{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:01Z","timestamp":1750306981006,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T00:00:00Z","timestamp":1369785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,29]]},"DOI":"10.1145\/2463209.2488898","type":"proceedings-article","created":{"date-parts":[[2013,5,28]],"date-time":"2013-05-28T16:35:41Z","timestamp":1369758941000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["CoARX"],"prefix":"10.1145","author":[{"given":"Khawar","family":"Shahzad","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Ayesha","family":"Khalid","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Zolt\u00e1n Endre","family":"R\u00e1kossy","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[{"name":"Javavpur University, Kolkata, India"}]},{"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2013,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"LISA 2.0. Available at www.synopsys.com\/Systems\/BlockDesign\/ProcessorDev.  LISA 2.0. Available at www.synopsys.com\/Systems\/BlockDesign\/ProcessorDev."},{"key":"e_1_3_2_1_2_1","unstructured":"SHA-3 Cryptographic Hash Algorithm Competition. Available at http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html.  SHA-3 Cryptographic Hash Algorithm Competition. Available at http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"eSTREAM: the ECRYPT Stream Cipher Project. Available at http:\/\/www.ecrypt.eu.org\/stream\/index.html.  eSTREAM: the ECRYPT Stream Cipher Project. Available at http:\/\/www.ecrypt.eu.org\/stream\/index.html."},{"volume-title":"University of California","year":"2006","author":"Asanovic K.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"J. Aumasson etal Tuple cryptanalysis of ARX with application to BLAKE and Skein. ECRYPT 2 Hash Workshop 2011.  J. Aumasson et al. Tuple cryptanalysis of ARX with application to BLAKE and Skein. ECRYPT 2 Hash Workshop 2011."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Aumasson L. Henzen W. Meier and R. Phan. SHA-3 proposal BLAKE ver 1.3 2010. Available at https:\/\/www.131002.net\/blake.  J. Aumasson L. Henzen W. Meier and R. Phan. SHA-3 proposal BLAKE ver 1.3 2010. Available at https:\/\/www.131002.net\/blake."},{"key":"e_1_3_2_1_7_1","unstructured":"D. J. Bernstein. The salsa20 family of stream ciphers. Available at http:\/\/cr.yp.to\/papers.html#salsafamily December 2007.  D. J. Bernstein. The salsa20 family of stream ciphers. Available at http:\/\/cr.yp.to\/papers.html#salsafamily December 2007."},{"key":"e_1_3_2_1_8_1","unstructured":"D. J. Bernstein. ChaCha a variant of Salsa20. Available at http:\/\/cr.yp.to\/papers.html#chacha January 2008.  D. J. Bernstein. ChaCha a variant of Salsa20. Available at http:\/\/cr.yp.to\/papers.html#chacha January 2008."},{"volume-title":"Ecrypt Hash Workshop 2007","year":"2007","author":"Bertoni G.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.13"},{"key":"e_1_3_2_1_11_1","first-page":"1448","volume-title":"IEEE International Symposium on Circuits and Systems","author":"Chattopadhyay A.","year":"2012"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.839320"},{"volume-title":"Workshop on Edge Computing Using New Commodity Architectures","year":"2006","author":"Dubey P.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"N. Ferguson etal The Skein Hash Function Family Version 1.3. http:\/\/www.skein-hash.info\/sites\/default\/files\/skein1.3.pdf October 2010.  N. Ferguson et al. The Skein Hash Function Family Version 1.3. http:\/\/www.skein-hash.info\/sites\/default\/files\/skein1.3.pdf October 2010."},{"key":"e_1_3_2_1_16_1","first-page":"1006","volume-title":"IEEE DATE","author":"Guo X.","year":"2012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2060373"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2008.4746906"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1206501"},{"key":"e_1_3_2_1_20_1","unstructured":"J. K. Kobayashi Ikegami S. Matsuo K. Sakiyama and K. Ohta. Evaluation of Hardware Performance for the SHA-3 Candidates using SASEBO-GII. Available at http:\/\/eprint.iacr.org\/2010\/010.  