{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:40:02Z","timestamp":1746452402366,"version":"3.40.4"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130385"},{"type":"electronic","value":"9783319130392"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13039-2_17","type":"book-chapter","created":{"date-parts":[[2014,10,24]],"date-time":"2014-10-24T19:36:19Z","timestamp":1414179379000},"page":"283-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["One Word\/Cycle HC-128 Accelerator via State-Splitting Optimization"],"prefix":"10.1007","author":[{"given":"Ayesha","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Prasanna","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,25]]},"reference":[{"key":"17_CR1","unstructured":"eSTREAM: The ECRYPT Stream Cipher Project. www.ecrypt.eu.org\/stream"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-12678-9_16","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"A Kircanski","year":"2010","unstructured":"Kircanski, A., Youssef, A.M.: Differential Fault Analysis of HC-128. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 261\u2013278. Springer, Heidelberg (2010)"},{"issue":"1\u20133","key":"17_CR3","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10623-010-9459-8","volume":"59","author":"S Maitra","year":"2011","unstructured":"Maitra, S., Paul, G., Raizada, S., Sen, S., Sengupta, R.: Some observations on HC-128. Designs, Codes and Cryptography 59(1\u20133), 231\u2013245 (2011)","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-25141-2_11","volume-title":"Advances in Information and Computer Security","author":"G Paul","year":"2011","unstructured":"Paul, G., Maitra, S., Raizada, S.: A Theoretical Analysis of the Structure of HC-128. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol. 7038, pp. 161\u2013177. Springer, Heidelberg (2011)"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10623-011-9550-9","volume":"63","author":"P Stankovski","year":"2012","unstructured":"Stankovski, P., Ruj, S., Hell, M., Johansson, T.: Improved distinguishers for HC-128. Designs, Codes and Cryptography 63(2), 225\u2013240 (2012)","journal-title":"Designs, Codes and Cryptography"},{"key":"17_CR6","unstructured":"Wu, H.: The Stream Cipher HC-128. www.ecrypt.eu.org\/stream\/hcp3.html"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Khalid, A., Maitra, S., Raizada, S.: Designing High-Throughput Hardware Accelerator for Stream Cipher HC-128. In: IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1448\u20131451 (2012)","DOI":"10.1109\/ISCAS.2012.6271518"},{"key":"17_CR8","unstructured":"Announcing development of a federal information processing standard for advanced encryption standard. National Institute of Standards and Technology, Docket No. 960924272\u20136272-01, RIN 0693-ZA13 (January 2, 1997). http:\/\/csrc.nist.gov\/archive\/aes\/pre-round1\/aes_9701.txt"},{"key":"17_CR9","unstructured":"Third Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. National Institute of Standards and Technology, NISTIR 7896 (November 2012). http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2012\/NIST.IR.7896.pdf"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Paul, G.: Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4. In: 20th International Conference on VLSI and System-on-Chip (VLSI-SoC), pp. 251\u2013254 (2012)","DOI":"10.1109\/VLSI-SoC.2012.6379039"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TC.2012.19","volume":"62","author":"S Sen Gupta","year":"2012","unstructured":"Sen Gupta, S., Chattopadhyay, A., Sinha, K., Maitra, S., Sinha, B.P.: High Performance Hardware Implementation for RC4 Stream Cipher. IEEE Transactions on Computers 62(4), 730\u2013743 (2012)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O.: Hardware Implementation of the RC4 stream Cipher. In: Proc. of 46th IEEE Midwest Symposium on Circuits & Systems, Cairo, Egypt, vol. 3, pp. 1363\u20131366 (2003)","DOI":"10.1109\/MWSCAS.2003.1562548"},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s12095-012-0074-6","volume":"5","author":"SS Gupta","year":"2013","unstructured":"Gupta, S.S., Chattopadhyay, A., Khalid, A.: Designing integrated accelerator for stream ciphers with structural similarities. Cryptography and Communications 5(1), 