{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:19:31Z","timestamp":1771669171103,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540221715","type":"print"},{"value":"9783540259374","type":"electronic"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25937-4_18","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T13:25:16Z","timestamp":1294493116000},"page":"279-298","source":"Crossref","is-referenced-by-count":59,"title":["ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware"],"prefix":"10.1007","author":[{"given":"Francois-Xavier","family":"Standaert","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Piret","sequence":"additional","affiliation":[]},{"given":"Gael","family":"Rouvroy","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]},{"given":"Jean-Didier","family":"Legat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"NIST Home page, \n                  \n                    http:\/\/csrc.nist.gov\/CryptoToolkit\/aes\/"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","first-page":"288","volume-title":"Smart Card. Research and Applications","author":"J. Daemen","year":"2000","unstructured":"Daemen, J., Rijmen, V.: The Block Cipher Rijndael. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 288\u2013296. Springer, Heidelberg (2000)"},{"key":"18_CR3","unstructured":"Barreto, P., Rijmen, V.: The KHAZAD Legacy-Level Block Cipher, Submission to NESSIE project, available from \n                  \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/"},{"key":"18_CR4","unstructured":"Matsui, M.: Supporting Document of MISTY1, Submission to NESSIE project, available from \n                  \n                    http:\/\/www.cosic.esat.kuleuven.ac.be\/nessie\/"},{"key":"18_CR5","unstructured":"Xilinx: Virtex 2 FPGAs Data Sheet, \n                  \n                    http:\/\/www.xilinx.com"},{"key":"18_CR6","unstructured":"Altera: Stratix 1.5V FPGAs Data Sheet, \n                  \n                    http:\/\/www.altera.com"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-44709-1_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. McLoone","year":"2001","unstructured":"McLoone, M., McCanny, J.V.: High Performance Single Ship FPGA Rijndael Algorithm Implementations. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 65\u201376. Springer, Heidelberg (2001)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-44709-1_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"V. Fischer","year":"2001","unstructured":"Fischer, V., Drutarovsky, M.: Two Methods of Rijndael Implementation in Reconfigurable Hardware. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 65\u201376. Springer, Heidelberg (2001)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"Satoh, A., et al.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"18_CR10","unstructured":"Helion Technology. High Performance AES (Rijndael) Cores for XILINX FPGA, \n                  \n                    http:\/\/www.heliontech.com"},{"key":"18_CR11","unstructured":"Standaert, F.X., Rouvroy, G., Quisquater, J.J., Legat, J.D.: Efficient FPGA Implementations of Block Ciphers KHAZAD and MISTY1. In: The proceedings of the Third NESSIE Workshop, Munich, Germany, November 6-7 (2002)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Standaert, F.X., Rouvroy, G., Quisquater, J.J., Legat, J.D.: A Methodology to Implement Block Ciphers in Reconfigurable Hardware and its Application to Fast and Compact AES Rijndael. In: The proceedings of FPGA 2003: the Field Programmable Logic Array Conference, Monterey, California, February 23-25 (2003)","DOI":"10.1145\/611847.611849"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","first-page":"2","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1990","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems (Extended abstract). In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1990)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","first-page":"386","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1993","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1993)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-48519-8_12","volume-title":"Fast Software Encryption","author":"D. Wagner","year":"1999","unstructured":"Wagner, D.: The Boomerang Attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 156\u2013170. Springer, Heidelberg (1999)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44987-6_21","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"E. Biham","year":"2001","unstructured":"Biham, E., Dunkelman, O., Keller, N.: The rectangle Attack - Rectangling the Serpent. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 340\u2013357. Springer, Heidelberg (2001)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/3-540-48658-5_4","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B.S. Kaliski","year":"1994","unstructured":"Kaliski, B.S., Robshaw, M.J.B.: Linear Cryptanalysis using Multiple Approximations. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 26\u201339. Springer, Heidelberg (1994)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-68339-9_20","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"L. Knudsen","year":"1996","unstructured":"Knudsen, L., Robshaw, M.J.B.: Non-Linear Approximations in Linear Cryptanalysis. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 224\u2013236. Springer, Heidelberg (1996)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/BFb0052343","volume-title":"Fast Software Encryption","author":"J. Daemen","year":"1997","unstructured":"Daemen, J., Knudsen, L., Rijmen, V.: The Block Cipher SQUARE. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 149\u2013165. Springer, Heidelberg (1997)"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44706-7_15","volume-title":"Fast Software Encryption","author":"N. Ferguson","year":"2000","unstructured":"Ferguson, N., Kelsey, J., Lucks, S., et al.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 213\u2013230. Springer, Heidelberg (2000)"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-60590-8_16","volume-title":"Fast Software Encryption","author":"L. Knudsen","year":"1995","unstructured":"Knudsen, L.: Truncated and Higher Order Differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 196\u2013211. Springer, Heidelberg (1995)"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 12\u201323. Springer, Heidelberg (1999)"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/3-540-48519-8_10","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1999","unstructured":"Biham, E., Biryukov, A., Shamir, A.: Miss in the Middle Attacks on IDEA, Khufu, and Khafre. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 124\u2013138. Springer, Heidelberg (1999)"},{"key":"18_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0052332","volume-title":"Fast Software Encryption","author":"T. Jakobsen","year":"1997","unstructured":"Jakobsen, T., Knudsen, L.: The Interpolation Attack on Block Ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 28\u201340. Springer, Heidelberg (1997)"},{"key":"18_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-48519-8_18","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"1999","unstructured":"Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 245\u2013259. Springer, Heidelberg (1999)"},{"key":"18_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/3-540-45539-6_41","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"A. Biryukov","year":"2000","unstructured":"Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 589\u2013606. Springer, Heidelberg (2000)"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","first-page":"229","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"E. Biham","year":"1994","unstructured":"Biham, E.: New Type of Cryptanalytic Attacks Using Related Key. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 229\u2013246. Springer, Heidelberg (1994)"},{"key":"18_CR28","series-title":"Lecture Notes in Computer Science","first-page":"196","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"J. Kelsey","year":"1993","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Related-Key Cryptanalysis of 3-WAY, Biham- DES, CAST, DES-X, NewDES, RC2, and TEA. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 196\u2013208. Springer, Heidelberg (1993)"},{"key":"18_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-540-39887-5_5","volume-title":"Fast Software Encryption","author":"A. Biryukov","year":"2003","unstructured":"Biryukov, A.: Analysis of Involutional Ciphers: Khazad and Anubis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 45\u201353. Springer, Heidelberg (2003) (to appear)"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","first-page":"398","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems","author":"L. Goubin","year":"1999","unstructured":"Goubin, L., Patarin, J.: DES and Differential Power Analysis: The Duplication Method. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 158\u2013172. Springer, Heidelberg (1999)"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"S. Chari","year":"1999","unstructured":"Chari, S., et al.: Towards Sound Approaches to Counteract Power-Analysis Attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 398\u2013412. Springer, Heidelberg (1999)"},{"key":"18_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"18_CR34","unstructured":"Pfitzmann, A., A\u03b2mann, R.: More Efficient Software Implementations of (Generalized) DES, Institut fur Rechnerent und Fehlertoleranz, Univ. Karlsruhe, Interner Bericht 18\/90"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Biham, E.: A Fast New DES Implementation in Software, Technion - Computer Science Department, Technical Report CS0891 - (1997)","DOI":"10.1007\/BFb0052352"},{"key":"18_CR36","unstructured":"Youssef, A.M., Tavares, S.E., Heys, H.: A New Class of Substitution-Permutation Networks. In: Proceedings of Selected Areas in Cryptography (SAC 1996), pp. 132-147 (1996)"},{"key":"18_CR37","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1049\/el:19950571","volume":"31","author":"H.M. Heys","year":"1995","unstructured":"Heys, H.M., Tavares, S.E.: Known Plaintext Cryptanalysis of Tree-Structured Block Ciphers. Electronics Letters\u00a031, 784\u2013785 (1995)","journal-title":"Electronics Letters"},{"key":"18_CR38","volume-title":"Doctoral Dissertation, DAIMI PB 485","author":"L. Knudsen","year":"1994","unstructured":"Knudsen, L.: Block Ciphers - Analysis, Design and Applications. Doctoral Dissertation, DAIMI PB 485, Aarhus University, Denmark (1994)"},{"key":"18_CR39","unstructured":"Daemen, J.: Cipher and Hash Function Design. Doctoral Dissertation, KULeuven (March 1995)"},{"key":"18_CR40","unstructured":"Rijmen, V.: Cryptanalysis and Design of Iterated Block Ciphers. Doctoral Dissertation, KULeuven (October 1997)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25937-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:39:12Z","timestamp":1558294752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25937-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221715","9783540259374"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25937-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}