J. K. Kobayashi Ikegami S. Matsuo K. Sakiyama and K. Ohta. Evaluation of Hardware Performance for the SHA-3 Candidates using SASEBO-GII. Available at http:\/\/eprint.iacr.org\/2010\/010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-642-13858-4_19","volume-title":"Fast Software Encryption","author":"Khovratovich D.","year":"2010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2128353"},{"key":"e_1_3_2_1_23_1","unstructured":"G. Leurent. ARXtools: A toolkit for ARX analysis. In: The Third SHA-3 Candidate Conference. Available at http:\/\/www.di.ens.fr\/~leurent\/arxtools.html.  G. Leurent. ARXtools: A toolkit for ARX analysis. In: The Third SHA-3 Candidate Conference. Available at http:\/\/www.di.ens.fr\/~leurent\/arxtools.html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"volume-title":"George Washington University","year":"2011","author":"Mckay K.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","unstructured":"N. Mouha. ARX-based cryptography. Available at https:\/\/www.cosic.esat.kuleuven.be\/ecrypt\/courses\/albena11\/slides\/nicky_mouha_arx-slides.pdf.  N. Mouha. ARX-based cryptography. Available at https:\/\/www.cosic.esat.kuleuven.be\/ecrypt\/courses\/albena11\/slides\/nicky_mouha_arx-slides.pdf."},{"key":"e_1_3_2_1_27_1","first-page":"125","volume-title":"C. De Canniere and B. Preneel. Toolkit for the Differential Cryptanalysis of ARX-based Cryptographic Constructions. In Workshop on Tools for Cryptanalysis","author":"Mouha N.","year":"2010"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"e_1_3_2_1_29_1","volume-title":"EUROCRYPT","volume":"304","author":"Shimizu A.","year":"1987"},{"volume-title":"Cooper Union College, 2011","year":"2011","author":"Stefan D.","key":"e_1_3_2_1_30_1"},{"volume-title":"University of Coimbra, 2009","year":"2009","author":"Neves S.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"S. Tillich. Instruction Set Extensions for Support of Cryptography on Embedded Systems. PhD thesis Graz University of Technology Austria 2008. Available at https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=39243.  S. Tillich. Instruction Set Extensions for Support of Cryptography on Embedded Systems. PhD thesis Graz University of Technology Austria 2008. Available at https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=39243."},{"key":"e_1_3_2_1_34_1","unstructured":"J. Walker F. Sheikh S. Mathew and R. Krishnamurthy. A Skein-512 hardware implementation. 2010. Available at http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round2\/Aug2010\/documents\/papers\/WALKER_skein-intel-hwd.pdf.  J. Walker F. Sheikh S. Mathew and R. Krishnamurthy. A Skein-512 hardware implementation. 2010. Available at http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round2\/Aug2010\/documents\/papers\/WALKER_skein-intel-hwd.pdf."},{"volume-title":"Dagstuhl Seminar","year":"2009","author":"Weinmann R.-P.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","unstructured":"H. Wu. The stream cipher HC-128. Available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/hc\/hc128_p3.pdf.  H. Wu. The stream cipher HC-128. Available at http:\/\/www.ecrypt.eu.org\/stream\/p3ciphers\/hc\/hc128_p3.pdf."},{"key":"e_1_3_2_1_37_1","first-page":"191","volume-title":"State of the Art of Stream Ciphers","author":"Benaissa T","year":"2007"},{"key":"e_1_3_2_1_38_1","unstructured":"M. Srivastav X. Guo S. Huang D. Ganta M. B. Henry L. Nazhandali and P. Schaumont. Design and Benchmarking of an ASIC with Five SHA-3 Finalist  M. Srivastav X. Guo S. Huang D. Ganta M. B. Henry L. Nazhandali and P. Schaumont. Design and Benchmarking of an ASIC with Five SHA-3 Finalist"}],"event":{"name":"DAC '13: The 50th Annual Design Automation Conference 2013","sponsor":["EDAC Electronic Design Automation Consortium","SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Austin Texas","acronym":"DAC '13"},"container-title":["Proceedings of the 50th Annual Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463209.2488898","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2463209.2488898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:38Z","timestamp":1750235978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2463209.2488898"}},"subtitle":["a coprocessor for ARX-based cryptographic algorithms"],"short-title":[],"issued":{"date-parts":[[2013,5,29]]},"references-count":36,"alternative-id":["10.1145\/2463209.2488898","10.1145\/2463209"],"URL":"https:\/\/doi.org\/10.1145\/2463209.2488898","relation":{},"subject":[],"published":{"date-parts":[[2013,5,29]]},"assertion":[{"value":"2013-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}