{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T13:26:42Z","timestamp":1675258002625},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T00:00:00Z","timestamp":1455926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s13389-016-0116-7","type":"journal-article","created":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T05:20:20Z","timestamp":1455945620000},"page":"299-323","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers"],"prefix":"10.1007","volume":"6","author":[{"given":"Ayesha","family":"Khalid","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,20]]},"reference":[{"key":"116_CR1","doi-asserted-by":"crossref","unstructured":"Khalid, A., Hassan, M., Chattopadhyay, A., Paul, G.: RAPID-FeinSPN: a rapid prototyping framework for Feistel and SPN-based block ciphers. In: Information Systems Security, pp. 169\u2013190. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-45204-8_13"},{"key":"116_CR2","doi-asserted-by":"crossref","unstructured":"Maitra, S., Paul, G.: Analysis of RC4 and proposal of additional layers for better security margin. In: Progress in Cryptology-INDOCRYPT, pp. 27\u201339. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-89754-5_3"},{"key":"116_CR3","unstructured":"Break DES in less than a single day. In: Press Release Demonstrated at a 2009 Workshop. Available at http:\/\/www.sciengines.com\/company\/news-a-events\/74-des-in-1-day.html"},{"key":"116_CR4","unstructured":"Aumasson, J., Henzen, L., Meier, W., Phan, R.: SHA-3 Proposal BLAKE Version 1.3. Submission to NIST. Available at https:\/\/www.131002.net\/blake"},{"key":"116_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Le, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. In: Proceedings of CHES (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"116_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J.: The Salsa20 family of stream ciphers. In: New Stream Cipher Designs: The eSTREAM Finalists, pp. 84\u201397. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"116_CR7","unstructured":"Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard. National Institute of Standards and Technology, Docket No. 960924272-6272-01, RIN 0693-ZA13 (1997). http:\/\/csrc.nist.gov\/archive\/aes\/pre-round1\/aes_9701.txt"},{"key":"116_CR8","unstructured":"NESSIE: New European Schemes for Signatures, Integrity, and Encryption IST-1999-12324 (2000). https:\/\/www.cosic.esat.kuleuven.be\/nessie\/"},{"key":"116_CR9","unstructured":"CRYPTREC: Cryptography Research and Evaluation Committees. Japanese Government Cryptographer Competition (2012). http:\/\/competitions.cr.yp.to\/cryptrec.html"},{"key":"116_CR10","unstructured":"eSTREAM: the ECRYPT Stream Cipher Project. Available at http:\/\/www.ecrypt.eu.org\/stream"},{"key":"116_CR11","unstructured":"SHA-3 Cryptographic Hash Algorithm Competition. NIST competition for Secure Hash Algorithm (2007). http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html"},{"key":"116_CR12","unstructured":"CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. A Portfolio of Authenticated Ciphers (2013). Available at http:\/\/competitions.cr.yp.to\/caesar.html"},{"key":"116_CR13","unstructured":"Third Round Report of the SHA-3 Cryptographic Hash Algorithm Competition. National Institute of Standards and Technology, NISTIR 7896 (2012). Available at http:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2012\/NIST.IR.7896"},{"key":"116_CR14","unstructured":"Batina, L., Lano, J., Mentens, N., Ors, S.B., Preneel, B., Verbauwhede, I.: Energy, performance, area versus security trade-offs for stream ciphers. In: The State of the Art of Stream Ciphers, ECRYPT Workshop Record, pp. 302\u2013310 (2004)"},{"key":"116_CR15","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Paul, G.: Exploring security-performance trade-offs during hardware accelerator design of stream cipher RC4. In: VLSI and System-on-Chip (VLSI-SoC), 2012 IEEE\/IFIP 20th International Conference on. IEEE (2012)","DOI":"10.1109\/VLSI-SoC.2012.6379039"},{"key":"116_CR16","unstructured":"Synphony C Compiler: Optimized Hardware from High-Level C\/C++. Synopsys (2010). Available at https:\/\/www.synopsys.com\/Tools\/Implementation\/RTLSynthesis\/Documents\/synphonyc-compiler-ds"},{"key":"116_CR17","unstructured":"Philippe Coussy and Dominique Heller. GAUT\u2014High-Level Synthesis Tool From C to RTL. Available at hls-labsticc.univ-ubs.fr\/"},{"key":"116_CR18","unstructured":"Vivado Design Suite User Guide: High-Level Synthesis