{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:40:01Z","timestamp":1745970001667,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642372872"},{"type":"electronic","value":"9783642372889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37288-9_12","type":"book-chapter","created":{"date-parts":[[2013,3,5]],"date-time":"2013-03-05T13:37:43Z","timestamp":1362490663000},"page":"173-187","source":"Crossref","is-referenced-by-count":1,"title":["Putting together What Fits together - Gr\u00c6Stl"],"prefix":"10.1007","author":[{"given":"Markus","family":"Pelnar","sequence":"first","affiliation":[]},{"given":"Michael","family":"Muehlberghuber","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"NIST: Advanced Encryption Standard (AES) (FIPS PUB 197). National Institute of Standards and Technology (November 2001)"},{"key":"12_CR2","unstructured":"Gauravaram, P., Knudsen, L.R., Matusiewicz, K., Mendel, F., Rechberger, C., Schl\u00e4ffer, M., Thomsen, S.S.: Gr\u00f8stl \u2013 a SHA-3 candidate. Submission to NIST, Round 3 (2011)"},{"key":"12_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak SHA-3 submission. Submission to NIST, Round 3 (2011)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"D. Canright","year":"2005","unstructured":"Canright, D.: A Very Compact S-Box for AES. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 441\u2013455. Springer, Heidelberg (2005)"},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEE Proceedings - Information Security\u00a0152(1), 13\u201320 (2005)","journal-title":"IEE Proceedings - Information Security"},{"key":"12_CR6","first-page":"577","volume-title":"Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006","author":"P. Hamalainen","year":"2006","unstructured":"Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006, pp. 577\u2013583. IEEE Computer Society, Washington, DC (2006)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/11807964_38","volume-title":"Emerging Directions in Embedded and Ubiquitous Computing","author":"J.-P. Kaps","year":"2006","unstructured":"Kaps, J.-P., Sunar, B.: Energy Comparison of AES and SHA-1 for Ubiquitous Computing. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol.\u00a04097, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/11908739_25","volume-title":"Advances in Information and Computer Security","author":"M. Kim","year":"2006","unstructured":"Kim, M., Ryou, J., Choi, Y., Jun, S.: Low Power AES Hardware Architecture for Radio Frequency Identification. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol.\u00a04266, pp. 353\u2013363. Springer, Heidelberg (2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A. Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the Limits: A Very Compact and a Threshold Implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"key":"12_CR10","unstructured":"Tillich, S., Feldhofer, M., Issovits, W., Kern, T., Kureck, H., M\u00fchlberghuber, M., Neubauer, G., Reiter, A., K\u00f6fler, A., Mayrhofer, M.: Compact Hardware Implemenations of the SHA-3 Candidates ARIRANG, BLAKE, Gr\u00f8stl and Skein. In: Auer, M., Pribyl, W., S\u00f6ser, P. (eds.) Proceedings of Austrochip 2009, Graz, Austria, October 7, pp. 69\u201374 (2009)"},{"key":"12_CR11","unstructured":"Katashita, T.: Gr\u00f8stl Compact (August 2012), http:\/\/www.morita-tech.co.jp\/SASEBO\/en\/sha3\/implement.html"},{"key":"12_CR12","unstructured":"Guo, X., Huang, S., Nazhandali, L., Schaumont, P.: Fair and Comprehensive Performance Evaluation of 14 Second Round SHA-3 ASIC Implementations. In: Second SHA-3 Candidate Conference (2010)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-15031-9_17","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"L. Henzen","year":"2010","unstructured":"Henzen, L., Gendotti, P., Guillet, P., Pargaetzi, E., Zoller, M., G\u00fcrkaynak, F.K.: Developing a Hardware Evaluation Method for SHA-3 Candidates. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 248\u2013263. Springer, Heidelberg (2010)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P. Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very Compact FPGA Implementation of the AES Algorithm. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 319\u2013333. Springer, Heidelberg (2003)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11545262_31","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"T. Good","year":"2005","unstructured":"Good, T., Benaissa, M.: AES on FPGA from the Fastest to the Smallest. