryption for secure data storage in cloud. In: International Conference on Cyber Security and Protection of Digital Services pp. 1\u20137 (2017)","DOI":"10.1109\/CyberSecPODS.2017.8074851"},{"key":"15_CR15","unstructured":"US Department of Commerce: NIST: Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode (NIST SP 800\u201338A)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, M., Shou, G., Hu, Y., Guo, Z.: High-speed architecture design and implementation for SMS4-GCM. In: International Conference on Communications and Mobile Computing, pp. 15\u201318 (2011)","DOI":"10.1109\/CMC.2011.66"},{"issue":"4","key":"15_CR17","first-page":"95","volume":"28","author":"LI Zi-Lei","year":"2011","unstructured":"Zi-Lei, L.I., Liu, Z.L., Huo, W.J., Zou, X.C.: A High-Throughput Hardware Implementation of XTS-AES Encryption Algorithm. Microelectronics & Computer 28(4), 95\u201390 (2011)","journal-title":"Microelectronics & Computer"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:02:44Z","timestamp":1573606964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}