{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T04:46:38Z","timestamp":1764305198526},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642150302"},{"type":"electronic","value":"9783642150319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_20","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"294-305","source":"Crossref","is-referenced-by-count":10,"title":["XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework"],"prefix":"10.1007","author":[{"given":"Christian","family":"Wenzel-Benner","sequence":"first","affiliation":[]},{"given":"Jens","family":"Gr\u00e4f","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Bernstein, D.J., Lange, T. (eds.): eBACS: ECRYPT Benchmarking of Cryptographic Systems, \n                    \n                      http:\/\/bench.cr.yp.to\n                    \n                    \n                   (accessed November 5, 2009)"},{"key":"20_CR2","unstructured":"NIST: First SHA-3 Candidate Conference, \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round1\/Feb2009\/program.html\n                    \n                    \n                   (accessed February 27, 2010)"},{"key":"20_CR3","unstructured":"Bernstein, D.J.: Cache-timing attacks on AES, \n                    \n                      http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf\n                    \n                    \n                   (accessed February 27, 2010)"},{"key":"20_CR4","unstructured":"Ideguchi, K., Owada, T., Yoshida, H.: A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs, \n                    \n                      http:\/\/www.sdl.hitachi.co.jp\/crypto\/lesamnta\/A_Study_on_RAM_Requirements.pdf\n                    \n                    \n                   (accessed February 27, 2010)"},{"key":"20_CR5","unstructured":"Otte, D., et al.: AVR Crypto Lib., \n                    \n                      http:\/\/www.das-labor.org\/wiki\/AVR-Crypto-Lib\/en\n                    \n                    \n                   (accessed February 27, 2010)"},{"key":"20_CR6","unstructured":"Radig, U.: AVR Webserver Software, \n                    \n                      http:\/\/www.ulrichradig.de\/\n                    \n                    \n                   (accessed February 27, 2010)"},{"key":"20_CR7","unstructured":"Pollin: AVR-Net-IO Board, \n                    \n                      http:\/\/www.pollin.de\/shop\/downloads\/D810058B.PDF\n                    \n                    \n                   (accessed February 28, 2010)"},{"key":"20_CR8","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family Submission to NIST, Round 2 (2009)"},{"key":"20_CR9","unstructured":"Gligoroski, D., Klima, V., Knapskog, S.J., El-Hadedy, M., Amundsen, J., Mj\u00f8lsnes, S.F.: Cryptographic Hash Function BLUE MIDNIGHT WISH Submission to NIST, Round 2 (2009)"},{"key":"20_CR10","unstructured":"Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.-F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.-R., Thuillet, C., Videau, M.: - Shabal, a Submission to NIST\u2019s Cryptographic Hash Algorithm Competition Submission to NIST (2008)"},{"key":"20_CR11","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE Submission to NIST (2008)"},{"key":"20_CR12","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications Submission to NIST, Round 2 (2009)"},{"key":"20_CR13","unstructured":"Bernstein, D.J.: CubeHash specification (2.B.1) Submission to NIST, Round 2 (2009)"},{"key":"20_CR14","unstructured":"ARM: Whitepaper about the Cortex-M3, \n                    \n                      http:\/\/www.arm.com\/files\/pdf\/IntroToCortex-M3.pdf\n                    \n                    \n                   (accessed February 28, 2010)"},{"key":"20_CR15","unstructured":"Intel: Presskit on Moore\u2019s law, \n                    \n                      http:\/\/www.intel.com\/pressroom\/kits\/events\/moores_law_40th\/\n                    \n                    \n                   (accessed February 28, 2010)"},{"key":"20_CR16","unstructured":"Intel: Pentium 3 datasheet, \n                    \n                      http:\/\/developer.intel.com\/design\/pentiumiii\/datashts\/245264.htm\n                    \n                    \n                   (accessed February 28, 2010)"},{"key":"20_CR17","unstructured":"Bernstein, D.J., Lange, T. (eds.): SUPERCOP benchmarking results. See results for computer \u2019manneke\u2019, \n                    \n                      http:\/\/bench.cr.yp.to\/results-hash.html\n                    \n                    \n                   (accessed February 27, 2010)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:45:14Z","timestamp":1619786714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}