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 427\u2013440. Springer, Heidelberg (2005)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Huang, C.W., Chang, C.J., Lin, M.Y., Tai, H.Y.: Compact FPGA Implementation of 32-bits AES Algorithm Using Block RAM. In: TENCON 2007 - 2007 IEEE Region 10 Conference, October 30-November 2, pp. 1\u20134 (2007)","DOI":"10.1109\/TENCON.2007.4429126"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-68164-9_2","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"P. Bulens","year":"2008","unstructured":"Bulens, P., Standaert, F.-X., Quisquater, J.-J., Pellegrin, P., Rouvroy, G.: Implementation of the AES-128 on Virtex-5 FPGAs. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 16\u201326. Springer, Heidelberg (2008)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Jungk, B., Apfelbeck, J.: Area-Efficient FPGA Implementations of the SHA-3 Finalists. In: Athanas, P.M., Becker, J., Cumplido, R. (eds.) ReConFig, pp. 235\u2013241. IEEE Computer Society (2011)","DOI":"10.1109\/ReConFig.2011.16"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Jungk, B., Reith, S.: On FPGA-Based Implementations of the SHA-3 Candidate Gr\u00f8stl. In: 2010 International Conference on Reconfigurable Computing and FPGAs (ReConFig), pp. 316\u2013321 (December 2010)","DOI":"10.1109\/ReConFig.2010.21"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Jungk, B.: Evaluation of Compact FPGA Implementations for All SHA-3 Finalists. In: SHA-3 Conference (March 2012)","DOI":"10.1109\/ReConFig.2011.16"},{"key":"12_CR21","unstructured":"Sharif, M.U., Shahid, R., Rogawski, M., Gaj, K.: Use of Embedded FPGA Resources in Implementations of Five Round Three SHA-3 Candidates. In: CRYPT II Hash Workshop 2011 (2011)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-27257-8_14","volume-title":"Smart Card Research and Advanced Applications","author":"S. Kerckhof","year":"2011","unstructured":"Kerckhof, S., Durvaux, F., Veyrat-Charvillon, N., Regazzoni, F., de Dormale, G.M., Standaert, F.-X.: Compact FPGA Implementations of the Five SHA-3 Finalists. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 217\u2013233. Springer, Heidelberg (2011)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Kaps, J.P., Yalla, P., Surapathi, K.K., Habib, B., Vadlamudi, S., Gurung, S.: Lightweight Implementations of SHA-3 Finalists on FPGAs. In: SHA-3 Conference (March 2012)","DOI":"10.1007\/978-3-642-25578-6_20"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Cao, D., Han, J., Yang Zeng, X.: A Reconfigurable and Ultra Low-Cost VLSI Implementation of SHA-1 and MD5 Functions. In: 7th International Conference on ASIC Proceeding \u2013 ICASIC 2007, Guilin, China, October 25-29, pp. 862\u2013865. IEEE (2007)","DOI":"10.1109\/ICASIC.2007.4415767"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Ganesh, T.S., Sudarshan, T.S.B.: ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), Las Vegas, Nevada, USA, April 4-6, vol.\u00a01, pp. 580\u2013585. IEEE Computer Society (2005)","DOI":"10.1109\/ITCC.2005.91"},{"key":"12_CR26","unstructured":"J\u00e4rvinen, K.U., Tommiska, M., Skytt\u00e4, J.: A Compact MD5 and SHA-1 Co-Implementation Utilizing Algorithm Similarities. In: International Conference on Engineering of Reconfigurable Systems and Algorithms \u2013 ERSA 2005, Las Vegas, Nevada, USA, June 27-30, pp. 48\u201354. CSREA Press (2005)"},{"key":"12_CR27","unstructured":"Wang, M.Y., Su, C.P., Huang, C.T., Wu, C.W.: An HMAC Processor with Integrated SHA-1 and MD5 Algorithms. In: Imai, M. (ed.) Proceedings of the Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004 (ASP-DAC), Yokohama, Japan, January 27-30, pp. 456\u2013458. IEEE (2004)"},{"key":"12_CR28","unstructured":"J\u00e4rvinen, K.: Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Gr\u00f8stl. In: Second SHA-3 Candidate Conference (August 2010)"},{"key":"12_CR29","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Using Normal Bases for Compact Hardware Implementations of the AES S-box. In: 6th International Conference Security in Communication Networks (SCN)"},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC Implementation of the AES SBoxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 67\u201378. Springer, Heidelberg (2002)"},{"key":"12_CR31","unstructured":"Xilinx: HDL Coding Practices to Accelerate Design Performance (May 2012), http:\/\/www.xilinx.com\/support\/documentation\/white_papers\/wp231.pdf"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37288-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:40Z","timestamp":1745968240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37288-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642372872","9783642372889"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37288-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}