{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:13:41Z","timestamp":1742951621747,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":24,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_9","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Performance of Interleaved Cipher Block Chaining in CCMP"],"prefix":"10.1007","author":[{"given":"Zadia","family":"Codabux-Rossan","sequence":"first","affiliation":[]},{"given":"M. Razvi","family":"Doomun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"9_CR1","unstructured":"A. Aziz and N. Ikram, \u201cAn FPGA- based AES-CCM Crypto Core for IEEE 802.11i Architecture\u201d, International Journal of Network Security, Vol5, No2, Sept 2007"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"A. Samiah, A. Aziz and N. Ikram, \u201cAn Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless Standard\u201d, 31st Annual International Computer Software and Applications Conference - Vol. 2- pp. 689-694, COMPSAC 2007","DOI":"10.1109\/COMPSAC.2007.62"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"C.Mucci, L.Vanzolini, F.Campi, A. Lodi, A. Deledda, M. Toma and R. Guerrieri, \u201cImplementation Of AES\/Rijndael On A Dynamically Reconfigurable Architecture\u201d, Design, Automation & Test in Europe Conference & Exhibition, 2007","DOI":"10.1109\/DATE.2007.364617"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"C.N.Mathur and K.P. Subbalakshmi, \u201cEnergy efficient wireless encryption\u201d, IEEE Global Telecommunications Conference, 2006.","DOI":"10.1109\/GLOCOM.2006.289"},{"key":"9_CR5","unstructured":"C.T.R. Hager, S.F. Midkiff, J.-M Park, T.L. Martin, \u201cPerformance and Energy Efficiency of Block Ciphers in Personal Digital Assistants\u201d, In proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (Percom 2005), IEEE Computer Society Press, 2005"},{"key":"9_CR6","unstructured":"Federal Information, Processing Standards Publication (FIPS) 197, \u201cAnnouncing the ADVANCED ENCRYPTION STANDARD (AES)\u201d, November 26, 2001"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"H. Cam. S. Ozdemir, D. Muthuavinashiappan, P.Nair, \u201cEnergy efficient security protocol for wireless sensor networks\u201d, VTC 2003-Fall. 2003 IEEE 58th, Vehicular Technology Conference, 2003.","DOI":"10.1109\/VETECF.2003.1286170"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"H. Yang, F. Ricciato, S. Lu, L. Zhang, \u201cSecuring a Wireless World\u201d, Computer. Sci. Dept., Univ. of California, Los Angeles, CA, USA, Proceedings of the IEEE, Feb. 2006 Volume: 94,Issue: 2","DOI":"10.1109\/JPROC.2005.862321"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"J. Gro\u00dfsch\u00e4dl, S. Tillich, C. Rechberger, M. Hofmann, and M. Medwed, \u201cEnergy evaluation of software implementations of block ciphers under memory constraints\u201d, Design, Automation & Test in Europe Conference & Exhibition, 2007.","DOI":"10.1109\/DATE.2007.364443"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"J. Nechvatal, E. Barker, D. Dodson, M. Dworkin, J. Foti, E. Roback, \u201cStatus Report on the First Round of the Development of the Advanced Encryption Standard\u201d, Journal of Research of the National Institute of Standards and Technology, Volume 104, Number 5, September\u2013October 1999","DOI":"10.6028\/jres.104.027"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"K. Atasu , L. Breveglieri , M. Macchetti, \u201cEfficient AES Implementations For ARM Based Platforms\u201d, Proceedings of the 2004 ACM symposium on Applied computing, 2004","DOI":"10.1145\/967900.968073"},{"key":"9_CR12","unstructured":"K. Gaj, P. Chodowiec, \u201cHardware performance of the AES finalists - survey and analysis of results\u201d, Technical Report, George Mason University, Sep 2000, http:\/\/ece.gmu.edu\/crypto\/AES_survey.pdf"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"M Dworkin, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, NIST Special Publication 800-38C, May 2004","DOI":"10.6028\/NIST.SP.800-38b-2005"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"N.R. Potlapally, S. Ravi, A. Raghunathan, N.K.Jha, \u201cAnalyzing the energy consumption of security protocols, Proceedings of 8th International Symposium on Low Power Electronics and Design\u201d, ISLPED \u201803, ACM Press 2003","DOI":"10.1145\/871506.871518"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"N.R. Potlapally, S. Ravi, A. Raghunathan, N.K.Jha, \u201cA study of the energy consumption characteristics of cryptographic algorithms and security protocols\u201d, IEEE Transactions on Mobile Computing, Vol 5, No 2, February 2006","DOI":"10.1109\/TMC.2006.16"},{"key":"9_CR16","volume-title":"Energy efficient protocols for wireless systems","author":"P Agrawal","year":"1998","unstructured":"P Agrawal, \u201cEnergy efficient protocols for wireless systems\u201d, IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Vol 2, Boston , USA, 1998"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"P. Hamalainen, M. Hannikainen, T.D. Hamalainen, \u201cEfficient Hardware Implementation of Security Processing For IEEE 802.15.4 Wireless Networks\u201d, 48th Midwest Symposium on Circuits and Systems, 2005.","DOI":"10.1109\/MWSCAS.2005.1594143"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"P. Ni and Z. Li, \u201cEnergy cost analysis of IPSec on handheld devices\u201d, Microprocessors and Microsystems, Special Issue on Secure Computing Platform, 2004.","DOI":"10.1016\/j.micpro.2004.08.010"},{"key":"9_CR19","unstructured":"P. Prasithsangaree, P. Krishnamurthy, \u201cAnalysis of energy consumption of RC4 & AES algorithms in wireless LANs\u201d, Global Telecommunications Conference, GLOBECOM IEEE, 2003"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"R. Chandramouli, S. Bapatla, K. P. Subbalakshmi, R. N. Uma, \u201cBattery Power-aware Encryption\u201d, ACM Journal Name, Vol. V, No. N, February 2005.","DOI":"10.1145\/1151414.1151417"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"M.R. Doomun, K.M.S Soyjaudah, \u201cAdaptive IEEE 802.11i security for energy security optimization\u201d, The Third Advanced International Conference on Telecommunications, 2007. AICT 2007.","DOI":"10.1109\/AICT.2007.3"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"R. Karri and P. Mishra, \u201cAnalysis of energy consumed by secure session negotiation protocols in wireless networks\u201d, International Workshop on Power and Timing Modeling, Optimization and Simulation, Torino, Italy, Sep 2003","DOI":"10.1007\/978-3-540-39762-5_42"},{"key":"9_CR23","unstructured":"W Roche, \u201cThe Advanced Encryption Standard, The Process, Its Strengths and Weaknesses\u201d, University of Colorado, Denver, Spring 2006 Computer Security Class, CSC 7002, Final Paper, May 6, 2006"},{"key":"9_CR24","unstructured":"Z. Li. R. Xu, \u201cEnergy Impact of Secure Computation on a Handheld Device\u201d, IEEE 5th International Workshop on Workload Characterization, 2002."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T22:35:25Z","timestamp":1675895725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_9","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}