{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:36Z","timestamp":1750306716389,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001667","name":"European Research Consortium for Informatics and Mathematics (ERCIM)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001667","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2666141.2666144","type":"proceedings-article","created":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T17:10:54Z","timestamp":1415380254000},"page":"51-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Simple AEAD Hardware Interface (S\u00c6HI) in a SoC"],"prefix":"10.1145","author":[{"given":"Markku-Juhani Olavi","family":"Saarinen","sequence":"first","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. AMBA Open Speci_cations. www.arm.com\/products\/system-ip\/amba 2014.  ARM. AMBA Open Speci_cations. www.arm.com\/products\/system-ip\/amba 2014."},{"key":"e_1_3_2_1_2_1","unstructured":"P. S. L. M. Barreto and V. Rijmen. The Whirlpool hashing function. NESSIE Algorithm Speci_cation www.larc.usp.br\/~pbarreto\/WhirlpoolPage.html 2000 Revised May 2003.  P. S. L. M. Barreto and V. Rijmen. The Whirlpool hashing function. NESSIE Algorithm Speci_cation www.larc.usp.br\/~pbarreto\/WhirlpoolPage.html 2000 Revised May 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71817-0_9"},{"key":"e_1_3_2_1_4_1","unstructured":"G. Bertoni J. Daemen M. Peeters G. V. Assche and R. V. Keer. CAESAR submission: Keyak v1. CAESAR 1st Round competitions.cr.yp.to\/round1\/keyakv1.pdf March 2014.  G. Bertoni J. Daemen M. Peeters G. V. Assche and R. V. Keer. CAESAR submission: Keyak v1. CAESAR 1st Round competitions.cr.yp.to\/round1\/keyakv1.pdf March 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"K. Burgin and M. Peck. Suite B Pro_le for Internet Protocol Security (IPsec). IETF RFC 6380 October 2011.  K. Burgin and M. Peck. Suite B Pro_le for Internet Protocol Security (IPsec). IETF RFC 6380 October 2011.","DOI":"10.17487\/rfc6380"},{"key":"e_1_3_2_1_8_1","unstructured":"CAESAR. CAESAR first round submissions. competitions.cr.yp.to\/caesar-submissions.html March 2014.  CAESAR. CAESAR first round submissions. competitions.cr.yp.to\/caesar-submissions.html March 2014."},{"volume-title":"Springer","year":"2002","author":"Daemen J.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246 August 2008.  T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246 August 2008.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"M. Dworkin. Recommendation for block cipher modes of operation. NIST Special Publication 800-38A December 2001.  M. Dworkin. Recommendation for block cipher modes of operation. NIST Special Publication 800-38A December 2001.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"e_1_3_2_1_12_1","first-page":"11","volume":"3","author":"GOST.","journal-title":"GOST R"},{"key":"e_1_3_2_1_13_1","unstructured":"V. T. Hoang T. Krovetz and P. Rogaway. AEZ v1: Authenticated-Encryption by Enciphering. CAESAR 1st Round competitions.cr.yp.to\/round1\/aezv1.pdfl March 2014.  V. T. Hoang T. Krovetz and P. Rogaway. AEZ v1: Authenticated-Encryption by Enciphering. CAESAR 1st Round competitions.cr.yp.to\/round1\/aezv1.pdfl March 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"K. Igoe. Suite B Cryptographic Suites for Secure Shell (SSH). IETF RFC 6239 May 2011.  K. Igoe. Suite B Cryptographic Suites for Secure Shell (SSH). IETF RFC 6239 May 2011.","DOI":"10.17487\/rfc6239"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"K. Igoe and J. Solinas. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. IETF RFC 5647 August 2009.  K. Igoe and J. Solinas. AES Galois Counter Mode for the Secure Shell Transport Layer Protocol. IETF RFC 5647 August 2009.","DOI":"10.17487\/rfc5647"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"S. Kent. IP encapsulating security payload (ESP). IETF RFC 4303 December 2005.  