{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:40:10Z","timestamp":1748799610110,"version":"3.41.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319298139"},{"type":"electronic","value":"9783319298146"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29814-6_3","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T09:04:46Z","timestamp":1457341486000},"page":"18-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers"],"prefix":"10.1007","author":[{"given":"Zhenzhen","family":"Bao","sequence":"first","affiliation":[]},{"given":"Peng","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"key":"3_CR1","volume-title":"The Design of Rijndael - AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael - AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J Borghoff","year":"2012","unstructured":"Borghoff, J., Canteaut, A., G\u00fcneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yal\u00e7\u0131n, T.: PRINCE \u2013 a low-latency block cipher for pervasive computing applications. In: Sako, K., Wang, X. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208\u2013225. Springer, Heidelberg (2012)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. http:\/\/eprint.iacr.org\/2012\/600","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"3_CR6","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: SIMON and SPECK: block ciphers for the internet of things. http:\/\/eprint.iacr.org\/2015\/585"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"key":"3_CR8","unstructured":"Poschmann, A.: Lightweight cryptography cryptographic engineering for a pervasive world. PhD Dissertation, Faculty of Electrical Engineering and Information Technology, Ruhr-University Bochum, Germany (2009)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-662-44371-2_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"MR Albrecht","year":"2014","unstructured":"Albrecht, M.R., Driessen, B., Kavun, E.B., Leander, G., Paar, C., Yal\u00e7\u0131n, T.: Block Ciphers \u2013 Focus on the linear layer (feat. PRIDE). In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 57\u201376. Springer, Heidelberg (2014)"},{"key":"3_CR10","unstructured":"Atmel Corporation. 8-bit AVR Instruction Set. http:\/\/www.atmel.com\/images\/doc0856.pdf"},{"key":"3_CR11","unstructured":"Atmel Corporation. AVR 8-bit Microcontrollers. http:\/\/www.atmel.com\/products\/microcontrollers\/avr\/default.aspx"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-74619-5_12","volume-title":"Fast Software Encryption","author":"T Shirai","year":"2007","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended Abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181\u2013195. Springer, Heidelberg (2007)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/11894063_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Hong","year":"2006","unstructured":"Hong, D., Sung, J., Hong, S.H., Lim, J.-I., Lee, S.-J., Koo, B.-S., Lee, C.-H., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J.-S., Chee, S.: HIGHT: a new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46\u201359. Springer, Heidelberg (2006)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-04138-9_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"C De Canni\u00e8re","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN \u2014 a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"RFID","author":"Z Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1\u201318. Springer, Heidelberg (2012)"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-642-35999-6_22","volume-title":"Selected Areas in Cryptography","author":"T Suzaki","year":"2013","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339\u2013354. Springer, Heidelberg (2013)"},{"issue":"12","key":"3_CR18","first-page":"1","volume":"58","author":"W Zhang","year":"2015","unstructured":"Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: RECTANGLE: a bit-slice ultra-lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1\u201315 (2015)","journal-title":"Sci. China Inf. Sci."},{"key":"3_CR19","unstructured":"CryptoLUX: Lightweight Block Ciphers. http:\/\/www.cryptolux.org\/index.php\/Lightweight_Block_Ciphers"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"YW Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.H.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sensor Networks (TOSN) 2(1), 65\u201393 (2006)","journal-title":"ACM Trans. Sensor Networks (TOSN)"},{"issue":"6","key":"3_CR21","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers 24(6), 522\u2013533 (2007)","journal-title":"IEEE Design & Test of Computers"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-33027-8_23","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"S Kerckhof","year":"2012","unstructured":"Kerckhof, S., Durvaux, F., Hocquet, C., Bol, D., Standaert, F.-X.: Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 390\u2013407. Springer, Heidelberg (2012)"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-33027-8_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"M Kne\u017eevi\u0107","year":"2012","unstructured":"Kne\u017eevi\u0107, M., Nikov, V., Rombouts, P.: Low-latency encryption \u2013 is \u201cLightweight = Light + Wait\u201d? In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 426\u2013446. Springer, Heidelberg (2012)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Vaudenay, S., Mitrokotsa, A. