{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:54:55Z","timestamp":1775040895022,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":70,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642545672","type":"print"},{"value":"9783642545689","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_21","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"333-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Lightweight Cryptography for Embedded Systems \u2013 A Comparative Analysis"],"prefix":"10.1007","author":[{"given":"Charalampos","family":"Manifavas","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Hatzivasilis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Fysarakis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos","family":"Rantos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"21_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-20465-4_6","volume-title":"EUROCRYPT 2011","author":"A Moradi","year":"2011","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 69\u201388. Springer, Heidelberg (2011)"},{"key":"21_CR2","unstructured":"Poschmann, A.: Lightweight cryptography - cryptographic engineering for a pervasive world. Ph.D. Dissertation, Faculty of Electrical Engineering and Information Technology, Ruhr-University Bochum, Germany (2009)"},{"issue":"1","key":"21_CR3","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1504\/IJWMC.2007.013798","volume":"2","author":"M Hell","year":"2007","unstructured":"Hell, M., Johansson, T., Meier, W.: Grain - a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(1), 86\u201393 (2007)","journal-title":"Int. J. Wirel. Mob. Comput."},{"key":"21_CR4","unstructured":"De Canniere, C., Prenel, B.: Trivium Specifications. eStream Project.\u00a0http:\/\/www.ecrypt.eu.org\/stream\/triviump3.html (2008)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Watanabe, D., Ideguchi, K., Kitahara, J., Muto, K., Furuichi, H.: Enocoro-80: a hardware oriented stream cipher. In: Third International Conference on Availability Reliability and Security (ARES 08), 4\u20137 March 2008, pp. 1294\u20131300 (2008)","DOI":"10.1109\/ARES.2008.84"},{"key":"21_CR6","series-title":"LNCS","first-page":"401","volume-title":"SAC 2008","author":"D Hein","year":"2009","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC is ready for RFID - a proof in silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401\u2013413. Springer, Heidelberg (2009)"},{"issue":"4","key":"21_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11036-007-0024-2","volume":"12","author":"R Roman","year":"2007","unstructured":"Roman, R., Alcaraz, C., Lopez, J.: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. J. Mob. Netw. Appl. 12(4), 231\u2013244 (2007)","journal-title":"J. Mob. Netw. Appl."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Nizamuddin, N., Ashraf Ch, S., Nasar, W., Javaid, Q.: Efficient signcryption schemes based on hyperlliptic curve cryptosystem. In: 7th International Conference on Emerging Technologies (ICET), pp. 1\u20134 (2011)","DOI":"10.1109\/ICET.2011.6048467"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Guneysu, T., Heyse, S., Paar, C.: The future of high-speed cryptography: new computing platforms and new ciphers. In: Proceedings of the 21st Edition of the Great Lakes Symposium on VLSI (GLSVLSI\u201911) (2011)","DOI":"10.1145\/1973009.1973112"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Shen, X., Du, Z., Chen, R.: Research on NTRU algorithm for mobile java security. In: International Conference on Scalable Computing and Communications, The Eighth International Conference on Embedded, Computing 2009, SCALCOM-EMBEDDEDCOM\u201909, pp 366\u2013369 (2009)","DOI":"10.1109\/EmbeddedCom-ScalCom.2009.72"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Kamal, A.A., Youssef, A.M.: An FPGA implementation of the NTRUEncrypt cryptosystem. In: 2009 International Conference on Microelectronics (ICM), pp. 209\u2013212 (2009)","DOI":"10.1109\/ICM.2009.5418649"},{"key":"21_CR12","series-title":"LNCS","first-page":"450","volume-title":"CHES 2007","author":"AA Bogdanov","year":"2007","unstructured":"Bogdanov, A.A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: The 7th Workshop of RFID Security and Privacy (RFIDSec 2011), Amherst, Massachusetts, USA (2011)","DOI":"10.1007\/978-3-642-25286-0_2"},{"key":"21_CR14","series-title":"LNCS","first-page":"272","volume-title":"CHES 2009","author":"C De Canni\u00e8re","year":"2009","unstructured":"De Canni\u00e8re, C., Dunkelman, O., Kne\u017eevi\u0107, M.: KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272\u2013288. Springer, Heidelberg (2009)"},{"key":"21_CR15","series-title":"LNCS","first-page":"196","volume-title":"FSE 2007","author":"G Leander","year":"2007","unstructured":"Leander, G., Paar, C., Poschmann, A., Schramm, K.: New lightweight DES variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196\u2013210. Springer, Heidelberg (2007)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Akishita, T., Hiwatari, H.: Very compact hardware implementations of the blockcipher CLEFIA. Sony Corporation, Technical Paper, June 2011. http:\/\/www.sony.co.jp\/Products\/cryptography\/clefia\/download\/data\/clefia-hwcompact-20110615.pdf (2011)","DOI":"10.1007\/978-3-642-28496-0_17"},{"key":"21_CR17","series-title":"LNCS","first-page":"222","volume-title":"CARDIS 2006","author":"F-X Standaert","year":"2006","unstructured":"Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: a scalable encryption algorithm for small embedded applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 222\u2013236. Springer, Heidelberg (2006)"},{"key":"21_CR18","unstructured":"Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight, versatile block cipher. In: ECRYPT Workshop on Lightweight Cryptography (LC11), 28\u201329 November, pp. 146\u2013169 (2011)"},{"key":"21_CR19","series-title":"LNCS","first-page":"327","volume-title":"ACNS 2011","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011)"},{"key":"21_CR20","series-title":"LNCS","first-page":"326","volume-title":"CHES 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326\u2013341. Springer, Heidelberg (2011)"},{"key":"21_CR21","series-title":"LNCS","first-page":"1","volume-title":"RFIDSec 2011","author":"Z Gong","year":"2012","unstructured":"Gong, Z., Nikova, S., Law, Y.W.: KLEIN: a new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1\u201318. Springer, Heidelberg (2012). http:\/\/rfid-cusp.org\/rfidsec\/"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Wang, C., Heys, H.M.: An ultra compact block cipher for serialized architecture implementations. In: Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2009), St. John\u2019s, Newfoundland, May 2009 (2009)","DOI":"10.1109\/CCECE.2009.5090296"},{"key":"21_CR23","series-title":"LNCS","first-page":"342","volume-title":"CHES 2011","author":"K Shibutani","year":"2011","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342\u2013357. Springer, Heidelberg (2011)"},{"key":"21_CR24","series-title":"LNCS","first-page":"76","volume-title":"CANS 2011","author":"H Yap","year":"2011","unstructured":"Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: EPCBC - a block cipher suitable for electronic product code encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 76\u201397. Springer, Heidelberg (2011)"},{"key":"21_CR25","series-title":"LNCS","first-page":"16","volume-title":"CHES 2010","author":"L Knudsen","year":"2010","unstructured":"Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: a block cipher for IC-printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 16\u201332. Springer, Heidelberg (2010)"},{"key":"21_CR26","unstructured":"eSTREAM Web Page. http:\/\/www.ecrypt.eu.org\/stream"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Luo, Y., Chai, Q., Gong, G., Lai, X.: A lightweight stream cipher WG-7 for RFID encryptionand authentication. In: IEEE Global Telecommunications Conference 2010 (GLOBECOM 2010), pp. 1-6 (2010)","DOI":"10.1109\/GLOCOM.2010.5684215"},{"key":"21_CR28","first-page":"176","volume":"2011","author":"M David","year":"2011","unstructured":"David, M., Ranasinghe, D.C., Larsen, T.: A2U2: a stream cipher for printed electronics RFID tags. IEEE International Conference on RFID 2011, 176\u2013183 (2011)","journal-title":"IEEE International Conference on RFID"},{"key":"21_CR29","unstructured":"O\u2019Neill, M.: Low-Cost SHA-1 hash function architecture for RFID tags. In: Dominikus, S., Aigner, M. (eds.) RFIDSec 2008. http:\/\/events.iaik.tugraz.at\/RFIDSec08\/Papers\/ (2008)"},{"key":"21_CR30","series-title":"LNCS","first-page":"372","volume-title":"OTM 2006 Workshops","author":"M Feldhofer","year":"2006","unstructured":"Feldhofer, M., Rechberger, C.: A case against currently used hash functions in RFID protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 372\u2013381. Springer, Heidelberg (2006)"},{"key":"21_CR31","series-title":"LNCS","first-page":"283","volume-title":"CHES 2008","author":"A Bogdanov","year":"2008","unstructured":"Bogdanov, A., Leander, G., Paar, Ch., Poschmann, A., Robshaw, M.J.B., Seurin, Y.: Hash functions and RFID tags: mind the gap. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 283\u2013299. Springer, Heidelberg (2008)"},{"key":"21_CR32","unstructured":"SHA-3 Contest. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round3\/submissions_rnd3.html"},{"key":"21_CR33","unstructured":"Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R., Sharif, M.U.: Comprehensive evaluation of high-speed and medium speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. In: The 3rd SHA-3 Candidate Conference, Washington, D.C., 22\u201323 March 2012 (2012)"},{"key":"21_CR34","series-title":"LNCS","first-page":"258","volume-title":"RFIDSec 2010","author":"EB Kavun","year":"2010","unstructured":"Kavun, E.B., Yalcin, T.: A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 258\u2013269. Springer, Heidelberg (2010)"},{"key":"21_CR35","series-title":"LNCS","first-page":"144","volume-title":"FSE 2008","author":"A Shamir","year":"2008","unstructured":"Shamir, A.: SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 144\u2013157. Springer, Heidelberg (2008)"},{"key":"21_CR36","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-642-31410-0_19","volume-title":"AFRICACRYPT 2012","author":"TP Berger","year":"2012","unstructured":"Berger, T.P., D\u2019Hayer, J., Marquet, K., Minier, M., Thomas, G.: The GLUON family: a lightweight hash function family based on FCSRs. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 306\u2013323. Springer, Heidelberg (2012)"},{"key":"21_CR37","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Naya-Plasencia, M.: QUARK: A"},{"key":"21_CR38","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22792-9_13","volume-title":"CRYPTO 2011","author":"J Guo","year":"2011","unstructured":"Guo, J., Peyrin, T., Poschmann, A.: The $${\\sf {PHOTON}}$$ family of lightweight hash functions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 222\u2013239. Springer, Heidelberg (2011)"},{"key":"21_CR39","series-title":"LNCS","first-page":"312","volume-title":"CHES 2011","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Kne\u017eevi\u0107, M., Leander, G., Toz, D., Var\u0131c\u0131, K., Verbauwhede, I.: $${\\sf {spongent}}$$: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312\u2013325. Springer, Heidelberg (2011)"},{"key":"21_CR40","series-title":"LNCS","first-page":"104","volume-title":"CARDIS 2008","author":"S Rohde","year":"2008","unstructured":"Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C.: Fast hash-based signatures on constrained devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 104\u2013117. Springer, Heidelberg (2008)"},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Oren, Y., Feldhofer, M.: WIPR - a low-resource public-key identification scheme for RFID tags and sensor nodes. In: Basin, D.A., Capkun, S., Lee, W. (eds.) WISEC, pp. 59\u201368. ACM (2009)","DOI":"10.1145\/1514274.1514283"},{"key":"21_CR42","doi-asserted-by":"crossref","unstructured":"Saarinen, M.