{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:32:30Z","timestamp":1725507150320},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540792628"},{"type":"electronic","value":"9783540792635"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79263-5_11","type":"book-chapter","created":{"date-parts":[[2008,4,4]],"date-time":"2008-04-04T08:18:54Z","timestamp":1207297134000},"page":"170-186","source":"Crossref","is-referenced-by-count":9,"title":["Boosting AES Performance on a Tiny Processor Core"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Herbst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Atmel Corporation. 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash (August 2007), \n                    \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/ASAP.2006.62","volume-title":"Proceedings of the 17th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2006)","author":"G. Bertoni","year":"2006","unstructured":"Bertoni, G., Breveglieri, L., Roberto, F., Regazzoni, F.: Speeding Up AES By Extending a 32-Bit Processor Instruction Set. In: Proceedings of the 17th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2006), pp. 275\u2013282. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"11_CR3","unstructured":"Buchty, R.: Cryptonite \u2014 A Programmable Crypto Processor Architecture for High-Bandwidth Applications. Ph.d. thesis, Technische Universit\u00e4t M\u00fcnchen, LRR (September 2002), \n                    \n                      http:\/\/tumb1.biblio.tu-muenchen.de\/publ\/diss\/in\/2002\/buchty.pdf"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1145\/378993.379238","volume-title":"ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"J. Burke","year":"2000","unstructured":"Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. In: ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, 2000, November 12-15, pp. 178\u2013189. ACM Press, New York (2000)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D. Canright","year":"2005","unstructured":"Canright, D.: A Very Compact S-Box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 441\u2013455. Springer, Heidelberg (2005)"},{"key":"11_CR6","unstructured":"Chia, C.-C., Wang, S.-S.: Efficient Design of an Embedded Microcontroller for Advanced Encryption Standard. In: Proceedings of the 2005 Workshop on Consumer Electronics and Signal Processing (WCEsp 2005) (2005), \n                    \n                      http:\/\/www.mee.chu.edu.tw\/labweb\/WCEsp2005\/96.pdf"},{"key":"11_CR7","volume-title":"Information Security and Cryptography","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. In: Information Security and Cryptography, Springer, Heidelberg (2002)"},{"key":"11_CR8","unstructured":"Dhem, J.-F.: Design of an efficient public-key cryptographic library for RISC-based smart cards. PhD thesis, Universit\u00e9 Catholique de Louvain, Louvain-la-Neuve, Belgium (May 1998)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ASAP.2005.15","volume-title":"Proceedings of the 16th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2005)","author":"H. Eberle","year":"2005","unstructured":"Eberle, H., Wander, A., Gura, N., Chang-Shantz, S., Gupta, V.: Architectural Extensions for Elliptic Curve Cryptography over GF(2\n                    m\n                  ) on 8-bit Microprocessors. In: Proceedings of the 16th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2005), July 2005, pp. 343\u2013349. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"11_CR10","first-page":"396","volume-title":"Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007)","author":"A.J. Elbirt","year":"2007","unstructured":"Elbirt, A.J.: Fast and Efficient Implementation of AES via Instruction Set Extensions. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), May 2007, vol.\u00a01, pp. 396\u2013403. IEEE Computer Society Press, Los Alamitos (2007)"},{"issue":"1","key":"11_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEE Proceedings on Information Security\u00a0152(1), 13\u201320 (2005)","journal-title":"IEE Proceedings on Information Security"},{"issue":"2","key":"11_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/40.848473","volume":"20","author":"R.E. Gonzalez","year":"2000","unstructured":"Gonzalez, R.E.: Xtensa: A Configurable and Extensible Processor. IEEE Micro\u00a020(2), 60\u201370 (2000)","journal-title":"IEEE Micro"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/ICCD.2001.955065","volume-title":"Proceedings of the International Conference on Computer Design (ICCD 2001)","author":"J.P. McGregor","year":"2001","unstructured":"McGregor, J.P., Lee, R.B.: Architectural Enhancements for Fast Subword Permutations with