19\u201347 (2013)","journal-title":"Cryptography and Communications"},{"key":"17_CR14","unstructured":"Matthews Jr., D.P.: Methods and apparatus for accelerating ARC4 processing. US Patent Number 7403615. Morgan Hill, CA (July 2008). www.freepatentsonline.com\/7403615.html"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Henzen, L., Carbognani, F., Felber, N., Fichtner, W.: VLSI hardware evaluation of the stream ciphers Salsa20 and ChaCha, and the compression function Rumba. In: 2nd International Conference on Signals, Circuits and Systems, SCS 2008, pp. 1\u20135 (2008)","DOI":"10.1109\/ICSCS.2008.4746906"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Yan, J., Heys, H.M.: Hardware implementation of the Salsa20 and Phelix stream ciphers. In: Canadian Conference on Electrical and Computer Engineering, pp. 1125\u20131128 (2007)","DOI":"10.1109\/CCECE.2007.286"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-16342-5_17","volume-title":"Information Security and Cryptology","author":"D Stefan","year":"2010","unstructured":"Stefan, D.: Hardware framework for the Rabbit stream cipher. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 230\u2013247. Springer, Heidelberg (2010)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-68351-3_9","volume-title":"New Stream Cipher Designs","author":"C Berbain","year":"2008","unstructured":"Berbain, C., et al.: Sosemanuk, A fast software-oriented stream cipher. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 98\u2013118. Springer, Heidelberg (2008)"},{"key":"17_CR19","unstructured":"Good, T., Benaissa, M.: Hardware performance of eStream phase-III stream cipher candidates. In: Proc. of Workshop on the State of the Art of Stream Ciphers, SASC 2008, pp. 163\u2013173 (2008)"},{"key":"17_CR20","unstructured":"Grkaynak, F.K., Peter, L., Nico, B., Blattman, R., Goode, V., Marghitola, M., Kaeslin, H., Felber, N., Fichtner, W.: Hardware evaluation of eSTREAM candidates: Achterbahn, Grain, MICKEY, MOSQUITO, SFINKS, TRIVIUM, VEST, ZK-Crypt. eSTREAM, ECRYPT Stream Cipher Project, Report 2006\/015 (2006). www.ecrypt.eu.org\/stream"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-540-25937-4_15","volume-title":"Fast Software Encryption","author":"H Wu","year":"2004","unstructured":"Wu, H.: A New Stream Cipher HC-256. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 226\u2013244. Springer, Heidelberg (2004). The full version available at http:\/\/eprint.iacr.org\/2004\/092.pdf"},{"key":"17_CR22","unstructured":"Synopsys Processor Designer. www.synopsys.com\/Systems\/BlockDesign\/processorDev\/Pages\/default.aspx"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Meyr, H., Leupers, R.: LISA: A Uniform ADL for Embedded Processor Modelling, Implementation and Software Toolsuite Generation. In: Mishra, P., Dutt, N. (eds.) Processor Description Languages, pp. 95\u2013130. Morgan Kaufmann (2008)","DOI":"10.1016\/B978-012374287-2.50008-2"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Tran, T.H., Lanante, L., Nagao, Y., Kurosaki, M., Ochi, H.: Hardware Implementation of High Throughput RC4 Algorithm. In: Proc. IEEE ISCAS 2012, pp. 77\u201380 (2012)","DOI":"10.1109\/ISCAS.2012.6272151"},{"key":"17_CR25","unstructured":"Faraday Memory Compiler. www.faraday-tech.com\/html\/Product\/IPProduct\/LibraryMemoryCompiler\/index.htm"},{"key":"17_CR26","unstructured":"eBACS: ECRYPT Benchmarking of Cryptographic Systems. http:\/\/bench.cr.yp.to\/results-stream.html"},{"key":"17_CR27","unstructured":"eSTREAM Optimized Code HOWTO. www.ecrypt.eu.org\/stream\/perf\/#results"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Y., Qin, T.: The key and IV setup of the stream ciphers HC-256 and HC-128. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 430\u2013433 (2009)","DOI":"10.1109\/NSWCTC.2009.111"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology -- INDOCRYPT 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13039-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:14:32Z","timestamp":1746450872000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13039-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130385","9783319130392"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13039-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}