{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:42:07Z","timestamp":1725540127468},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642054433"},{"type":"electronic","value":"9783642054457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05445-7_10","type":"book-chapter","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T15:03:23Z","timestamp":1257260603000},"page":"157-169","source":"Crossref","is-referenced-by-count":10,"title":["A More Compact AES"],"prefix":"10.1007","author":[{"given":"David","family":"Canright","sequence":"first","affiliation":[]},{"given":"Dag Arne","family":"Osvik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-44709-1_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"A. Rudra","year":"2001","unstructured":"Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P.: Efficient Rijndael encryption implementation with composite field arithmetic. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 171\u2013184. Springer, Heidelberg (2001)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A compact Rijndael hardware architecture with S-box optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES S-boxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 67\u201378. Springer, Heidelberg (2002)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P. Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very compact FPGA implementation of the AES algorithm. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 319\u2013333. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. In: IEE Proceedings on Information Security, IEE, vol.\u00a0152, pp. 13\u201320 (2005)","key":"10_CR5","DOI":"10.1049\/ip-ifs:20055006"},{"unstructured":"Rijmen, V.: Efficient implementation of the Rijndael S-box (2001), \n                    \n                      http:\/\/www.esat.kuleuven.ac.be\/~rijmen\/rijndael\/sbox.pdf","key":"10_CR6"},{"unstructured":"Paar, C.: Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields. PhD thesis, Institute for Experimental Mathematics, University of Essen, Germany (1994)","key":"10_CR7"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D. Canright","year":"2005","unstructured":"Canright, D.: A very compact S-box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 441\u2013455. Springer, Heidelberg (2005)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/11935070_14","volume-title":"Cryptology and Network Security","author":"C. Rebeiro","year":"2006","unstructured":"Rebeiro, C., Selvakumar, D., Devi, A.: Bitslice implementation of AES. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol.\u00a04301, pp. 203\u2013212. Springer, Heidelberg (2006)"},{"unstructured":"Boyar, J., Peralta, R.: New logic minimization techniques with applications to cryptology. Cryptology ePrint Archive, Report 2009\/191 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"10_CR10"},{"doi-asserted-by":"crossref","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant aes-gcm. Cryptology ePrint Archive, Report 2009\/129 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/","key":"10_CR11","DOI":"10.1007\/978-3-642-04138-9_1"},{"unstructured":"NIST: Specification for the Advanced Encryption Standard (AES), FIPS PUB 197 (2001)","key":"10_CR12"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New aes software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"},{"unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999), \n                    \n                      http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/Rijndael-ammended.pdf","key":"10_CR14"},{"unstructured":"IBM: Introduction to the Cell Broadband Engine (2005), \n                    \n                      http:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/D21E662845B95D4F872570AB0055404D","key":"10_CR15"},{"doi-asserted-by":"crossref","unstructured":"Canright, D.: A very compact Rijndael S-box. Technical Report NPS-MA-05-001, Naval Postgraduate School (2005)","key":"10_CR16","DOI":"10.21236\/ADA434781"},{"unstructured":"Osvik, D.A.: Speeding up Serpent. In: AES Candidate Conference, pp. 317\u2013329 (2000)","key":"10_CR17"},{"doi-asserted-by":"crossref","unstructured":"Intel: Advanced encryption standard (AES) instructions set, rev.\u00a02 (2009), \n                    \n                      http:\/\/software.intel.com\/en-us\/articles\/advanced-encryption-standard-aes-instructions-set\/","key":"10_CR18","DOI":"10.1016\/S1353-4858(10)70006-4"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05445-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T16:27:04Z","timestamp":1580315224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05445-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642054433","9783642054457"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05445-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}