Xilinx (2015). Available at http:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx2015_1\/ug902-vivado-high-level-synthesis"},{"key":"116_CR19","unstructured":"Calypto Design Systems. Catapult High Level Synthesis (2011). Available at http:\/\/calypto.com"},{"key":"116_CR20","unstructured":"High-Level Synthesis Tool\u2014LegUp. University of Toronto (2013). Available at http:\/\/legup.eecg.utoronto.ca\/"},{"key":"116_CR21","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1049\/iet-cdt:20060121","volume":"1","author":"F Burns","year":"2007","unstructured":"Burns, F., Murphy, J., Shang, D., Koelmans, A., Yakorlev, A.: Dynamic global security-aware synthesis using SystemC. IET Comput. Digit. Tech. 1, 405\u2013413 (2007)","journal-title":"IET Comput. Digit. Tech."},{"key":"116_CR22","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MDT.2009.81","volume":"4","author":"S Ahuja","year":"2009","unstructured":"Ahuja, S., Gurumani, S.T., Spackman, C., Shukla, S.K.: Hardware coprocessor synthesis from an ANSI C specification. IEEE Des. Test Comput. 4, 58\u201367 (2009)","journal-title":"IEEE Des. Test Comput."},{"key":"116_CR23","doi-asserted-by":"crossref","unstructured":"Homsirikamol, E., Gaj, K.: Hardware benchmarking of cryptographic algorithms using high-level synthesis tools: the SHA-3 contest case study. In: Applied Reconfigurable Computing (ARC), pp. 217\u2013228. IEEE (2015)","DOI":"10.1007\/978-3-319-16214-0_18"},{"key":"116_CR24","doi-asserted-by":"crossref","unstructured":"Homsirikamol, E., Gaj, K.: Can high-level synthesis compete against a hand-written code in the cryptographic domain? A case study. In: International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/ReConFig.2014.7032504"},{"key":"116_CR25","unstructured":"Asanovic, K., Bodik, R., Catanzaro, B.C., Gebis, J.J., Husbands, P., Keutzer, K., Patterson, D.A., Plishker, W.L., Shalf, J., Williams, S.W., Yelick, K.A.: The Landscape of Parallel Computing Research: A View from Berkeley. UCB\/EECS-2006-183, EECS Department, University of California, Berkeley"},{"key":"116_CR26","unstructured":"Dubey, P.: Teraflops for the masses: Killer apps of tomorrow. In: Workshop on Edge Computing Using New Commodity Architectures (UNC), vol. 23 (2006)"},{"key":"116_CR27","doi-asserted-by":"crossref","unstructured":"Ernst, M., Klupsch, S., Hauck, O., Huss, S.A.: Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems. In: Proceedings of the 12th International Workshop on Rapid System Prototyping (RSP \u201901) (2001)","DOI":"10.1109\/IWRSP.2001.933834"},{"key":"116_CR28","unstructured":"Leurent, G.: ARX Toolkit. Available at http:\/\/www.di.ens.fr\/leurent\/arxtools.html"},{"key":"116_CR29","unstructured":"Mouha, N., Velichkov, V., De Canni\u00e9re, C., Preneel, B.: S-function Toolkit. Available at http:\/\/www.ecrypt.eu.org\/tools\/s-function-toolkit"},{"key":"116_CR30","doi-asserted-by":"crossref","unstructured":"Akinyele, J.A., et\u00a0al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013)","DOI":"10.1007\/s13389-013-0057-3"},{"key":"116_CR31","unstructured":"Lacy, J.B., Mitchell, D.P., Schell, W.M.: CryptoLib: cryptography in software. In: Proceedings of the Fourth USENIX Security Workshop, pp. 1\u201318 (1993)"},{"key":"116_CR32","doi-asserted-by":"publisher","unstructured":"Shahzad, K., Khalid, A., R\u00e1kossy, Z.E., Paul, G., Chattopadhyay, A.: CoARX: a coprocessor for ARX-based cryptographic algorithms. In: Proceedings of the 50th Annual Design Automation Conference (DAC \u201913) (2013). doi: 10.1145\/2463209.2488898","DOI":"10.1145\/2463209.2488898"},{"key":"116_CR33","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation. Methods and techniques. In: NIST Special Publication 800-38A (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"116_CR34","doi-asserted-by":"crossref","unstructured":"Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Goubin, L., Gouget, A., Granboulan, L., Lauradoux, C., Minier, M., Pornin, T., Sibert, H.: Sosemanuk a fast software-oriented stream cipher. In: New Stream Cipher Designs: The eSTREAM Finalists, pp. 98\u2013118. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-68351-3_9"},{"key":"116_CR35","unstructured":"Barreto, P., Rijmen, V.: The Whirlpool hashing function. In: First open NESSIE Workshop, vol. 13, pp. 14\u201333. Leuven (2000)"},{"key":"116_CR36","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family, Version 1.3. http:\/\/www.skein-hash.info\/sites\/default\/files\/skein1.3 (2010)"},{"key":"116_CR37","unstructured":"Authenticated Encryption-Security Techniques. In: ISO\/IEC 19772:2009. Retrieved March 12 (2013)"},{"key":"116_CR38","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1996)"},{"key":"116_CR39","doi-asserted-by":"crossref","unstructured":"Khovratovich, D., Nikoli\u0107, I.: Rotational cryptanalysis of ARX. In: Fast Software Encryption 2010, LNCS vol. 6147, pp. 333\u2013346. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13858-4_19"},{"key":"116_CR40","unstructured":"Weinmann, R.-P.: AXR\u2014Crypto Made from Modular Additions, XORs. In: Dagstuhl Seminar 09031, January 2009. Available at http:\/\/www.dagstuhl.de\/Materials\/Files\/09\/09031\/09031.WeinmannRalfPhilipp.Slides"},{"key":"116_CR41","unstructured":"Wu, H.: The Stream Cipher HC-128. Available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/hc\/hc128_p3"},{"key":"116_CR42","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm. In: RFC 1321 by MIT Laboratory for Computer Science and RSA Data Security (1992). Available at http:\/\/www.faqs.org\/rfcs\/rfc1321.html"},{"key":"116_CR43","unstructured":"Secure Hash Standard (SHS) In FIPS PUB 180-4, Information Technology Laboratory National Institute of Standards and Technology Gaithersburg (2012). Available at http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4"},{"key":"116_CR44","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak Sponge Function Family (Main Document). Submission to NIST, round 3 (2011)"},{"key":"116_CR45","unstructured":"Advanced Encryption Standard. Federal Information Processing Standard, FIPS-197, p. 12 (2001)"},{"key":"116_CR46","doi-asserted-by":"crossref","unstructured":"Wheeler, D.J., Needham, R.M.: TEA, a tiny encryption algorithm. In: Fast Software Encryption, pp. 363\u2013366. Springer, Berlin (1995)","DOI":"10.1007\/3-540-60590-8_29"},{"key":"116_CR47","unstructured":"Iwata, T., Shibutani, K., Shirai, T., Moriai, S., Akishita, T.: AURORA: A Cryptographic Hash Algorithm Family. Submission to NIST (2008)"},{"key":"116_CR48","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. NIST Special Publication 800-22. Available at csrc.nist.gov\/groups\/ST\/toolkit\/rng\/documents\/SP800-22b"},{"key":"116_CR49","unstructured":"Synopsys Processor Designer. Available at http:\/\/www.synopsys.com\/Systems\/BlockDesign\/processorDev\/Pages\/default.aspx"},{"key":"116_CR50","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/B978-012374287-2.50008-2","volume-title":"Processor Description Languages","author":"A Chattopadhyay","year":"2008","unstructured":"Chattopadhyay, A., Meyr, H., Leupers, R.: LISA: a uniform ADL for embedded processor modelling, implementation and software toolsuite generation. In: Mishra, P., Dutt, N. (eds.) Processor Description Languages, pp. 95\u2013130. Morgan Kaufmann, Los Altos, CA (2008)"},{"key":"116_CR51","doi-asserted-by":"crossref","unstructured":"Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-lightweight implementations for smart devicessecurity for 1000 gate equivalents. In: Smart Card Research and Advanced Applications, pp. 89\u2013103. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-85893-5_7"},{"key":"116_CR52","doi-asserted-by":"crossref","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: a very compact and a threshold implementation of AES. In: Advances in Cryptology\u2013EUROCRYPT 2011, pp. 69\u201388. Springer, Berlin (2011)","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"116_CR53","unstructured":"Simple AES (Rijndael) IP Core http:\/\/opencores.org\/project,aes_core"},{"key":"116_CR54","doi-asserted-by":"crossref","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A compact Rijndael hardware architecture with S-box optimization. In: Advances in Cryptology\u2013ASIACRYPT 2001, pp. 239\u2013254. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45682-1_15"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-016-0116-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-016-0116-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-016-0116-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-016-0116-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T16:31:43Z","timestamp":1567614703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-016-0116-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,20]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["116"],"URL":"https:\/\/doi.org\/10.1007\/s13389-016-0116-7","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,20]]}}}