{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:07:05Z","timestamp":1771330025071,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642138577","type":"print"},{"value":"9783642138584","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13858-4_5","type":"book-chapter","created":{"date-parts":[[2010,6,24]],"date-time":"2010-06-24T13:38:09Z","timestamp":1277386689000},"page":"75-93","source":"Crossref","is-referenced-by-count":87,"title":["Fast Software AES Encryption"],"prefix":"10.1007","author":[{"given":"Dag Arne","family":"Osvik","sequence":"first","affiliation":[]},{"given":"Joppe W.","family":"Bos","sequence":"additional","affiliation":[]},{"given":"Deian","family":"Stefan","sequence":"additional","affiliation":[]},{"given":"David","family":"Canright","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"AMD. ATI CTM Reference Guide. Technical Reference Manual (2006)"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1145\/967900.968073","volume-title":"Symposium on Applied Computing 2004","author":"K. Atasu","year":"2004","unstructured":"Atasu, K., Breveglieri, L., Macchetti, M.: Efficient AES implementations for ARM based platforms. In: Symposium on Applied Computing 2004, pp. 841\u2013845. ACM, New York (2004)"},{"key":"5_CR3","unstructured":"Atmel Corporation. 8-bit AVR Microcontroller with 8\/16K Bytes of ISP Flash and USB Controller. Technical Reference Manual (2008)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A Fast New DES Implementation in Software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D.: Related-key Cryptanalysis of the Full AES-192 and AES-256. Cryptology ePrint Archive, Report 2009\/317 (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-10366-7_1"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-03356-8_14","volume-title":"CRYPTO 2009","author":"A. Biryukov","year":"2009","unstructured":"Biryukov, A., Nikolic, D.K.I.: Distinguisher and Related-Key Attack on the Full AES-256. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 231\u2013249. Springer, Heidelberg (2009)"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1145\/1141911.1141947","volume":"25","author":"D. Blythe","year":"2006","unstructured":"Blythe, D.: The Direct3D 10 system. ACM Trans. Graph.\u00a025(3), 724\u2013734 (2006)","journal-title":"ACM Trans. Graph."},{"key":"5_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael. Springer, New York (2002)"},{"key":"5_CR10","unstructured":"Dongarra, J., Meuer, H., Strohmaier, E.: Top500 Supercomputer Sites, http:\/\/www.top500.org\/"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","first-page":"85","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 85\u2013140. Springer, Heidelberg (2004)"},{"key":"5_CR12","unstructured":"Frost & Sullivan: Asia Pacific\u2019s Final Wireless Growth Frontier, http:\/\/www.infoworld.com\/t\/networking\/passive-rfid-tag-market-hit-486m-in-2013-102"},{"key":"5_CR13","unstructured":"Harrison, O., Waldron, J.: Practical Symmetric Key Cryptography on Modern Graphics Hardware. In: USENIX Security Symposium, pp. 195\u2013210 (2008)"},{"key":"5_CR14","first-page":"258","volume-title":"HPCA 2005","author":"H.P. Hofstee","year":"2005","unstructured":"Hofstee, H.P.: Power Efficient Processor Architecture and The Cell Processor. In: HPCA 2005, pp. 258\u2013262. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04138-9_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"E. K\u00e4sper","year":"2009","unstructured":"K\u00e4sper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 1\u201317. Springer, Heidelberg (2009)"},{"key":"5_CR16","unstructured":"Klami, K., Hammond, B., Spencer, M.: ARM Announces 10 Billionth Mobile Processor (2009), http:\/\/www.arm.com\/news\/24403.html"},{"key":"5_CR17","first-page":"65","volume-title":"ICSPC 2007","author":"S.A. Manavski","year":"2007","unstructured":"Manavski, S.A.: CUDA Compatible GPU as an Efficient Hardware Accelerator for AES Cryptography. In: ICSPC 2007, November 2007, pp. 65\u201368. IEEE, Los Alamitos (2007)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Munshi, A.: The OpenCL Specification. Khronos OpenCL Working Group (2009)","DOI":"10.1109\/HOTCHIPS.2009.7478342"},{"key":"5_CR19","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, AES (2001), http:\/\/www.csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"5_CR20","unstructured":"NVIDIA. NVIDIA GeForce 8800 GPU Architecture Overview. Technical Brief TB-02787-001 v0, 9 (2006)"},{"key":"5_CR21","unstructured":"NVIDIA. NVIDIA CUDA Programming Guide 2.3 (2009)"},{"key":"5_CR22","unstructured":"Osvik, D.A.: Cell SPEED. In: SPEED 2007 (2007), http:\/\/www.hyperelliptic.org\/SPEED\/slides\/Osvik_cell-speed.pdf"},{"key":"5_CR23","unstructured":"Otte, D.: AVR-Crypto-Lib (2009), http:\/\/www.das-labor.org\/wiki\/Crypto-avr-lib\/en"},{"key":"5_CR24","first-page":"2","volume-title":"SIGGRAPH 2007","author":"J. Owens","year":"2007","unstructured":"Owens, J.: GPU architecture overview. In: SIGGRAPH 2007, p. 2. ACM, New York (2007)"},{"key":"5_CR25","unstructured":"Poettering, B.: AVRAES: The AES block cipher on AVR controllers (2006), http:\/\/point-at-infinity.org\/avraes\/"},{"key":"5_CR26","unstructured":"Rinne, S., Eisenbarth, T., Paar, C.: Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers. In: SPEED 2007 (2007), http:\/\/www.hyperelliptic.org\/SPEED\/record.pdf"},{"key":"5_CR27","volume-title":"ARM architecture reference manual","author":"D. Seal","year":"2001","unstructured":"Seal, D.: ARM architecture reference manual, 2nd edn. Addison-Wesley Professional, Reading (2001)","edition":"2"},{"key":"5_CR28","unstructured":"Segal, M., Akeley, K.: The OpenGL graphics system: A specification (version 2.0). In: Silicon Graphics, Mountain View, CA (2004)"},{"key":"5_CR29","unstructured":"Shimizu, K., Brokenshire, D., Peyravian, M.: Cell Broadband Engine Support for Privacy, Security, and Digital Rights Management Applications (October 2005), https:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/3F88DA69A1C0AC40872570AB00570985"},{"key":"5_CR30","volume-title":"ARM system developer\u2019s guide: designing and optimizing system software","author":"A. Sloss","year":"2004","unstructured":"Sloss, A., Symes, D., Wright, C.: ARM system developer\u2019s guide: designing and optimizing system software. Morgan Kaufmann Pub., San Francisco (2004)"},{"key":"5_CR31","first-page":"111","volume-title":"ICCAD 2005","author":"O. Takahashi","year":"2005","unstructured":"Takahashi, O., Cook, R., Cottier, S., Dhong, S.H., Flachs, B., Hirairi, K., Kawasumi, A., Murakami, H., Noro, H., Oh, H., Onish, S., Pille, J., Silberman, J.: The circuit design of the synergistic processor element of a Cell processor. In: ICCAD 2005, pp. 111\u2013117. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-79263-5_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"S. Tillich","year":"2008","unstructured":"Tillich, S., Herbst, C.: Boosting AES Performance on a Tiny Processor Core. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 170\u2013186. Springer, Heidelberg (2008)"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-76900-2_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"J. Yang","year":"2007","unstructured":"Yang, J., Goodman, J.: Symmetric Key Cryptography on Modern Graphics Hardware. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 249\u2013264. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Fast Software Encryption"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13858-4_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:44:30Z","timestamp":1606185870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13858-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642138577","9783642138584"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13858-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}