{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:34Z","timestamp":1762004554469,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,4]],"date-time":"2013-11-04T00:00:00Z","timestamp":1383523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,4]]},"DOI":"10.1145\/2517300.2517305","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"21-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic"],"prefix":"10.1145","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Nusa","family":"Zidaric","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Mark","family":"Aagaard","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IEEE 802.11TM-2007: IEEE standard for information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements part11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Computer Society June 2007.  IEEE 802.11TM-2007: IEEE standard for information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements part11: Wireless lan medium access control (mac) and physical layer (phy) specifications. IEEE Computer Society June 2007."},{"volume-title":"June","year":"2010","key":"e_1_3_2_1_2_1","unstructured":"Bluetooth specification (core version 4.0). Bluetooth Special Interests Group , June 2010 . Bluetooth specification (core version 4.0). Bluetooth Special Interests Group, June 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Specification of the 3gpp confidentiality and integrity algorithms uea2 & uia2","author":"TS","year":"2011","unstructured":"TS 35.216 : Specification of the 3gpp confidentiality and integrity algorithms uea2 & uia2 ; document 2: SNOW 3G specification (v10.0.0). The 3rd Generation Partnership Project ( 3GPP), April 2011 . http:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135216\/10.00.00_60\/ts_135216v100000p.pdf. TS 35.216: Specification of the 3gpp confidentiality and integrity algorithms uea2 & uia2; document 2: SNOW 3G specification (v10.0.0). The 3rd Generation Partnership Project (3GPP), April 2011. http:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135216\/10.00.00_60\/ts_135216v100000p.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"Specification of the 3gpp confidentiality and integrity algorithms eea3 & eia3","author":"TS","year":"2012","unstructured":"TS 35.222 : Specification of the 3gpp confidentiality and integrity algorithms eea3 & eia3 ; document 2: ZUC specification (v11.0.1). The 3rd Generation Partnership Project ( 3GPP), May 2012 . http:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135222\/11.00.01_60\/ts_135222v110001p.pdf. TS 35.222: Specification of the 3gpp confidentiality and integrity algorithms eea3 & eia3; document 2: ZUC specification (v11.0.1). The 3rd Generation Partnership Project (3GPP), May 2012. http:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135222\/11.00.01_60\/ts_135222v110001p.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_32"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1201\/b12078","volume-title":"Communication System Security","author":"Chen L.","year":"2012","unstructured":"L. Chen and G. Gong . Communication System Security . Chapman & Hall\/CRC , 1 st edition, 2012 . L. Chen and G. Gong. Communication System Security. Chapman & Hall\/CRC, 1st edition, 2012.","edition":"1"},{"key":"e_1_3_2_1_8_1","volume-title":"The ecrypt stream cipher project","author":"STREAM.","year":"2005","unstructured":"e STREAM. The ecrypt stream cipher project , 2005 . http:\/\/www.ecrypt.eu.org\/stream\/. eSTREAM. The ecrypt stream cipher project, 2005. http:\/\/www.ecrypt.eu.org\/stream\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"X.\n      Fan K.\n      Mandal and \n      G.\n      Gong\n  . \n  Wg-8: A lightweight stream cipher for resource-constrained smart devices\n  . In K. Singh and A. Awasthi editors Quality Reliability Security\n   and Robustness in Heterogeneous Networks volume \n  115\n   of \n  Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering pages \n  617\n  --\n  632\n  . \n  Springer Berlin Heidelberg 2013\n  .  