-J.O.: The BlueJay ultra-lightweight hybrid cryptosystem. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), 24\u201325 May 2012, pp. 27\u201332 (2012)","DOI":"10.1109\/SPW.2012.11"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Kumar, N., Ojha, S., Jain, K., Sangeeta, L.: BEAN: a lightweight stream cipher. In: Proceedings of the 2nd International Conference on Security of Information and Networks (SIN \u201909), pp. 168\u2013171 (2009)","DOI":"10.1145\/1626195.1626238"},{"issue":"5","key":"21_CR44","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.4304\/jcp.7.5.1278-1283","volume":"7","author":"Y Tian","year":"2012","unstructured":"Tian, Y., Chen, G., Li, J.: QUAVIUM - a new stream cipher inspired by TRIVIUM. J. Comput. 7(5), 1278\u20131283 (2012). doi:10.4304\/jcp.7.5.1278-1283","journal-title":"J. Comput."},{"issue":"6","key":"21_CR45","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Paar, C., Poschmann, A., Kumar, S., Uhsadel, L.: A survey of lightweight cryptography implementations. IEEE Des. Test Comput. 24(6), 522\u2013533 (2007)","journal-title":"IEEE Des. Test Comput."},{"key":"21_CR46","first-page":"349","volume":"3","author":"C Paar","year":"2009","unstructured":"Paar, C., Poschmann, A., Robshaw, M.J.B.: New design in lightweight symmetric encryption. RFID Secur. 3, 349\u2013371 (2009)","journal-title":"RFID Secur."},{"issue":"1","key":"21_CR47","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.compeleceng.2011.11.022","volume":"38","author":"P Kitsos","year":"2012","unstructured":"Kitsos, P., Sklavos, N., Parousi, M., Skodras, A.N.: A comparative study of hardware architectures for lightweight block ciphers. J. Comput. Electr. Eng. 38(1), 148\u2013160 (2012)","journal-title":"J. Comput. Electr. Eng."},{"key":"21_CR48","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., et al.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"issue":"2","key":"21_CR49","first-page":"65","volume":"2","author":"AP Anjali","year":"2012","unstructured":"Anjali, A.P., Saibal, K.P.: A survey of Cryptanalysis attacks on lightweight block ciphers. IRACST - Int. J. Comput. Sci. Inf. Secur. (IJCSITS) 2(2), 65 (2012)","journal-title":"IRACST - Int. J. Comput. Sci. Inf. Secur. (IJCSITS)"},{"key":"21_CR50","series-title":"LNCS","first-page":"16","volume-title":"LightSec 2013","author":"F Karako\u00e7","year":"2013","unstructured":"Karako\u00e7, F., Demirci, H., Harmanc\u0131, A.E.: ITUbee: a software oriented lightweight block cipher. In: Avoine, G., Kara, O. (eds.) LightSec 2013. LNCS, vol. 8162, pp. 16\u201327. Springer, Heidelberg (2013)"},{"key":"21_CR51","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR, Cryptology ePrint Archive, 2013. http:\/\/eprint.iacr.org\/2013\/404.pdf (2013)"},{"key":"21_CR52","unstructured":"Mentens, N., Genoe, J., Preneel, B., Verbauwhede, I.: A low-cost implementation of Trivium. In: ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, pp. 197\u2013204 (2008)"},{"key":"21_CR53","unstructured":"Good, T., Benaissa, M.: Hardware performance of eStream Phase-iii stream cipher candidates. In: State of the Art of Stream Ciphers Workshop (SASC 2008), February 2008, pp. 163\u2013173 (2008)"},{"key":"21_CR54","unstructured":"Zhilyaev, S.: Evaluating a new MAC for current and next generation RFID. Master thesis, University of Massachusetts Amherst (2010). http:\/\/scholarworks.umass.edu\/cgi\/viewcontent.cgi?article=1477&context=theses"},{"key":"21_CR55","doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks\u2014revisited. In: Castellucia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.), ESAS 2004. LNCS, vol. 3312, pp. 2\u201318. Springer, Heideberg (2005)","DOI":"10.1007\/978-3-540-30496-8_2"},{"key":"21_CR56","unstructured":"Agren, M.: On some symmetric lightweight cryptographic designs. Ph.D. dissertation, Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University (2012)."