{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T16:46:58Z","timestamp":1748018818081,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319162942"},{"type":"electronic","value":"9783319162959"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16295-9_6","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T07:06:51Z","timestamp":1427612811000},"page":"104-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-Bit Embedded Applications"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Buhrow","sequence":"first","affiliation":[]},{"given":"Paul","family":"Riemer","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Shea","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Gilbert","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Daniel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,29]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-642-35999-6_22","volume-title":"Selected Areas in Cryptography","author":"T Suzaki","year":"2013","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339\u2013354. Springer, Heidelberg (2013)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-642-23951-9_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"6_CR6","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint Archive, June 2013. http:\/\/eprint.iacr.org\/2013\/404"},{"key":"6_CR7","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (AES) (2001). http:\/\/www.csrc.nist.gov\/publications\/ps\/ps197\/ps-197.pdf"},{"key":"6_CR8","unstructured":"MICAz wireless measurement system. http:\/\/www.memsic.com\/userfiles\/files\/Datasheets\/WSN\/micaz_datasheet-t.pdf"},{"key":"6_CR9","unstructured":"TelosB Platform. http:\/\/www.memsic.com\/userfiles\/files\/Datasheets\/WSN\/telosb_datasheet.pdf"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"YW Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(1), 65\u201393 (2006). ACM, New York","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Cazorla, M., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: Proceedings of the 10th International Conference on Security and Cryptography, SECRYPT 2013, pp. 543\u2013548. SciTePress, Reykjavk, Iceland, 29\u201331 July (2013)","DOI":"10.5220\/0004530905430548"},{"key":"6_CR13","unstructured":"BLOC project performance evaluations, June 2014. http:\/\/bloc.project.citi-lab.fr\/library.html"},{"key":"6_CR14","unstructured":"Guneysu, T.: Implementing AES on a bunch of processors. ECRYPT AES day, Bruges, Belgium (2012). https:\/\/www.cosic.esat.kuleuven.be\/ecrypt\/AESday\/slides\/AES-DAY-Gueneysu.pdf"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-33481-8_16","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"CPL Gouv\u00eaa","year":"2012","unstructured":"Gouv\u00eaa, C.P.L., L\u00f3pez, J.: High speed implementation of authenticated encryption for the MSP430X microcontroller. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 288\u2013304. Springer, Heidelberg (2012)"},{"key":"6_CR16","unstructured":"OpenSSL Cryptography and SSL\/TLS toolkit. http:\/\/www.openssl.org\/"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Didla, S., Ault, A., Bagchi, S.: Optimizing AES for embedded devices and wireless sensor networks. In: Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks and communities (TridenCOM), Article No. 4, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Brussels, Belgium (2008)","DOI":"10.4108\/tridentcom.2008.10409"},{"issue":"17","key":"6_CR18","doi-asserted-by":"publisher","first-page":"2967","DOI":"10.1016\/j.comnet.2010.05.011","volume":"54","author":"J Lee","year":"2010","unstructured":"Lee, J., Kapitanova, K., Son, S.H.: The price of security in wireless sensor networks. Comput. Netw. 54(17), 2967\u20132978 (2010). Elsevier, New York","journal-title":"Comput. Netw."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Hyncica, O., Kucera, P., Honzik, P., Fiedler, P.: Performance evaluation of symmetric cryptography in embedded systems. In: Proceedings of the 6th International Conference on Intelligent Data Acquistion and Advanced Computing Systems: Technology and Applications, pp. 277\u2013282, Prague (2011)","DOI":"10.1109\/IDAACS.2011.6072756"},{"key":"6_CR20","unstructured":"St. Denis, T., LibTomCrypt (source code). http:\/\/libtom.org\/?page=features&newsitems=5&whatfile=crypt"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-13858-4_5","volume-title":"Fast Software Encryption","author":"DA Osvik","year":"2010","unstructured":"Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75\u201393. Springer, Heidelberg (2010)"},{"key":"6_CR22","unstructured":"Poettering, B.: AVRAES: The AES block cipher on AVR controllers (2006). http:\/\/point-at-infinity.org\/avraes\/"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Abed, F., List, E., Wenzel, J., Lucks, S.: Differential cryptanalysis of round-reduced SIMON and SPECK. In: FSE 2014. LNCS (2014, to appear)","DOI":"10.1007\/978-3-662-46706-0_27"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: FSE 2014. LNCS (2014, to appear)","DOI":"10.1007\/978-3-662-46706-0_28"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-13051-4_9","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"I Dinur","year":"2014","unstructured":"Dinur, I.: Improved differential cryptanalysis of round-reduced speck. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 147\u2013164. Springer, Heidelberg (2014)"},{"key":"6_CR26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Berlin (2002)"},{"key":"6_CR27","unstructured":"Kretzschmar, U.: AES software support for encryption and decryption. MSP430 Systems. http:\/\/www.ti.com\/litv\/zip\/slaa397a"},{"key":"6_CR28","unstructured":"MSP430 Family, Instruction Set Summary. http:\/\/www.ti.com\/sc\/docs\/products\/micro\/msp430\/userguid\/as_5.pdf"},{"key":"6_CR29","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES (2005). http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf"},{"key":"6_CR30","unstructured":"Gouvea, C.: Authenticated Encryption on the MSP430 (source code). http:\/\/conradoplg.cryptoland.net\/software\/authenticated-encryption-for-the-msp430\/"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - LATINCRYPT 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16295-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:41:52Z","timestamp":1747852912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16295-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162942","9783319162959"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16295-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}