{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:47:06Z","timestamp":1768740426350,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031505935","type":"print"},{"value":"9783031505942","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50594-2_12","type":"book-chapter","created":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T09:04:34Z","timestamp":1704963874000},"page":"229-248","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for\u00a06G: Design and\u00a0Implementation"],"prefix":"10.1007","author":[{"given":"Ravi","family":"Anand","sequence":"first","affiliation":[]},{"given":"Subhadeep","family":"Banik","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Caforio","sequence":"additional","affiliation":[]},{"given":"Kazuhide","family":"Fukushima","sequence":"additional","affiliation":[]},{"given":"Takanori","family":"Isobe","sequence":"additional","affiliation":[]},{"given":"Shisaku","family":"Kiyomoto","sequence":"additional","affiliation":[]},{"given":"Fukang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuto","family":"Nakano","sequence":"additional","affiliation":[]},{"given":"Kosei","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Nobuyuki","family":"Takeuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,12]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s13389-020-00251-6","volume":"12","author":"A Caforio","year":"2022","unstructured":"Caforio, A., Balli, F., Banik, S.: Melting SNOW-V: improved lightweight architectures. J. Cryptogr. Eng. 12(1), 53\u201373 (2022)","journal-title":"J. Cryptogr. Eng."},{"issue":"4","key":"12_CR2","first-page":"348","volume":"2019","author":"M Eichlseder","year":"2019","unstructured":"Eichlseder, M., Nageler, M., Primas, R.: Analyzing the linear keystream biases in AEGIS. IACR Trans. Symmetric Cryptol. 2019(4), 348\u2013368 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"3","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2019.i3.1-42","volume":"2019","author":"P Ekdahl","year":"2019","unstructured":"Ekdahl, P., Johansson, T., Maximov, A., Yang, J.: A new SNOW stream cipher called SNOW-V. IACR Trans. Symmetric Cryptol. 2019(3), 1\u201342 (2019)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-29360-8_3","volume-title":"Post-Quantum Cryptography","author":"M Grassl","year":"2016","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying Grover\u2019s algorithm to AES: quantum resource estimates. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 29\u201343. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_3"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212\u2013219 (1996)","DOI":"10.1145\/237814.237866"},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.46586\/tosc.v2022.i3.123-151","volume":"2022","author":"A Hosoyamada","year":"2022","unstructured":"Hosoyamada, A., et al.: Cryptanalysis of Rocca and feasibility of its security claim. IACR Trans. Symmetric Cryptol. 2022(3), 123\u2013151 (2022)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-662-52993-5_17","volume-title":"Fast Software Encryption","author":"J Jean","year":"2016","unstructured":"Jean, J., Nikoli\u0107, I.: Efficient design strategies based on the AES round function. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 334\u2013353. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-52993-5_17"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"71","DOI":"10.46586\/tosc.v2016.i1.71-94","volume":"2016","author":"M Kaplan","year":"2016","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmetric Cryptol. 2016(1), 71\u201394 (2016)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"12_CR9","unstructured":"Latva-aho, M., Lepp\u00e4nen, K.: Key drivers and research challenges for 6G ubiquitous wireless intelligence (2019)"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"84","DOI":"10.46586\/tosc.v2019.i1.84-117","volume":"2019","author":"S Li","year":"2019","unstructured":"Li, S., Sun, S., Li, C., Wei, Z., Lei, H.: Constructing low-latency involutory MDS matrices with lightweight circuits. IACR Trans. Symm. Cryptol. 2019(1), 84\u2013117 (2019)","journal-title":"IACR Trans. Symm. Cryptol."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Liu, F., Isobe, T., Meier, W., Sakamoto, K.: Weak keys in reduced aegis and Tiaoxin. Cryptology ePrint Archive, Report 2021\/187 (2021). https:\/\/eprint.iacr.org\/2021\/187","DOI":"10.46586\/tosc.v2021.i2.104-139"},{"key":"12_CR12","unstructured":"Maximov, A.: AES MixColumn with 92 XOR gates. Cryptology ePrint Archive, Report 2019\/833 (2019). https:\/\/eprint.iacr.org\/2019\/833"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Maximov, A., Ekdahl, P.: New circuit minimization techniques for smaller and faster AES SBoxes. IACR TCHES 2019(4), 91\u2013125 (2019). https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8346","DOI":"10.46586\/tches.v2019.i4.91-125"},{"key":"12_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-30556-9_27","volume-title":"INDOCRYPT 2004","author":"A David","year":"2004","unstructured":"David, A.: McGrew and John Viega. The security and performance of the Galois\/counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343\u2013355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30556-9_27"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Minaud, B.: Linear biases in AEGIS keystream. In: Joux, A., Youssef, A.M., editors, Selected Areas in Cryptography - SAC 2014\u201321st International Conference, Montreal, QC, Canada, August 14\u201315, 2014, Revised Selected Papers, volume 8781 of Lecture Notes in Computer Science, pp. 290\u2013305. Springer (2014)","DOI":"10.1007\/978-3-319-13051-4_18"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-34704-7_5","volume-title":"Information Security and Cryptology","author":"N Mouha","year":"2012","unstructured":"Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57\u201376. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34704-7_5"},{"key":"12_CR17","unstructured":"Nikoli\u0107, I.: Tiaoxin-346: version 2.0. CAESAR Competition (2014)"},{"key":"12_CR18","unstructured":"Real-Time and Embedded Sys Lab. uops.info. Official webpage. https:\/\/www.uops.info\/"},{"issue":"2","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2021.i2.1-30","volume":"2021","author":"K Sakamoto","year":"2021","unstructured":"Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient AES-based encryption scheme for beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2), 1\u201330 (2021)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient AES-based encryption scheme for beyond 5G (full version). IACR Cryptol. ePrint Arch., 116 (2022)","DOI":"10.46586\/tosc.v2021.i2.1-30"},{"key":"12_CR21","unstructured":"The ZUC design team. The ZUC-256 Stream Cipher. http:\/\/www.is.cas.cn\/ztzl2016\/zouchongzhi\/201801\/W020180126529970733243.pdf (2018)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-662-43414-7_10","volume-title":"Selected Areas in Cryptography \u2013 SAC 2013","author":"Hongjun Wu","year":"2014","unstructured":"Wu, Hongjun, Preneel, Bart: AEGIS: a fast authenticated encryption algorithm. In: Lange, Tanja, Lauter, Kristin, Lison\u011bk, Petr (eds.) SAC 2013. LNCS, vol. 8282, pp. 185\u2013201. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43414-7_10"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50594-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T09:09:04Z","timestamp":1704964144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50594-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505935","9783031505942"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50594-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}