{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:17:49Z","timestamp":1755796669165},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385520"},{"type":"electronic","value":"9783642385537"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38553-7_9","type":"book-chapter","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T20:47:12Z","timestamp":1368046032000},"page":"156-172","source":"Crossref","is-referenced-by-count":55,"title":["NaCl on 8-Bit AVR Microcontrollers"],"prefix":"10.1007","author":[{"given":"Michael","family":"Hutter","sequence":"first","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P. Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"D.J. Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: New Diffie-Hellman Speed Records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 207\u2013228. Springer, Heidelberg (2006), \n                  \n                    http:\/\/cr.yp.to\/papers.html#curve25519"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008), \n                  \n                    http:\/\/cr.yp.to\/papers.html#salsafamily"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-33481-8_9","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"D.J. Bernstein","year":"2012","unstructured":"Bernstein, D.J., Lange, T., Schwabe, P.: The Security Impact of a New Cryptographic Library. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol.\u00a07533, pp. 159\u2013176. Springer, Heidelberg (2012), \n                  \n                    http:\/\/cryptojedi.org\/papers\/#coolnacl"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/11502760_3","volume-title":"Fast Software Encryption","author":"D.J. Bernstein","year":"2005","unstructured":"Bernstein, D.J.: The Poly1305-AES Message-Authentication Code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 32\u201349. Springer, Heidelberg (2005), \n                  \n                    http:\/\/cr.yp.to\/papers.html#poly1305"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards Curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 389\u2013405. Springer, Heidelberg (2008), \n                  \n                    http:\/\/cr.yp.to\/papers.html#twisted"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-23951-9_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high-security signatures. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 124\u2013142. Springer, Heidelberg (2011); see also full version [8]"},{"issue":"2","key":"9_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"D.J. Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high-security signatures. Journal of Cryptographic Engineering\u00a02(2), 77\u201389 (2012) see also short version [7], \n                  \n                    http:\/\/cryptojedi.org\/papers\/#ed25519","journal-title":"Journal of Cryptographic Engineering"},{"key":"9_CR9","unstructured":"Bernstein, D.J., Lange, T.: eBACS: ECRYPT benchmarking of cryptographic systems, \n                  \n                    http:\/\/bench.cr.yp.to\n                  \n                  \n                 (accessed January 31, 2013)"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-33027-8_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"D.J. Bernstein","year":"2012","unstructured":"Bernstein, D.J., Schwabe, P.: NEON crypto. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol.\u00a07428, pp. 320\u2013339. Springer, Heidelberg (2012), \n                  \n                    http:\/\/cryptojedi.org\/papers\/#neoncrypto"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Chu, D., Gro\u00dfsch\u00e4dl, J., Liu, Z.: Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes. Cryptology ePrint Archive: Report 2012\/730 (2012)","DOI":"10.1145\/2484389.2484398"},{"key":"9_CR12","unstructured":"European Network of Excellence in Cryptology II, \n                  \n                    http:\/\/www.ecrypt.eu.org\/index.html\n                  \n                  \n                 (accessed January 18, 2013)"},{"key":"9_CR13","unstructured":"Efton. 8051 and AVR Cryptolibrary, \n                  \n                    http:\/\/www.efton.sk\/crypt\/index.htm"},{"issue":"6","key":"9_CR14","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T. Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers - Design and Test of ICs for Secure Embedded Computing\u00a024(6), 522\u2013533 (2007) ISSN 0740-7475","journal-title":"IEEE Design & Test of Computers - Design and Test of ICs for Secure Embedded Computing"},{"key":"9_CR15","unstructured":"Das\u00a0Labor e.V. AVR-Crypto-Lib, \n                  \n                    http:\/\/www.das-labor.org\/wiki\/AVR-Crypto-Lib\/en"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 326\u2013343. Springer, Heidelberg (2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/522\/"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Hlav\u00e1\u010d, J., L\u00f3rencz, R., Had\u00e1\u010dek, M.: True random number generation on an Atmel AVR microcontroller. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol.\u00a02, pp. 493\u2013495. IEEE (2010)","DOI":"10.1109\/ICCET.2010.5485568"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-23951-9_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M. Hutter","year":"2011","unstructured":"Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 459\u2013474. Springer, Heidelberg (2011)"},{"key":"9_CR20","first-page":"595","volume":"7","author":"A. Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of Multidigit Numbers on Automata. Soviet Physics-Doklady\u00a07, 595\u2013596 (1963); Translated from Doklady Akademii Nauk SSSR\u00a0145(2), 293\u2013294 (July 1962)","journal-title":"Soviet Physics-Doklady"},{"key":"9_CR21","unstructured":"Kargl, A., Pyka, S., Seuschek, H.: Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography. IACR Cryptology ePrint Archive, report 2008\/442 (October 2008), \n                  \n                    http:\/\/eprint.iacr.org\/2008\/442"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"9_CR23","unstructured":"Lange, T.: Vampire \u2013 virtual applications and implementations research lab (2007), \n                  \n                    http:\/\/hyperelliptic.org\/ECRYPTII\/vampire\/\n                  \n                  \n                 (accessed January 28, 2013)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, MO, April 22\u201324, pp. 245\u2013256 (April 2008)","DOI":"10.1109\/IPSN.2008.47"},{"key":"9_CR25","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2013 Revealing the Secrets of Smart Cards. Springer (2007) ISBN 978-0-387-30857-9"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: International Symposium on Industrial Embedded Systems, SIES 2008, pp. 58\u201366 (June 2008)","DOI":"10.1109\/SIES.2008.4577681"},{"issue":"177","key":"9_CR27","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048(177), 243\u2013264 (1987), \n                  \n                    http:\/\/www.ams.org\/journals\/mcom\/1987-48-177\/S0025-5718-1987-0866113-7\/S0025-5718-1987-0866113-7.pdf","journal-title":"Mathematics of Computation"},{"key":"9_CR28","unstructured":"National Institute of Standards and Technology (NIST). FIPS-180-3: Secure Hash Standard (October 2008), \n                  \n                    http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"9_CR29","unstructured":"Center of\u00a0Mathematical Modeling\u00a0Sigma. CRS-AVR010X-ECC, \n                  \n                    http:\/\/www.cmmsigma.eu\/products\/crypto\/crs_avr010x.en.html"},{"key":"9_CR30","unstructured":"Scott, M.: MIRACLE \u2013 A Multiprecision Integer and Rational Arithmetic C\/C++ Library (2003), \n                  \n                    http:\/\/www.shamus.ie"},{"key":"9_CR31","first-page":"806","volume":"70","author":"E.G. Straus","year":"1964","unstructured":"Straus, E.G.: Addition chains of vectors (problem 5125). American Mathematical Monthly\u00a070, 806\u2013808 (1964), \n                  \n                    http:\/\/cr.yp.to\/bib\/1964\/straus.html","journal-title":"American Mathematical Monthly"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P. Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73275-4_6","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Uhsadel","year":"2007","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 73\u201386. Springer, Heidelberg (2007)"},{"key":"9_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/11935308_37","volume-title":"Information and Communications Security","author":"H. Wang","year":"2006","unstructured":"Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 519\u2013528. Springer, Heidelberg (2006)"},{"key":"9_CR35","unstructured":"Wenzel-Benner, C., Gr\u00e4f, J.: XBX: eXternal Benchmarking eXtension, \n                  \n                    http:\/\/xbx.das-labor.org\/trac\/wiki\/WikiStart\n                  \n                  \n                 (accessed January 31, 2013)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38553-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T19:45:30Z","timestamp":1557690330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38553-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385520","9783642385537"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38553-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}