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"key":"3_CR25","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F. et al.: Implementations of Low Cost Block Ciphers in Atmel AVR Devices, February 2015. http:\/\/perso.uclouvain.be\/fstandae\/lightweight_ciphers\/"},{"key":"3_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-662-43933-3_20","volume-title":"Fast Software Encryption","author":"M Matsui","year":"2014","unstructured":"Matsui, M., Murakami, Y.: Minimalism of software implementation extensive performance analysis of symmetric primitives on the RL78 microcontroller. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 393\u2013409. Springer, Heidelberg (2014)"},{"key":"3_CR27","unstructured":"Cazorla, M., Marquet, K., Minier, M.: Survey and benchmark of lightweight block ciphers for wireless sensor networks. http:\/\/eprint.iacr.org\/2013\/295"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Cazorla, M., Marquet, K., Minier, M.: Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. In: Samarati, P. (ed.), SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav\u00edk, Iceland, 29\u201331 July 2013, pp. 543\u2013548. SciTePress (2013)","DOI":"10.5220\/0004530905430548"},{"key":"3_CR29","unstructured":"Cazorla, M., Marquet, K., and Minier, M.: Implementations of lightweight block ciphers on a WSN430 sensor, February 2015. http:\/\/bloc.project.citi-lab.fr\/library.html"},{"key":"3_CR30","unstructured":"Dinu, D., Biryukov, A., Gro\u00dfsch\u00e4dl, J., Khovratovich, D., Corre, Y.L., Perrin, L.: FELICS - fair evaluation of lightweight cryptographic systems, July 2015. http:\/\/csrc.nist.gov\/groups\/ST\/lwc-workshop2015\/papers\/session7-dinu-paper.pdf"},{"key":"3_CR31","unstructured":"CryptoLUX.: FELICS (Fair Evaluation of Lightweight Cryptographic Systems), 15 August 2015. http:\/\/www.cryptolux.org\/index.php\/FELICS"},{"key":"3_CR32","unstructured":"Dinu, D., Corre, Y.L., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: Triathlon of lightweight block ciphers for the internet of things (2015). http:\/\/eprint.iacr.org\/2015\/209"},{"key":"3_CR33","unstructured":"CryptoLUX.: FELICS Triathlon, 12 August 2015. http:\/\/www.cryptolux.org\/index.php\/FELICS_Triathlon"},{"key":"3_CR34","unstructured":"Dinu, D., Corre, Y.L., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., Biryukov, A.: FELICS block ciphers brief results and FELICS block ciphers detailed results, 1 October 2015 http:\/\/www.cryptolux.org\/index.php\/FELICS_Block_Ciphers_Brief_Results, http:\/\/www.cryptolux.org\/index.php\/FELICS_Block_Ciphers_Detailed_Results"},{"key":"3_CR35","unstructured":"Processor Watch, 8 January 2013. http:\/\/www.linleygroup.com"},{"key":"3_CR36","unstructured":"National Institute of Standards and Technology (NIST). Lightweight Cryptography Workshop 2015. http:\/\/www.nist.gov\/itl\/csd\/ct\/lwc_workshop2015.cfm"},{"key":"3_CR37","unstructured":"Shahverdi, A., Chen, C., and Eisenbarth, T.: AVRprince - an efficient implementation of PRINCE for 8-bit microprocessors. Technical Report, Worcester Polytechnic Institute (2014). http:\/\/www.ashahverdi.com\/files\/papers\/avrPRINCEv01.pdf"},{"key":"3_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-319-13066-8_9","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"K Papapagiannopoulos","year":"2014","unstructured":"Papapagiannopoulos, K.: High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers. In: Sadeghi, A.-R., Saxena, N. (eds.) RFIDSec 2014. LNCS, vol. 8651, pp. 137\u2013155. Springer, Heidelberg (2014)"},{"key":"3_CR39","unstructured":"Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.: Multiple differential cryptanalysis of round-reduced PRINCE. Presentation at Fast Software Encryption FSE 2014, London, 25 March 2014. http:\/\/fse2014.isg.rhul.ac.uk\/slides\/slides-09_4.pdf"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Canteaut, A., Fuhr, T., Gilbert, H., Naya-Plasencia, M., Reinhard, J.: Multiple Differential Cryptanalysis of Round-Reduced PRINCE (Full version). eprint.iacr.org\/2014\/089","DOI":"10.1007\/978-3-662-46706-0_30"},{"key":"3_CR41","unstructured":"Gladman, B.: Serpent S Boxes as Boolean Functions. http:\/\/www.gladman.me.uk\/"},{"key":"3_CR42","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak Reference, January 2011. http:\/\/keccak.noekeon.org\/"},{"key":"3_CR43","unstructured":"Courtois, N.T., Hulme, D., Mourouzis, T.: Solving circuit optimisation problems in cryptography and cryptanalysis. In: Electronic Proceedings of 2nd IMA Conference Mathematics in Defence, Swindon (2011)"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The Simon and Speck Block Ciphers on AVR 8-bit Microcontrollers (2014). http:\/\/eprint.iacr.org\/2014\/947","DOI":"10.1007\/978-3-319-16363-5_1"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Bao, Z., Zhang, W., Luo, P., Lin, D.: Bitsliced Implementations of Block Ciphers on AVR 8-bit Microcontrollers, October 2015. http:\/\/github.com\/FreeDisciplina\/BlockCiphersOnAVR","DOI":"10.1007\/978-3-319-29814-6_3"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29814-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:20:41Z","timestamp":1748798441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-29814-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319298139","9783319298146"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29814-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}