{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:21:30Z","timestamp":1745986890225,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642361395"},{"type":"electronic","value":"9783642361401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36140-1_11","type":"book-chapter","created":{"date-parts":[[2013,1,28]],"date-time":"2013-01-28T04:18:48Z","timestamp":1359346728000},"page":"149-164","source":"Crossref","is-referenced-by-count":0,"title":["On Using Instruction-Set Extensions for Minimizing the Hardware-Implementation Costs of Symmetric-Key Algorithms on a Low-Resource Microcontroller"],"prefix":"10.1007","author":[{"given":"Hannes","family":"Gro\u00df","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Plos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Aigner, M., Burbridge, T., Ilic, A., Lyon, D., Soppera, A., Lehtonen, M.: RFID Tag Security. Building Radio Frequency IDentification for the Global Environment (BRIDGE), European Commission Contract No. IST-2005-03346, White Paper (2008)"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A.A. Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1145\/378993.379238","volume-title":"ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"J. Burke","year":"2000","unstructured":"Burke, J., McDonald, J., Austin, T.: Architectural Support for Fast Symmetric-Key Cryptography. In: ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, pp. 178\u2013189. ACM Press, New York (2000)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-642-11925-5_21","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J.Y. Cho","year":"2010","unstructured":"Cho, J.Y.: Linear Cryptanalysis of Reduced-Round PRESENT. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 302\u2013317. Springer, Heidelberg (2010)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Constantin, J., Burg, A., G\u00fcrkaynak, F.K.: Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture. Cryptology ePrint Archive, Report 2012\/050 (2012), http:\/\/eprint.iacr.org\/","DOI":"10.1109\/ASAP.2012.13"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T. Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol.\u00a07374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers - Design and Test of ICs for Secure Embedded Computing\u00a024(6), 522\u2013533 (2007) ISSN 0740-7475","DOI":"10.1109\/MDT.2007.178"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Elbirt, A.J.: Fast and Efficient Implementation of AES via Instruction Set Extensions. In: Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW 2007), vol.\u00a01, pp. 396\u2013403. IEEE Computer Society (May 2007)","DOI":"10.1109\/AINAW.2007.182"},{"key":"11_CR9","unstructured":"EnSilica. A study of AES and its efficient implementation on eSi-RISC. WhitePaper (January 2010)"},{"key":"11_CR10","unstructured":"Faraday Technology Corporation. Faraday FSA0A_C 0.13 \u03bcm ASIC Standard Cell Library (2004), Details available online, http:\/\/www.faraday-tech.com"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Feldhofer, M., Wolkerstorfer, J.: Hardware Implementation of Symmetric Algorithms for RFID Security. In: RFID Security: Techniques, Protocols and System-On-Chip Design, pp. 373\u2013415. Springer (2008)","DOI":"10.1007\/978-0-387-76481-8_15"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-540-85053-3_21","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"P. Grabher","year":"2008","unstructured":"Grabher, P., Gro\u00dfsch\u00e4dl, J., Page, D.: Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 331\u2013345. Springer, Heidelberg (2008)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Hodjat, A., Verbauwhede, I.: Interfacing a High Speed Crypto Accelerator to an Embedded CPU. In: Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers, vol.\u00a01, pp. 488\u2013492. IEEE (November 2004)","DOI":"10.1109\/ACSSC.2004.1399180"},{"key":"11_CR14","unstructured":"International Organisation for Standardization (ISO). ISO\/IEC 7816-4: Information technology - Identification cards - Integrated circuit(s) cards with contacts - Part 4: Interindustry commands for interchange (1995), http:\/\/www.iso.org"},{"key":"11_CR15","unstructured":"International Organisation for Standardization (ISO). ISO\/IEC 29192-2: Information technology \u2013 Security techniques \u2013 Lightweight cryptography \u2013 Part 2: Block ciphers (2012), http:\/\/www.iso.org"},{"key":"11_CR16","unstructured":"International Organization for Standardization (ISO). ISO\/IEC 14443-4: Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards - Part4: Transmission Protocol (2008), http:\/\/www.iso.org"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-008-0059-9","volume":"8","author":"J. Lu","year":"2009","unstructured":"Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security\u00a08, 1\u201311 (2009)","journal-title":"International Journal of Information Security"},{"key":"11_CR18","unstructured":"Mace, F., Standaert, F.-X., Quisquater, J.