{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:15:35Z","timestamp":1763457335624},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341168"},{"type":"electronic","value":"9783642341175"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34117-5_4","type":"book-chapter","created":{"date-parts":[[2012,11,2]],"date-time":"2012-11-02T01:30:45Z","timestamp":1351819845000},"page":"51-68","source":"Crossref","is-referenced-by-count":13,"title":["Very Short Critical Path Implementation of AES with Direct Logic Gates"],"prefix":"10.1007","author":[{"given":"Kenta","family":"Nekado","sequence":"first","affiliation":[]},{"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[]},{"given":"Kengo","family":"Iokibe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), FIPS publication 197 (2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"4_CR2","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES Algorithm (Rijndael) Information (1999), \n                    \n                      http:\/\/csrc.nist.gov\/archive\/aes\/rijndael\/Rijndael-ammended.pdf"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"4_CR4","unstructured":"Paar, C.: Efficient VLSI Architectures for Bit\u2013Parallel Computation in Galois Fields. PhD thesis, Institute for Experimental Mathematics, University of Essen, Germany (1994)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-44709-1_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"A. Rudra","year":"2001","unstructured":"Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P.: Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 171\u2013184. Springer, Heidelberg (2001)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-45682-1_15","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Satoh","year":"2001","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 239\u2013254. Springer, Heidelberg (2001)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/3-540-36400-5_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Morioka","year":"2003","unstructured":"Morioka, S., Satoh, A.: An Optimized S-Box Circuit Architecture for Low Power AES Design. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 172\u2013186. Springer, Heidelberg (2003)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-30574-3_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. Mentens","year":"2005","unstructured":"Mentens, N., Batina, L., Preneel, B., Verbauwhede, I.: A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 323\u2013333. Springer, Heidelberg (2005)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D. Canright","year":"2005","unstructured":"Canright, D.: A Very Compact S-Box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 441\u2013455. Springer, Heidelberg (2005)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-15031-9_16","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"Y. Nogami","year":"2010","unstructured":"Nogami, Y., Nekado, K., Toyota, T., Hongo, N., Morikawa, Y.: Mixed Bases for Efficient Inversion in \n                    \n                      \n                    \n                    $\\mathbb{F}_{((2^{2})^{2})^2}$\n                   and Conversion Matrices of SubBytes of AES. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 234\u2013247. Springer, Heidelberg (2010)"},{"issue":"5","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1142\/S0218126610006633","volume":"19","author":"Y. Jeon","year":"2010","unstructured":"Jeon, Y., Kim, Y., Lee, D.: A Compact Memory-free Architecture for the AES Algorithm Using Resource Sharing Methods. Journal of Circuits, Systems, and Computers\u00a019(5), 1109\u20131130 (2010)","journal-title":"Journal of Circuits, Systems, and Computers"},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0166-218X(88)90090-X","volume":"22","author":"R. Mullin","year":"1988","unstructured":"Mullin, R., Onyszchuk, I., Vanstone, S., Wilson, R.: Optimal Normal Bases in GF(p\n                  \n                    n\n                  ). Discrete Applied Mathematics\u00a022(2), 149\u2013161 (1988)","journal-title":"Discrete Applied Mathematics"},{"issue":"9","key":"4_CR13","first-page":"2376","volume":"E86-A","author":"Y. Nogami","year":"2003","unstructured":"Nogami, Y., Saito, A., Morikawa, Y.: Finite Extension Field with Modulus of All\u2013One Polynomial and Representation of Its Elements for Fast Arithmetic Operations. IEICE Transactions\u00a0E86-A(9), 2376\u20132387 (2003)","journal-title":"IEICE Transactions"},{"issue":"3","key":"4_CR14","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A Fast Algorithm for Computing Multiplicative Inverse in GF(2\n                    m\n                  ) Using Normal Basis. Information and Computation\u00a078(3), 171\u2013177 (1988)","journal-title":"Information and Computation"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-540-68914-0_27","volume-title":"Applied Cryptography and Network Security","author":"D. Canright","year":"2008","unstructured":"Canright, D., Batina, L.: A Very Compact \u201cPerfectly Masked\u201d S-Box for AES. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 446\u2013459. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34117-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:29Z","timestamp":1620132329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34117-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341168","9783642341175"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34117-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}