{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T19:40:03Z","timestamp":1746128403019,"version":"3.40.4"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,2,4]],"date-time":"2014-02-04T00:00:00Z","timestamp":1391472000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s13389-014-0071-0","type":"journal-article","created":{"date-parts":[[2014,2,3]],"date-time":"2014-02-03T11:24:36Z","timestamp":1391426676000},"page":"135-143","source":"Crossref","is-referenced-by-count":2,"title":["Designing stream ciphers with scalable data-widths: a case study with HC-128"],"prefix":"10.1007","volume":"4","author":[{"given":"Goutam","family":"Paul","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,4]]},"reference":[{"key":"71_CR1","unstructured":"ARM 64-bit Processor. http:\/\/www.computerworld.com\/s\/article\/9223894"},{"key":"71_CR2","unstructured":"Advanced vector extensions (AVX). http:\/\/software.intel.com\/en-us\/avx"},{"key":"71_CR3","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Khalid, A., Maitra, S., Raizada, S.: Designing high-throughput hardware accelerator for stream cipher HC-128. In: IEEE ISCAS, pp. 1448\u20131451 (2012)","DOI":"10.1109\/ISCAS.2012.6271518"},{"key":"71_CR4","unstructured":"ECRYPT\u2014network of excellence in cryptology. IST-2002-507932. http:\/\/www.ecrypt.eu.org\/ecrypt1"},{"key":"71_CR5","unstructured":"eSTREAM: the ECRYPT stream cipher project. http:\/\/www.ecrypt.eu.org\/stream . Accessed on Nov 2013"},{"key":"71_CR6","unstructured":"Federal information processing standards (FIPS) publication 197. Advanced encryption standard (AES). http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html . Accessed 26 Nov 2001"},{"key":"71_CR7","doi-asserted-by":"crossref","unstructured":"Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: CISC. Lecture Notes in Computer Science, vol. 3822, pp. 162\u2013174. Springer (2005)","DOI":"10.1007\/11599548_14"},{"key":"71_CR8","unstructured":"Intel AES instruction set. http:\/\/software.intel.com\/en-us\/articles\/intel-advanced-encryption-standard-aes-instructions-set\/"},{"key":"71_CR9","doi-asserted-by":"crossref","unstructured":"Khalid, A., Bagchi, D., Paul, G., Chattopadhyay, A.: Optimized GPU implementation and performance analysis of HC series of stream ciphers. In: Proceedings of the 15th International Conference on Information Security and Cryptology (ICISC), Nov 28\u201330, Seoul, Korea. Lecture Notes in Computer Science (LNCS), vol. 7839, pp. 293\u2013308. Springer (2012)","DOI":"10.1007\/978-3-642-37682-5_21"},{"key":"71_CR10","doi-asserted-by":"crossref","unstructured":"Kircanski, A., Youssef, A.M.: Differential fault analysis of HC-128. In AFRICACRYPT 2010. Lecture Notes in Computer Science, vol. 6055, pp. 360\u2013377. Springer","DOI":"10.1007\/978-3-642-12678-9_16"},{"key":"71_CR11","doi-asserted-by":"crossref","unstructured":"Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O.: Hardware implementation of the RC4 stream cipher. In: Proceedings of 46th IEEE Midwest Symposium on Circuits & Systems, pp. 1363\u20131366. Cairo, Egypt (2003)","DOI":"10.1109\/MWSCAS.2003.1562548"},{"key":"71_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Qin, T.: The key and IV setup of the stream ciphers HC-256 and HC-128. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 430\u2013433. (2009)","DOI":"10.1109\/NSWCTC.2009.111"},{"key":"71_CR13","doi-asserted-by":"crossref","unstructured":"Maitra, S., Paul, G., Raizada,S., Sen, S., Sengupta, R.: Some observations on HC-128. In: Designs, Codes and Cryptography. vol. 59, no. 1\u20133 pp. 231\u2013245. (2011)","DOI":"10.1007\/s10623-010-9459-8"},{"key":"71_CR14","unstructured":"Matthews Jr. D.P.: Methods and apparatus for accelerating ARC4 processing. US Patent Number 7403615, Morgan Hill, CA. http:\/\/www.freepatentsonline.com\/7403615.html . Accessed July 2008"},{"key":"71_CR15","doi-asserted-by":"crossref","unstructured":"Meiser, G., Eisenbarth, T., Lemke-Rust, K., Christof Paar.: Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. In: SIES. pp. 58\u201366. (2008)","DOI":"10.1109\/SIES.2008.4577681"},{"key":"71_CR16","unstructured":"NIST special publication 800\u201322rev1a. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documentation_software.html . Accessed April 2010"},{"key":"71_CR17","doi-asserted-by":"crossref","unstructured":"Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. CRC Press (2011)","DOI":"10.1201\/b11310"},{"key":"71_CR18","doi-asserted-by":"crossref","unstructured":"Paul, G., Maitra, S., Raizada, S.: A theoretical analysis of the structure of HC-128. In: IWSEC 2011. Lecture Notes in Computer Science, vol. 7038, pp. 161\u2013177. Springer","DOI":"10.1007\/978-3-642-25141-2_11"},{"key":"71_CR19","doi-asserted-by":"crossref","unstructured":"Sen Gupta, S., Chattopadhyay, A., Sinha, K., Maitra, S., Sinha, B.P.: High performance hardware implementation for RC4 stream cipher. In: IEEE Transactions on Computers. doi: 10.1109\/TC.2012.19 (2012)","DOI":"10.1109\/TC.2012.19"},{"key":"71_CR20","doi-asserted-by":"crossref","unstructured":"Stankovski, P., Ruj, S., Hell, M., Johansson, T.: Improved distinguishers for HC-128. In: Designs, Codes and Cryptography. vol. 63, no. 2. pp. 225\u2013240 (2012)","DOI":"10.1007\/s10623-011-9550-9"},{"key":"71_CR21","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Meyr, H., Leupers, R.: LISA: a uniform ADL for embedded processor modelling, implementation and software toolsuite generation. In: Mishra, P., Dutt, N. (eds.) Processor Description Languages, vol. 1, (Systems on Silicon), pp. 95\u2013130, Morgan Kaufmann (2008)","DOI":"10.1016\/B978-012374287-2.50008-2"},{"key":"71_CR22","doi-asserted-by":"crossref","unstructured":"Tran, T.H., Lanante, L., Nagao, Y., Kurosaki, M., Ochi, H.: Hardware implementation of high throughput RC4 algorithm. In: IEEE ISCAS. pp. 77\u201380 (2012)","DOI":"10.1109\/ISCAS.2012.6272151"},{"key":"71_CR23","unstructured":"Wu, H.: The stream cipher HC-128. http:\/\/www.ecrypt.eu.org\/stream\/hcp3.html"},{"key":"71_CR24","doi-asserted-by":"crossref","unstructured":"Wu, H.: A new stream cipher HC-256. In: FSE. Lecture Notes in Computer Science, vol. 3017, pp. 226\u2013244. Springer (2004)","DOI":"10.1007\/978-3-540-25937-4_15"},{"key":"71_CR25","unstructured":"Wu, H.: The stream cipher HC-128. http:\/\/www3.ntu.edu.sg\/home\/wuhj\/research\/hc\/index.html"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0071-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-014-0071-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0071-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T19:12:49Z","timestamp":1746126769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-014-0071-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,4]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["71"],"URL":"https:\/\/doi.org\/10.1007\/s13389-014-0071-0","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2014,2,4]]}}}