{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:10Z","timestamp":1725845650973},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_14","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"199-208","source":"Crossref","is-referenced-by-count":3,"title":["Faster 128-EEA3 and 128-EIA3 Software"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Avanzi","sequence":"first","affiliation":[]},{"given":"Billy Bob","family":"Brumley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"unstructured":"ETSI\/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3: 128-EEA3 & 128-EIA3 specification. Document 1, Version 1.7 (2011)","key":"14_CR1"},{"unstructured":"ETSI\/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3: ZUC specification. Document 2, Version 1.6 (2011)","key":"14_CR2"},{"doi-asserted-by":"crossref","unstructured":"Kitsos, P., Sklavos, N., Skodras, A.N.: An FPGA implementation of the ZUC stream cipher. In: DSD, pp. 814\u2013817. IEEE (2011)","key":"14_CR3","DOI":"10.1109\/DSD.2011.109"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-25243-3_17","volume-title":"Information and Communications Security","author":"L Wang","year":"2011","unstructured":"Wang, L., Jing, J., Liu, Z., Zhang, L., Pan, W.: Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 202\u2013215. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Traboulsi, S., Pohl, N., Hausner, J., Bilgic, A., Frascolla, V.: Power analysis and optimization of the ZUC stream cipher for LTE-advanced mobile terminals. In: Proceedings of the 3rd IEEE Latin American Symposium on Circuits and Systems (LASCAS 2012), pp. 1\u20134, Playa del Carmen, Mexico (2012)","key":"14_CR5","DOI":"10.1109\/LASCAS.2012.6180296"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.micpro.2012.09.007","volume":"37","author":"P Kitsos","year":"2013","unstructured":"Kitsos, P., Sklavos, N., Provelengios, G., Skodras, A.N.: FPGA-based performance analysis of stream ciphers ZUC, SNOW3G, Grain V1, Mickey V2, Trivium and E0. Microprocess. Microsyst. Embed. Hardware Des. 37, 235\u2013245 (2013)","journal-title":"Microprocess. Microsyst. Embed. Hardware Des."},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO 1994","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-540-46588-1_27","volume-title":"Public Key Cryptography","author":"CH Lim","year":"2000","unstructured":"Lim, C.H., Hwang, H.S.: Fast implementation of elliptic curve arithmetic in GF(p). In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 405\u2013421. Springer, Heidelberg (2000)"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1093\/ietfec\/E88-A.1.89","volume":"88\u2013A","author":"M Gonda","year":"2005","unstructured":"Gonda, M., Matsuo, K., Aoki, K., Chao, J., Tsujii, S.: Improvements of addition algorithm on genus 3 hyperelliptic curves and their implementation. IEICE Trans. 88\u2013A, 89\u201396 (2005)","journal-title":"IEICE Trans."},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-24654-1_23","volume-title":"Selected Areas in Cryptography","author":"R Avanzi","year":"2004","unstructured":"Avanzi, R., Mihailescu, P.: Generic efficient arithmetic algorithms for PAFFs (Processor Adequate Finite Fields) and related algebraic structures(extended abstract). In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 320\u2013334. Springer, Heidelberg (2004)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-28632-5_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"RM Avanzi","year":"2004","unstructured":"Avanzi, R.M.: Aspects of hyperelliptic curves over large prime fields in software implementations. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 148\u2013162. Springer, Heidelberg (2004)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.ipl.2010.04.011","volume":"110","author":"S Gueron","year":"2010","unstructured":"Gueron, S., Kounavis, M.E.: Efficient implementation of the Galois counter mode using a carry-less multiplier and a fast reduction algorithm. Inf. Process. Lett. 110, 549\u2013553 (2010)","journal-title":"Inf. Process. Lett."},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-23951-9_8","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Taverne","year":"2011","unstructured":"Taverne, J., Faz-Hern\u00e1ndez, A., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F., Hankerson, D., L\u00f3pez, J.: Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 108\u2013123. Springer, Heidelberg (2011)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33481-8_10","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"DF Aranha","year":"2012","unstructured":"Aranha, D.F., Faz-Hern\u00e1ndez, A., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: Faster implementation of scalar multiplication on Koblitz curves. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 177\u2013193. Springer, Heidelberg (2012)"},{"unstructured":"Oliveira, T., L\u00f3pez, J., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F.: Two is the fastest prime. Cryptology ePrint Archive, report 2013\/131 (2013). \n                      http:\/\/eprint.iacr.org\/2013\/131\/","key":"14_CR15"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/BFb0053728","volume-title":"Information Security and Privacy","author":"GG Rose","year":"1998","unstructured":"Rose, G.G.: A stream cipher based on linear feedback over \n                      \n                        \n                      \n                      $$GF(2^8)$$\n                    . In: Dawson, E., Boyd, C. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 135\u2013146. Springer, Heidelberg (1998)"},{"unstructured":"Forward Concepts: Qualcomm Leads in Global DSP Silicon Shipments (2012). \n                      http:\/\/www.fwdconcepts.com\/dsp111212.htm","key":"14_CR17"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-48910-X_3","volume-title":"Advances in Cryptology - EUROCRYPT 1999","author":"W Nevelsteen","year":"1999","unstructured":"Nevelsteen, W., Preneel, B.: Software performance of universal hash functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 24\u201341. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:43:34Z","timestamp":1559357014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}