{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:26:35Z","timestamp":1742927195551,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_9","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"137-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["High Throughput in Slices: The Case of PRESENT, PRINCE and KATAN64 Ciphers"],"prefix":"10.1007","author":[{"given":"Kostas","family":"Papapagiannopoulos","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"9_CR1","unstructured":"Avr, AES: The AES block cipher on AVR controllers. http:\/\/point-at-infinity.org\/avraes\/"},{"key":"9_CR2","unstructured":"Circuit minimization results obtained at Yale University. http:\/\/cs-www.cs.yale.edu\/homes\/peralta\/CircuitStuff\/CMT.html. (Accessed 15 November 2013)"},{"key":"9_CR3","unstructured":"ISO\/IEC 29192\u20132:2011, Information technology - Security techniques - Lightweight cryptography - Part 2: Block ciphers (2011)"},{"key":"9_CR4","unstructured":"Abed, F., Forler, C., List, E., Lucks, S., Wenzel, J.: Biclique cryptanalysis of the PRESENT, LED and KLEIN. IACR Cryptol. ePrint Arch., 591 (2012). http:\/\/eprint.iacr.org\/2012\/591.pdf. (Accessed 18 November 2013)"},{"key":"9_CR5","unstructured":"Aria, S., Eisenbarth, T.: AVRprince - An Efficient Implementation of PRINCE for 8-bit Microprocessors. http:\/\/users.wpi.edu\/teisenbarth\/pdf\/avrPRINCEv01.pdf."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Aumasson, J-P., Henzen, L., Meier, W., Naya-Plasencia, M.: Quark: A lightweight hash. J. Cryptol. 26(2), 313\u2013339 (2013). https:\/\/131002.net\/quark\/quark_full.pdf. (Accessed 18 November 2013)","DOI":"10.1007\/s00145-012-9125-6"},{"key":"9_CR7","unstructured":"Babbage, S., Dodd, M.: The stream cipher MICKEY 2.0, ECRYPT stream cipher (2006). http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/mickey\/mickey_p3.pdf. (Accessed 18 November 2013)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 260\u2013272. Springer, Heidelberg (1997). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?"},{"key":"9_CR9","unstructured":"Bishop, M.: An application of a fast data encryption standard implementation. Comput. Syst. 1(3): 221\u2013254 (1988). http:\/\/www.cs.dartmouth.edu\/reports\/TR88-138.pdf. (Accessed 18 November 2013)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/978-3-642-23951-9_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312\u2013325. Springer, Heidelberg (2011). http:\/\/homes.esat.kuleuven.be\/abogdano\/papers\/spongent_ches11.pdf"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). http:\/\/homes.esat.kuleuven.be\/abogdano\/papers\/present_ches07.pdf"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-540-85053-3_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283\u2013299. Springer, Heidelberg (2008). http:\/\/www.iacr.org\/archive\/ches2008\/51540279\/51540279.pdf"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7\u0131n, T.: PRINCE \u2013 a low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208\u2013225. Springer, Heidelberg (2012). http:\/\/eprint.iacr.org\/2012\/529.pdf"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-13193-6_16","volume-title":"Experimental Algorithms","author":"J Boyar","year":"2010","unstructured":"Boyar, J., Peralta, R.: A new combinational logic minimization technique with applications to cryptology. In: Festa, P. (ed.) SEA 2010. LNCS, vol. 6049, pp. 178\u2013189. Springer, Heidelberg (2010). http:\/\/eprint.iacr.org\/2009\/191.pdf"},{"key":"9_CR15","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-642-30436-1_24","volume-title":"Information Security and Privacy Research","author":"J Boyar","year":"2012","unstructured":"Boyar, J., Peralta, R.: A small depth-16 circuit for the AES S-box. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 287\u2013298. Springer, Heidelberg (2012). http:\/\/eprint.iacr.org\/2011\/332.pdf"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C De Canni\u00e8re","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009). http:\/\/www.cs.technion.ac.il\/orrd\/KATAN\/CHES2009.pdf"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-540-68351-3_18","volume-title":"New Stream Cipher Designs","author":"C De Canni\u00e8re","year":"2008","unstructured":"De Canni\u00e8re, C., Preneel, B.: Trivium. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 244\u2013266. Springer, Heidelberg (2008). http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/trivium\/trivium_p3.pdf"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-642-00862-7_13","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B Collard","year":"2009","unstructured":"Collard, B., Standaert, F.-X.: A statistical saturation attack against the block cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 195\u2013210. Springer, Heidelberg (2009)"},{"key":"9_CR19","unstructured":"Courtois, N., Hulme, D., Mourouzis, T.: Solving circuit optimisation problems in cryptography and cryptanalysis. IACR Cryptol. ePrint Arch. 2011:475 (2011). http:\/\/www.ima.org.uk\/_db\/_documents\/Courtois.pdf. (Accessed 18 November 2013)"},{"key":"9_CR20","unstructured":"Atmel datasheet. Atmel 8-bit AVR microcontroller datasheet. http:\/\/tinyurl.com\/klld65e. (Accessed 18 November 2013)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in attiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012). http:\/\/perso.uclouvain.be\/fstandae\/PUBLIS\/108.pdf"},{"key":"9_CR22","unstructured":"Eisenbarth, T., Kasper, T., Paar, C., Indesteege, S.: Encyclopedia of Cryptography and Security, 2nd edn. Springer (2011)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Flynn, M.J.: Some computer organizations and their effectiveness. IEEE Trans. Comput. C-21(9): 948\u2013960, September (1972)","DOI":"10.1109\/TC.1972.5009071"},{"key":"9_CR24","unstructured":"Gomathisankaran, M., Lee, R.B.: Maya: a novel block encryption function (2009). http:\/\/palms.princeton.edu\/system\/files\/maya.pdf. (Accessed 18 November 2013)"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"RFID","author":"Z Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1\u201318. Springer, Heidelberg (2012). http:\/\/doc.utwente.nl\/73129\/1\/The_KLEIN_Block_Cipher.pdf"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The PHOTON family of lightweight. In: Rogaway, p (ed.) Advances in Cryptology \u2013 CRYPTO 2011. LNCS, vol. 6841, pp. 222\u2013239. Springer, Heidelberg (2011). http:\/\/www.ecrypt.eu.org\/hash2011\/proceedings\/hash2011_04.pdf"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). http:\/\/eprint.iacr.org\/2012\/600.pdf"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wireless Mobile Comput. 2, 86\u201393 (2007). http:\/\/www.ecrypt.eu.org\/stream\/ciphers\/grain\/grain.pdf. (Accessed 18 November 2013)","DOI":"10.1504\/IJWMC.2007.013798"},{"key":"9_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/11615798","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S.H., Lim, J.-I., Lee, S.-J., Koo, B.-S., Lee, C.-H., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J.-S., Chee, S.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006). http:\/\/www.iacr.org\/cryptodb\/archive\/2006\/CHES\/04\/04.pdf"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"E K\u00e4sper","year":"2009","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 1\u201317. Springer, Heidelberg (2009). http:\/\/eprint.iacr.org\/2009\/129"},{"key":"9_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-68697-5_20","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J Kilian","year":"1996","unstructured":"Kilian, J., Rogaway, P.: How to protect DES against exhaustive eey search. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 252\u2013267. Springer, Heidelberg (1996). http:\/\/www.cs.ucdavis.edu\/rogaway\/papers\/desx.pdf"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-540-79263-5_12","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"R K\u00f6nighofer","year":"2008","unstructured":"K\u00f6nighofer, R.: A fast and cache-timing resistant implementation of the AES. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 187\u2013202. Springer, Heidelberg (2008). https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=47852"},{"key":"9_CR33","unstructured":"Leander, G.: Small scale variants of the block cipher present. IACR Cryptol. ePrint Arch. 2010:143 (2010). http:\/\/eprint.iacr.org\/2010\/143.pdf. (Accessed 18 November 2013)"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Lee, R.B., Shi, Z., Yang, X.: Cryptography efficient permutation instructions for fast software. IEEE Micro. 21, 56\u201369 (2001). http:\/\/palms.ee.princeton.edu\/PALMSopen\/lee01efficient.pdf. (Accessed 18 November 2013)","DOI":"10.1109\/40.977759"},{"key":"9_CR35","unstructured":"Hulme, D., Song, G., Albrecht, M., Courtois, N.T.: Bit-slice implementation of PRESENT in pure standard C. https:\/\/bitbucket.org\/malb\/research-snippets\/src. (Accessed 18 November 2013)"},{"key":"9_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-642-10433-6_5","volume-title":"Cryptology and Network Security","author":"J Nakahara Jr","year":"2009","unstructured":"Nakahara Jr., J., Sepehrdad, P., Zhang, B., Wang, M.: Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 58\u201375. Springer, Heidelberg (2009). http:\/\/www.ioc.ee\/tarmo\/tday-meintack\/zhang-slides.pdf"},{"key":"9_CR37","unstructured":"Papagiannopoulos, k.: Present with bld, bst instructions. https:\/\/github.com\/kostaspap88\/sc_res_present. (Accessed 18 November 2013)"},{"key":"9_CR38","unstructured":"Papagiannopoulos, K.: Speed-optimized implementation of PRESENT in AVR assembly (2013). https:\/\/github.com\/kostaspap88\/PRESENT_speed_implementation\/ (Accessed 18 November 2013)"},{"key":"9_CR39","series-title":"Lecture Notes in Computer Science","first-page":"159","volume-title":"Radio Frequency Identification","author":"K Papagiannopoulos","year":"2013","unstructured":"Papagiannopoulos, K., Verstegen, A.: Speed and size-optimized implementations of the PRESENT cipher for tiny AVR devices. In: Hutter, M., Schmidt, J.-M. (eds.) RFIDsec 2013. LNCS, vol. 8262, pp. 159\u2013173. Springer, Heidelberg (2013)"},{"key":"9_CR40","unstructured":"Pornin, T.: Automatic software optimization of block ciphers using bitslicing techniques.http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.48.3085&rep=rep1&type=pdf."},{"key":"9_CR41","unstructured":"Rauzy, P., Guilley, S., Najm, Z.: Formally proved security of assembly code against leakage. IACR Cryptol. ePrint Arch. 554 (2013). http:\/\/eprint.iacr.org\/2013\/554.pdf. (Accessed 18 November 2013)"},{"key":"9_CR42","unstructured":"Shi, Z., Lee, R.B.: Bit permutation instructions for accelerating software cryptography. In: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 138\u2013148, 2000. http:\/\/www.princeton.edu\/rblee\/PUpapers\/shi_asap00.pdf"},{"key":"9_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007). http:\/\/www.iacr.org\/archive\/fse2007\/45930182\/45930182.pdf"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T12:20:18Z","timestamp":1675254018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}