{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:48:56Z","timestamp":1743058136191,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246685"},{"type":"electronic","value":"9783642246692"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24669-2_29","type":"book-chapter","created":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T10:05:36Z","timestamp":1319277936000},"page":"300-311","source":"Crossref","is-referenced-by-count":3,"title":["Fast Software Implementation of AES-CCM on Multiprocessors"],"prefix":"10.1007","author":[{"given":"Jung Ho","family":"Yoo","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)"},{"key":"29_CR2","unstructured":"IEEE 802.11-2007, IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2007)"},{"key":"29_CR3","unstructured":"IEEE 802.11n-2009, IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Enhancements for Higher Throughput (2009)"},{"key":"29_CR4","unstructured":"Gladman, B.: Cryptographic Technology Interests, \n                    \n                      http:\/\/www.gladman.me.uk\/"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient Software Implementation of AES on 32-Bit Platforms. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 159\u2013171. Springer, Heidelberg (2003)"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Atasu, K., Breveglieri, L., Macchetti, M.: Efficient AES Implementations for ARM Based Platforms. In: SAC 2004, ACM Symposium on Applied Computing, vol.\u00a01, pp. 841\u2013845 (2004)","DOI":"10.1145\/967900.968073"},{"issue":"4","key":"29_CR7","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1093\/ietfec\/e88-a.4.899","volume":"e88-a","author":"Y. Mitsuyama","year":"2005","unstructured":"Mitsuyama, Y., Kimura, M., Onoye, T., Shirakawa, I.: Architecture of IEEE802.11i Cipher Algorithms for Embedded Systems. IEICE Transaction of Fundamentals\u00a0e88-a(4), 899\u2013906 (2005)","journal-title":"IEICE Transaction of Fundamentals"},{"key":"29_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/11894063_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Tillich","year":"2006","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 270\u2013284. Springer, Heidelberg (2006)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Elbirt, A.J.: Fast and Efficient Implementation of AES Via Instruction Set Extensions. In: AINAW 2007, Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, vol.\u00a01 (2007)","DOI":"10.1109\/AINAW.2007.182"},{"issue":"2","key":"29_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1049\/ip-cdt:20050131","volume":"153","author":"I. Gonzalez","year":"2006","unstructured":"Gonzalez, I., Gomez-Arribas, F.J.: Ciphering algorithms in MicroBlaze-based embedded systems. Computers and Digital Techniques, IEE Proceedings\u00a0153(2), 87\u201392 (2006)","journal-title":"Computers and Digital Techniques, IEE Proceedings"},{"key":"29_CR11","unstructured":"Huerta, P., Castillo, J., M\u00e1rtinez, J.I., L\u00f3pez, V.: A MicroBlaze Based Multiprocessor SoC. WSEAS Transactions on Circuits and Systems, 423\u2013430 (2005)"},{"key":"29_CR12","unstructured":"Le\u00f3n, M., Aldeco, R., Merino, S.: Performance Analysis of the Confidentiality Security Service in the IEEE 802.11 using WEP, AES-CCM, and ECC. In: 2nd International Conference on Electrical and Electronics Engineering (2005)"},{"key":"29_CR13","unstructured":"VOCAL Technologies, \n                    \n                      http:\/\/www.vocal.com"},{"key":"29_CR14","unstructured":"Anescu, G.: A C++ Implementation of the Rijndael Encryption\/Decryption method (2002), \n                    \n                      http:\/\/www.codeproject.com\/KB\/security\/aes.aspx"},{"key":"29_CR15","unstructured":"Clapp, C.S.K.: Instruction-level Parallelism in AES Candidates. In: The Second AES Candidate Conference (1999)"},{"key":"29_CR16","unstructured":"Gueron, S.: White Paper - Intel Advanced Encryption Standard (AES) Instructions Set. Intel (2010)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24669-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T17:00:24Z","timestamp":1555174824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24669-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246685","9783642246692"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24669-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}