-J.: ASIC Implementations of the Block Cipher SEA for Constrained Applications. In: Munilla, J., Peinado, A., Rijmen, V. (eds.) Workshop on RFID Security 2007 (RFIDSec 2007), Malaga, Spain, July 11-13, pp. 103\u2013114 (2007)"},{"key":"11_CR19","unstructured":"Microchip Technology Inc. AN953: Data Encryption Routines for PIC18 Microcontrollers (January 2005), http:\/\/ww1.microchip.com\/downloads\/en\/AppNotes\/00953a.pdf"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Nadehara, K., Ikekawa, M., Kuroda, I.: Extended Instructions for the AES Cryptography and their Efficient Implementation. In: IEEE Workshop on Signal Processing Systems (SIPS 2004), Austin, Texas, USA, pp. 152\u2013157. IEEE Press (October 2004)","DOI":"10.1109\/SIPS.2004.1363041"},{"key":"11_CR21","unstructured":"Needham, R.M., Wheeler, D.J.: Tea extensions. Technical report, Computer Laboratory, University of Cambridge (October 1997)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"O\u2019Melia, S., Elbirt, A.: Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. In: Annual Computer Security Applications Conference, ACSAC 2008, pp. 465\u2013474 (December 2008)","DOI":"10.1109\/ACSAC.2008.10"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Plos, T., Feldhofer, M.: Hardware Implementation of a Flexible Tag Platform for Passive RFID Devices. In: Proceedings of the 14th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2011), Oulu, Finland, pp. 293\u2013300. IEEE Computer Society (August 2011) ISBN 978-1-4577-1048-3","DOI":"10.1109\/DSD.2011.43"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-19574-7_8","volume-title":"Selected Areas in Cryptography","author":"T. Plos","year":"2011","unstructured":"Plos, T., Gro\u00df, H., Feldhofer, M.: Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 114\u2013129. Springer, Heidelberg (2011)"},{"key":"11_CR25","unstructured":"Poschmann, A.Y.: Lightweight Cryptography - Cryptographic Engineering for a Pervasive World. PhD thesis, Faculty of Electrical Engineering and Information Technology, Ruhr-University Bochum, Germany (February 2009)"},{"key":"11_CR26","unstructured":"Rinne, S., Eisenbarth, T., Paar, C.: Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers (June 2007), http:\/\/www.crypto.ruhr-uni-bochum.de\/imperia\/md\/content\/texte\/publications\/conferences\/lw_speed2007.pdf"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-85893-5_7","volume-title":"Smart Card Research and Advanced Applications","author":"C. Rolfes","year":"2008","unstructured":"Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-Lightweight Implementations for Smart Devices \u2013 Security for 1000 Gate Equivalents. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 89\u2013103. Springer, Heidelberg (2008)"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/11733447_16","volume-title":"Smart Card Research and Advanced Applications","author":"F.-X. Standaert","year":"2006","unstructured":"Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol.\u00a03928, pp. 222\u2013236. Springer, Heidelberg (2006)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/11894063_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"S. Tillich","year":"2006","unstructured":"Tillich, S., Gro\u00dfsch\u00e4dl, J.: Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 270\u2013284. Springer, Heidelberg (2006)"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-79263-5_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"S. Tillich","year":"2008","unstructured":"Tillich, S., Herbst, C.: Boosting AES Performance on a Tiny Processor Core. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 170\u2013186. Springer, Heidelberg (2008)"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","volume-title":"Fast Software Encryption","author":"D.J. Wheeler","year":"1995","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm.. In: Preneel, B. (ed.) FSE 1994. LNCS, vol.\u00a01008, pp. 363\u2013366. Springer, Heidelberg (1995)"},{"key":"11_CR32","unstructured":"Yan, H., Jianyun, H., Qiang, L., Hao, M.: Design of low-power baseband-processor for RFID tag. In: Proceedings International Symposium on Applications and the Internet Workshops (SAINT 2006), Phoenix, Arizona, USA, January 23-27, pp. 4\u20137. IEEE Computer Society (2006)"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-25513-7_7","volume-title":"Cryptology and Network Security","author":"H. Yap","year":"2011","unstructured":"Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol.\u00a07092, pp. 76\u201397. Springer, Heidelberg (2011)"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Yu, Y., Yang, Y., Yan, N., Min, H.: A Novel Design of Secure RFID Tag Baseband. In: RFID Convocation, Brussels, Belgium, March 14 (2007)","DOI":"10.1109\/WICOM.2007.516"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification. Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36140-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:39:58Z","timestamp":1745951998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36140-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642361395","9783642361401"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36140-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}