{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:02:05Z","timestamp":1769724125779,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319130385","type":"print"},{"value":"9783319130392","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13039-2_19","type":"book-chapter","created":{"date-parts":[[2014,10,24]],"date-time":"2014-10-24T19:36:19Z","timestamp":1414179379000},"page":"322-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go?"],"prefix":"10.1007","author":[{"given":"Lejla","family":"Batina","sequence":"first","affiliation":[]},{"given":"Domagoj","family":"Jakobovic","sequence":"additional","affiliation":[]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]},{"given":"Stjepan","family":"Picek","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"de la Piedra","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Sisejkovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,25]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/3-540-44709-1_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"V Fischer","year":"2001","unstructured":"Fischer, V., Drutarovsk\u00fd, M.: Two Methods of Rijndael Implementation in Reconfigurable Hardware. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 77\u201392. Springer, Heidelberg (2001)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A Satoh","year":"2001","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A compact rijndael hardware architecture with s-box optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-30574-3_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N Mentens","year":"2005","unstructured":"Mentens, N., Batina, L., Preneel, B., Verbauwhede, I.: A systematic evaluation of compact hardware implementations for the Rijndael S-BOX. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 323\u2013333. Springer, Heidelberg (2005)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact s-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441\u2013455. Springer, Heidelberg (2005)"},{"issue":"8","key":"19_CR5","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TVLSI.2005.853606","volume":"13","author":"V Fischer","year":"2005","unstructured":"Fischer, V., Drutarovsk\u00fd, M., Chodowiec, P., Gramain, F.: InvMixColumn decomposition and multilevel resource sharing in AES implementations. IEEE Trans. VLSI Syst. 13(8), 989\u2013992 (2005)","journal-title":"IEEE Trans. VLSI Syst."},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very Compact FPGA Implementation of the AES Algorithm. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 319\u2013333. Springer, Heidelberg (2003)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES sboxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 67\u201378. Springer, Heidelberg (2002)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"issue":"4","key":"19_CR9","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TC.2006.49","volume":"55","author":"A Hodjat","year":"2006","unstructured":"Hodjat, A., Verbauwhede, I.: Area-throughput trade-offs for fully pipelined 30 to 70 gbits\/s AES processors. IEEE Trans. Computers 55(4), 366\u2013372 (2006)","journal-title":"IEEE Trans. Computers"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, S., Sharma, V., Mahapatra, K.: Low latency VLSI architecture of S-box for AES encryption. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 694\u2013698 (March 2013)","DOI":"10.1109\/ICCPCT.2013.6528906"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Jhajharia, S., Mishra, S., Bali, S.: Public key cryptography using neural networks and genetic algorithms. In: Parashar, M., Zomaya, A.Y., Chen, J., Cao, J., Bouvry, P., Prasad, S.K. (eds.) IC3, pp. 137\u2013142. IEEE (2013)","DOI":"10.1109\/IC3.2013.6612177"},{"issue":"7\u20138","key":"19_CR12","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1007\/s00521-011-0799-8","volume":"22","author":"M Sokouti","year":"2013","unstructured":"Sokouti, M., Sokouti, B., Pashazadeh, S., Feizi-Derakhshi, M.R., Haghipour, S.: Genetic-based random key generator (GRKG): a new method for generating more-random keys for one-time pad cryptosystem. Neural Computing and Applications 22(7\u20138), 1667\u20131675 (2013)","journal-title":"Neural Computing and Applications"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Zarza, L., Pegueroles, J., Soriano, M., Mart\u00ednez, R.: Design of cryptographic protocols by means of genetic algorithms techniques. In: Malek, M., Fern\u00e1ndez-Medina, E., Hernando, J. (eds.) SECRYPT, pp. 316\u2013319. INSTICC Press (2006)","DOI":"10.5220\/0002102003160319"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/11552451_65","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"K Park","year":"2005","unstructured":"Park, K., Hong, C.: Cryptographic protocol design concept with genetic algorithms. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 483\u2013489. Springer, Heidelberg (2005)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-08302-5_16","volume-title":"Smart Card Research and Advanced Applications","author":"RB Carpi","year":"2014","unstructured":"Carpi, R.B., Picek, S., Batina, L., Menarini, F., Jakobovic, D., Golub, M.: Glitch it if you can: parameter search strategies for successful fault injection. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 236\u2013252. Springer, Heidelberg (2014)"},{"issue":"3","key":"19_CR16","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/BF03037656","volume":"23","author":"JA Clark","year":"2005","unstructured":"Clark, J.A., Jacob, J.L., Stepney, S.: The design of S-boxes by simulated annealing. New Generation Computing 23(3), 219\u2013231 (2005)","journal-title":"New Generation Computing"},{"key":"19_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2556315.2556319","volume-title":"Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014","author":"S Picek","year":"2014","unstructured":"Picek, S., Ege, B., Batina, L., Jakobovic, D., Chmielewski, L., Golub, M.: On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box. Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 13\u201318. ACM, New York (2014)"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Picek, S., Ege, B., Papagiannopoulos, K., Batina, L., Jakobovic, D.: Optimality and beyond: The case of 4x4 s-boxes. In: 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2014, Arlington, VA, USA, May 6-7, pp. 80\u201383 (2014)","DOI":"10.1109\/HST.2014.6855573"},{"key":"19_CR19","unstructured":"Faraday: Faraday Cell Library 0.13 $$\\mu $$m Standard Cell (2004)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. The MIT Press, Cambridge (1992)","DOI":"10.7551\/mitpress\/1090.001.0001"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, vol. 4, pp. 1942\u20131948 (November 1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"19_CR22","unstructured":"Yao, X.: Optimization by genetic annealing. In: Proc. of 2nd Australian Conf. on Neural Networks, pp. 94\u201397 (1991)"},{"issue":"1","key":"19_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert, D.H., Macready, W.G.: No Free Lunch Theorems for Optimization. IEEE Transactions on Evolutionary Computation 1(1), 67\u201382 (1997)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"19_CR24","unstructured":"Syswerda, G.: Uniform crossover in genetic algorithms. In: Proceedings of the 3rd International Conference on Genetic Algorithms, pp. 2\u20139. Morgan Kaufmann Publishers Inc., San Francisco (1989)"},{"key":"19_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to Evolutionary Computing","author":"AE Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Heidelberg (2003)"},{"key":"19_CR26","unstructured":"Knuth, D.E.: The Art of Computer Programming. Fundamental Algorithms, 3rd edn., vol. 1. Addison Wesley Longman Publishing Co. Inc., Redwood City (1997)"},{"key":"19_CR27","unstructured":"Weise, T.: Global Optimization Algorithms Theory and Application (2009)"},{"key":"19_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03315-9","volume-title":"Genetic algorithms + data structures = evolution programs","author":"Z Michalewicz","year":"1996","unstructured":"Michalewicz, Z.: Genetic algorithms + data structures = evolution programs, 3rd edn. Springer, London (1996)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology -- INDOCRYPT 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13039-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:14:27Z","timestamp":1746450867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13039-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130385","9783319130392"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13039-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}