X. Fan K. Mandal and G. Gong. Wg-8: A lightweight stream cipher for resource-constrained smart devices. In K. Singh and A. Awasthi editors Quality Reliability Security and Robustness in Heterogeneous Networks volume 115 of Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering pages 617--632. Springer Berlin Heidelberg 2013.","DOI":"10.1007\/978-3-642-37949-9_54"},{"key":"e_1_3_2_1_10_1","volume-title":"The 3rd International Conference on Communication and Network Security - ICCNS 2013","author":"Fan X.","year":"2013","unstructured":"X. Fan , T. Wu , and G. Gong . An efficient stream cipher wg-16 and its application for securing 4g-lte networks . In The 3rd International Conference on Communication and Network Security - ICCNS 2013 , 2013 . X. Fan, T. Wu, and G. Gong. An efficient stream cipher wg-16 and its application for securing 4g-lte networks. In The 3rd International Conference on Communication and Network Security - ICCNS 2013, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125200"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(88)90024-7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON.2008.4602594"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684215"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CWIT.2013.6621585"},{"key":"e_1_3_2_1_17_1","volume-title":"Application of Finite Fields","author":"Menezes A.","year":"1993","unstructured":"A. Menezes . Application of Finite Fields . Kluwer Academic Publisher , 1993 . A. Menezes. Application of Finite Fields. Kluwer Academic Publisher, 1993."},{"key":"e_1_3_2_1_18_1","volume-title":"The WG stream cipher. eSTREAM PHASE 2 Achive","author":"Nawaz Y.","year":"2005","unstructured":"Y. Nawaz and G. Gong . The WG stream cipher. eSTREAM PHASE 2 Achive , 2005 . http:\/\/www.ecrypt.eu.org\/stream\/p2ciphers\/wg\/wg_p2.pdf. Y. Nawaz and G. Gong. The WG stream cipher. eSTREAM PHASE 2 Achive, 2005. http:\/\/www.ecrypt.eu.org\/stream\/p2ciphers\/wg\/wg_p2.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.12.002"},{"key":"e_1_3_2_1_20_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/978-3-642-15031-9_16","volume-title":"S. Mangard and F.-X","author":"Nogami Y.","year":"2010","unstructured":"Y. Nogami , K. Nekado , T. Toyota , N. Hongo , and Y. Morikawa . Mixed bases for efficient inversion in F((22)2)2 and conversion matrices of subbytes of aes . In S. Mangard and F.-X . Standaert, editors, Cryptographic Hardware and Embedded Systems - CHES 2010 , volume 6225 of Lecture Notes in Computer Science , pages 234 -- 247 . Springer Berlin Heidelberg , 2010. Y. Nogami, K. Nekado, T. Toyota, N. Hongo, and Y. Morikawa. Mixed bases for efficient inversion in F((22)2)2 and conversion matrices of subbytes of aes. In S. Mangard and F.-X. Standaert, editors, Cryptographic Hardware and Embedded Systems - CHES 2010, volume 6225 of Lecture Notes in Computer Science, pages 234--247. Springer Berlin Heidelberg, 2010."},{"key":"e_1_3_2_1_21_1","volume-title":"The 24th Chaos Communication Congress - 24C3, 2007","author":"Nohl K.","year":"2007","unstructured":"K. Nohl and H. Pl\u00f6tz . Mifare - little security despite obscurity . The 24th Chaos Communication Congress - 24C3, 2007 . http:\/\/events.ccc.de\/congress\/ 2007 \/Fahrplan\/events\/2378.en.html. K. Nohl and H. Pl\u00f6tz. Mifare - little security despite obscurity. The 24th Chaos Communication Congress - 24C3, 2007. http:\/\/events.ccc.de\/congress\/2007\/Fahrplan\/events\/2378.en.html."},{"key":"e_1_3_2_1_22_1","unstructured":"Synopsys. Synopsys design compiler. http:\/\/www.synopsys.com\/Tools\/Implementation\/RTLSynthesis\/.  Synopsys. Synopsys design compiler. http:\/\/www.synopsys.com\/Tools\/Implementation\/RTLSynthesis\/."},{"key":"e_1_3_2_1_23_1","first-page":"237","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Verdult R.","year":"2012","unstructured":"R. Verdult , F. D. Garcia , and J. Balasch . Gone in 360 seconds: Hijacking with hitag2 . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , pages 237 -- 252 , Berkeley, CA, USA , 2012 . USENIX Association. R. Verdult, F. D. Garcia, and J. Balasch. Gone in 360 seconds: Hijacking with hitag2. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 237--252, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_24_1","unstructured":"Xilinx. http:\/\/www.xilinx.com\/.  Xilinx. http:\/\/www.xilinx.com\/."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the 3rd international workshop on Trustworthy embedded devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517300.2517305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517300.2517305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:08Z","timestamp":1750234748000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517300.2517305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,4]]},"references-count":22,"alternative-id":["10.1145\/2517300.2517305","10.1145\/2517300"],"URL":"https:\/\/doi.org\/10.1145\/2517300.2517305","relation":{},"subject":[],"published":{"date-parts":[[2013,11,4]]},"assertion":[{"value":"2013-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}