Repetitions in Cryptographic Applications. In: Proceedings of the International Conference on Computer Design (ICCD 2001), September 2001, pp. 453\u2013461. IEEE, Los Alamitos (2001)"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/SIPS.2004.1363041","volume-title":"IEEE Workshop on Signal Processing Systems (SIPS 2004)","author":"K. Nadehara","year":"2004","unstructured":"Nadehara, K., Ikekawa, M., Kuroda, I.: Extended Instructions for the AES Cryptography and their Efficient Implementation. In: IEEE Workshop on Signal Processing Systems (SIPS 2004), Austin, Texas, USA, October 2004, pp. 152\u2013157. IEEE Press, Los Alamitos (2004)"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/HPCS.1995.662009","volume-title":"Third IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems, 1995 (HPCS 1995)","author":"E. Nahum","year":"1995","unstructured":"Nahum, E., O\u2019Malley, S., Orman, H., Schroeppel, R.: Towards High Performance Cryptographic Software. In: Third IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems, 1995 (HPCS 1995), August 1995, pp. 69\u201372. IEEE, Los Alamitos (1995)"},{"key":"11_CR16","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1145\/513918.514113","volume-title":"DAC 2002: Proceedings of the 39th Conference on Design Automation","author":"S. Ravi","year":"2002","unstructured":"Ravi, S., Raghunathan, A., Potlapally, N., Sankaradass, M.: System design methodologies for a wireless security processing platform. In: DAC 2002: Proceedings of the 39th Conference on Design Automation, pp. 777\u2013782. ACM Press, New York (2002)"},{"key":"11_CR18","unstructured":"Rinne, S., Eisenbarth, T., Paar, C.: Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers (June 2007), \n                    \n                      http:\/\/www.crypto.ruhr-uni-bochum.de\/imperia\/md\/content\/texte\/publications\/conferences\/lw_speed2007.pdf"},{"key":"11_CR19","first-page":"138","volume-title":"Proceedings of the 11th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2000)","author":"Z. Shi","year":"2000","unstructured":"Shi, Z., Lee, R.B.: Bit Permutation Instructions for Accelerating Software Cryptography. In: Proceedings of the 11th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2000), pp. 138\u2013148. IEEE, Los Alamitos (2000)"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11796435_46","volume-title":"Embedded Computer Systems: Architectures, Modeling, and Simulation","author":"S. Tillich","year":"2006","unstructured":"Tillich, S., Feldhofer, M., Gro\u00dfsch\u00e4dl, J.: Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. In: Vassiliadis, S., Wong, S., H\u00e4m\u00e4l\u00e4inen, T.D. (eds.) SAMOS 2006. LNCS, vol.\u00a04017, pp. 457\u2013466. Springer, Heidelberg (2006)"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/11894063_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Tillich","year":"2006","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 270\u2013284. Springer, Heidelberg (2006)"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-540-74735-2_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"S. Tillich","year":"2007","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: Power-Analysis Resistant AES Implementation with Instruction Set Extensions. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 303\u2013319. Springer, Heidelberg (2007)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-73074-3_5","volume-title":"Arithmetic of Finite Fields","author":"S. Tillich","year":"2007","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-bit Processors. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 40\u201354. Springer, Heidelberg (2007)"},{"key":"11_CR24","unstructured":"Wolkerstorfer, J.: An ASIC Implementation of the AES-MixColumn operation. In: R\u00f6ssler, P., D\u00f6derlein, A. (eds.) Austrochip 2001, pp. 129\u2013132 (2001); ISBN 3-9501517-0-2"},{"key":"11_CR25","first-page":"110","volume-title":"ISCA 2001: Proceedings of the 28th annual international symposium on Computer architecture","author":"L. Wu","year":"2001","unstructured":"Wu, L., Weaver, C., Austin, T.: CryptoManiac: A Fast Flexible Architecture for Secure Communication. In: ISCA 2001: Proceedings of the 28th annual international symposium on Computer architecture, pp. 110\u2013119. ACM Press, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79263-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:15:52Z","timestamp":1619507752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79263-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540792628","9783540792635"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79263-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}