},{"issue":"9","key":"21_CR57","first-page":"1338","volume":"5","author":"M Cakiroglu","year":"2010","unstructured":"Cakiroglu, M.: Software implementation and performance comparison of popular block ciphers on 8-bit low-cost microcontroller. Int. J. Phys. Sci. 5(9), 1338\u20131343 (2010)","journal-title":"Int. J. Phys. Sci."},{"key":"21_CR58","unstructured":"Rinne, S., Eisenbarth, T., Paar, C.: Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers (2011)"},{"key":"21_CR59","unstructured":"Bos, J.W., Osvik, D.A., Stefan, D.: Fast implementations of AES on various platforms. In: SPEED-CC - Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers (2009)"},{"key":"21_CR60","unstructured":"Boesgaard, M., Vesterager, M., Christensen, T., Zenner, E.: The stream cipher rabbit 1. http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/rabbit\/rabbit_p3.pdf (2010)"},{"key":"21_CR61","doi-asserted-by":"crossref","unstructured":"Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers. In: Workshop Record State of the Art of Stream Ciphers (SASC 07). Also submitted in: The eSTREAM Project (2007)","DOI":"10.1109\/SIES.2008.4577681"},{"key":"21_CR62","unstructured":"Otte, D.: AVR-Crypto-Lib. http:\/\/www.das-labor.org\/wiki\/AVR-Crypto-Lib\/en (2009)"},{"key":"21_CR63","series-title":"LNCS","first-page":"3","volume-title":"FC 2010 Workshops","author":"D Engels","year":"2010","unstructured":"Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: $${\\sf {Hummingbird}}$$: ultra-lightweight cryptography for resource-constrained devices. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol. 6054, pp. 3\u201318. Springer, Heidelberg (2010)"},{"key":"21_CR64","series-title":"LNCS","first-page":"398","volume-title":"CHES 2010","author":"S Badel","year":"2010","unstructured":"Badel, S., Da\u011ftekin, N., Nakahara Jr, J., Ouafi, K., Reff\u00e9, N., Sepehrdad, P., Su\u0161il, P., Vaudenay, S.: ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 398\u2013412. Springer, Heidelberg (2010)"},{"key":"21_CR65","unstructured":"Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks Revisited. In: Castellucia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.), Proceeding of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks ESAS 2004. LNCS, vol. 3312, pp. 218. Springer-Verlag (2004)"},{"key":"21_CR66","doi-asserted-by":"crossref","unstructured":"Shoufan, A., Wink, T., Molter, G., Huss, S., Strentzke, F.: A novel processor architecture for McEliece cryptosystem and FPGA platforms. In: Proceedings of the 20th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2009), pp. 98\u2013105 (2009)","DOI":"10.1109\/ASAP.2009.29"},{"key":"21_CR67","series-title":"LNCS","first-page":"73","volume-title":"SPC 2006","author":"B-Y Yang","year":"2006","unstructured":"Yang, B.-Y., Cheng, C.-M., Chen, B.-R., Chen, J.-M.: Implementing minimized multivariate PKC on low-resource embedded systems. In: Brooke, P.J., Clark, J.A., Paige, R.F., Polack, F.A.C. (eds.) SPC 2006. LNCS, vol. 3934, pp. 73\u201388. Springer, Heidelberg (2006)"},{"issue":"4","key":"21_CR68","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"TE Gamal","year":"1985","unstructured":"Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"21_CR69","series-title":"LNCS","first-page":"118","volume-title":"CT-RSA 2005","author":"N Howgrave-Graham","year":"2005","unstructured":"Howgrave-Graham, N., Silverman, J.H., Whyte, W.: Choosing parameter sets for $${\\sf { NTRUEncrypt}}~{\\rm {with}}~{\\rm {NAEP}}~{\\rm {and}}~{\\sf {SVES-3}}$$. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 118\u2013135. Springer, Heidelberg (2005)"},{"key":"21_CR70","unstructured":"Bjorstad, T.E.: An introduction to new stream cipher designs. In: 25th Chaos Communication Congress (2008)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T00:02:37Z","timestamp":1675987357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}