{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:08:12Z","timestamp":1766048892214,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319716664"},{"type":"electronic","value":"9783319716671"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71667-1_15","type":"book-chapter","created":{"date-parts":[[2017,11,29]],"date-time":"2017-11-29T05:08:45Z","timestamp":1511932125000},"page":"282-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2144-4829","authenticated-orcid":false,"given":"Mustafa","family":"Khairallah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2690-9197","authenticated-orcid":false,"given":"Thomas","family":"Peyrin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,30]]},"reference":[{"key":"15_CR1","unstructured":"CAESAR Competition: CAESAR submissions (2016). \n                    https:\/\/competitions.cr.yp.to\/caesar-submissions.html"},{"key":"15_CR2","unstructured":"George Mason University: ATHENa: Automated Tools for Hardware EvaluatioN (2017). \n                    https:\/\/cryptography.gmu.edu\/athena\/"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Abed, F., Forler, C., Lucks, S.: General classification of the authenticated encryption schemes for the CAESAR competition. Comput. Sci. Rev. (2016)","DOI":"10.1016\/j.cosrev.2016.07.002"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/937527.937529","volume":"6","author":"P Rogaway","year":"2003","unstructured":"Rogaway, P., Bellare, M., Black, J.: OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. (TISSEC) 6(3), 365\u2013403 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30539-2_2","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P.: Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 16\u201331. Springer, Heidelberg (2004). \n                    https:\/\/doi.org\/10.1007\/978-3-540-30539-2_2"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-21702-9_18","volume-title":"Fast Software Encryption","author":"T Krovetz","year":"2011","unstructured":"Krovetz, T., Rogaway, P.: The software performance of authenticated-encryption modes. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 306\u2013327. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-21702-9_18"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-662-53018-4_2","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"T Peyrin","year":"2016","unstructured":"Peyrin, T., Seurin, Y.: Counter-in-tweak: authenticated encryption modes for tweakable block ciphers. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9814, pp. 33\u201363. Springer, Heidelberg (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-662-53018-4_2"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-55220-5_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"K Minematsu","year":"2014","unstructured":"Minematsu, K.: Parallelizable rate-1 authenticated encryption from pseudorandom functions. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 275\u2013292. Springer, Heidelberg (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-642-55220-5_16"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-13193-6_16","volume-title":"Experimental Algorithms","author":"J Boyar","year":"2010","unstructured":"Boyar, J., Peralta, R.: A new combinational logic minimization technique with applications to cryptology. In: Festa, P. (ed.) SEA 2010. LNCS, vol. 6049, pp. 178\u2013189. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-13193-6_16"},{"key":"15_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-30436-1_24","volume-title":"Information Security and Privacy Research","author":"J Boyar","year":"2012","unstructured":"Boyar, J., Peralta, R.: A small depth-16 circuit for the AES S-box. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 287\u2013298. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-30436-1_24"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact S-Box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 441\u2013455. Springer, Heidelberg (2005). \n                    https:\/\/doi.org\/10.1007\/11545262_32"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-44318-8_1","volume-title":"Hardware Security and Trust","author":"JC Resende","year":"2017","unstructured":"Resende, J.C., Chaves, R.: AES datapaths on FPGAs: a state of the art analysis. In: Sklavos, N., Chaves, R., Di Natale, G., Regazzoni, F. (eds.) Hardware Security and Trust, pp. 1\u201325. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-44318-8_1"},{"key":"15_CR13","unstructured":"Jean, J., Nikolic, I., Peyrin, T., Seurin, Y.: Deoxys v1.41. Technical report, Nanyang Technological University, Singapore\/ANSSI, Paris, France (2016)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-68164-9_2","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"P Bulens","year":"2008","unstructured":"Bulens, P., Standaert, F.-X., Quisquater, J.-J., Pellegrin, P., Rouvroy, G.: Implementation of the AES-128 on Virtex-5 FPGAs. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 16\u201326. Springer, Heidelberg (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-68164-9_2"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Q., Xu, Z., Yuan, Y.: A 66.1 GBPS single-pipeline AES on FPGA. In: 2013 International Conference on Field-Programmable Technology (FPT), pp. 378\u2013381, December 2013","DOI":"10.1109\/FPT.2013.6718392"},{"key":"15_CR16","unstructured":"Deoxys-I-128 implementation by cerg team (2016). \n                    https:\/\/cryptography.gmu.edu\/athena\/"},{"key":"15_CR17","unstructured":"Poschmann, A., St\u00f6ttinger, M.: Deoxys-I-128 implementation by poschmann and St\u00f6ttinger (2016). \n                    https:\/\/cryptography.gmu.edu\/athena\/"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-319-13039-2_18","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"N Nalla Anandakumar","year":"2014","unstructured":"Nalla Anandakumar, N., Peyrin, T., Poschmann, A.: A very compact FPGA implementation of LED and PHOTON. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 304\u2013321. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-13039-2_18"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/3-540-46035-7_25","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"J Black","year":"2002","unstructured":"Black, J., Rogaway, P.: A block-cipher mode of operation for parallelizable message authentication. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 384\u2013397. Springer, Heidelberg (2002). \n                    https:\/\/doi.org\/10.1007\/3-540-46035-7_25"},{"key":"15_CR20","unstructured":"Krovetz, T., Rogaway, P.: Ocb (v1. 1) (2016)"},{"key":"15_CR21","unstructured":"Minematsu, K.: AES-OTR v3.1. Technical report, NEC Corporation, Japan (2016)"},{"key":"15_CR22","unstructured":"Homsirikamol, E., Diehl, W., Ferozpuri, A., Farahmand, F., Yalla, P., Kaps, J.P., Gaj, K.: CAESAR Hardware API. Cryptology ePrint Archive, Report 2016\/626 (2016)"},{"key":"15_CR23","unstructured":"NIST: National Institute of Standards and Technology: Advanced Encryption Standard AES (2001)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"El Maraghy, M., Hesham, S., El Ghany, M.A.A.: Real-time efficient FPGA implementation of AES algorithm. In: 2013 IEEE 26th International SOC Conference (SOCC), pp. 203\u2013208. IEEE (2013)","DOI":"10.1109\/SOCC.2013.6749688"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Chaves, R., Kuzmanov, G., Vassiliadis, S., Sousa, L.: Reconfigurable memory based AES co-processor. In: 20th International Parallel and Distributed Processing Symposium, IPDPS 2006, 8-pp. IEEE (2006)","DOI":"10.1109\/IPDPS.2006.1639441"},{"key":"15_CR26","unstructured":"Banik, S., Bogdanov, A., Regazzoni, F.: Atomic-AES v 2.0. Cryptology ePrint Archive, Report 2016\/1005 (2016)"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Ghaznavi, S., Gebotys, C., Elbaz, R.: Efficient technique for the FPGA implementation of the AES mixcolumns transformation. In: International Conference on Reconfigurable Computing and FPGAs, ReConFig 2009, pp. 219\u2013224. IEEE (2009)","DOI":"10.1109\/ReConFig.2009.52"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Resende, J.C., Chaves, R.: Compact dual block AES core on FPGA for CCM protocol. In: 2015 25th International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u20138. IEEE (2015)","DOI":"10.1109\/FPL.2015.7293948"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-642-23951-9_22","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-23951-9_22"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2017"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71667-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:02:02Z","timestamp":1558321322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71667-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319716664","9783319716671"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71667-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/events.csa.iisc.ernet.in\/indocrypt2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}