S. Kent. IP encapsulating security payload (ESP). IETF RFC 4303 December 2005.","DOI":"10.17487\/rfc4303"},{"key":"e_1_3_2_1_17_1","unstructured":"T. Krovetz. HS1-SIV (v1). CAESAR 1st Round competitions.cr.yp.to\/round1\/hs1sivv1.pdf March 2014.  T. Krovetz. HS1-SIV (v1). CAESAR 1st Round competitions.cr.yp.to\/round1\/hs1sivv1.pdf March 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"D. McGrew and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. IETF RFC 4543 May 2006.  D. McGrew and J. Viega. The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH. IETF RFC 4543 May 2006.","DOI":"10.17487\/rfc4543"},{"key":"e_1_3_2_1_19_1","unstructured":"NIST. Advanced Encryption Standard (AES). FIPS 197 2001.  NIST. Advanced Encryption Standard (AES). FIPS 197 2001."},{"key":"e_1_3_2_1_20_1","unstructured":"NIST. Recommendation for block cipher modes of operation: Galois\/counter mode (GCM) and GMAC. NIST Special Publication 800-38D 2007.  NIST. Recommendation for block cipher modes of operation: Galois\/counter mode (GCM) and GMAC. NIST Special Publication 800-38D 2007."},{"key":"e_1_3_2_1_21_1","unstructured":"NIST. The keyed-hash message authentication code (HMAC). FIPS 198-1 July 2008.  NIST. The keyed-hash message authentication code (HMAC). FIPS 198-1 July 2008."},{"key":"e_1_3_2_1_22_1","unstructured":"NIST. DRAFT SHA-3 standard: Permutation-based hash and extendable-output functions. DRAFT FIPS 202 May 2014.  NIST. DRAFT SHA-3 standard: Permutation-based hash and extendable-output functions. DRAFT FIPS 202 May 2014."},{"key":"e_1_3_2_1_23_1","unstructured":"NIST and D. Bernstein. CAESAR call for submissions. competitions.cr.yp.to\/caesar-call.html January 2014.  NIST and D. Bernstein. CAESAR call for submissions. competitions.cr.yp.to\/caesar-call.html January 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"NSA. Suite B Cryptography. www.nsa.gov\/ia\/programs\/suiteb_cryptography June 2014.  NSA. Suite B Cryptography. www.nsa.gov\/ia\/programs\/suiteb_cryptography June 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"G.\n       \n      Procter\n     and \n      \n      \n      C.\n       \n      Cid\n      \n  \n  . \n  On weak keys and forgery attacks against polynomial-based MAC schemes. In S. Moriai editor FSE '13 volume \n  8424\n   of \n  LNCS pages \n  287\n  --\n  304\n  . \n  Springer 2013\n  .  G. Procter and C. Cid. On weak keys and forgery attacks against polynomial-based MAC schemes. In S. Moriai editor FSE '13 volume 8424 of LNCS pages 287--304. Springer 2013.","DOI":"10.1007\/978-3-662-43933-3_15"},{"key":"e_1_3_2_1_26_1","unstructured":"R. Rivest. The RC4 encryption algorithm. Proprietary Speci_cation March 1992.  R. Rivest. The RC4 encryption algorithm. Proprietary Speci_cation March 1992."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34047-5_13"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"M.-J. O.\n       \n      Saarinen\n    . \n      \n      \n      Beyond\n     modes\n      \n  \n  : \n  Building a secure record protocol from a cryptographic sponge permutation. In J. Benaloh editor CT-RSA\n   \n  2014 volume \n  8366\n   of \n  LNCS pages \n  270\n  --\n  285\n  . \n  Springer 2014.  M.-J. O. Saarinen. Beyond modes: Building a secure record protocol from a cryptographic sponge permutation. In J. Benaloh editor CT-RSA 2014 volume 8366 of LNCS pages 270--285. Springer 2014.","DOI":"10.1007\/978-3-319-04852-9_14"},{"key":"e_1_3_2_1_29_1","unstructured":"M.-J. O. Saarinen. Lighter Faster and Constant-Time: WHIRLBOB the Whirlpool variant of STRIBOB. IACR ePrint 2014\/501 eprint.iacr.org\/2014\/501 June 2014.  M.-J. O. Saarinen. Lighter Faster and Constant-Time: WHIRLBOB the Whirlpool variant of STRIBOB. IACR ePrint 2014\/501 eprint.iacr.org\/2014\/501 June 2014."},{"volume-title":"1st Round www.stribob.com","year":"2014","author":"Saarinen M.-J. O.","key":"e_1_3_2_1_30_1"},{"volume-title":"DIAC 2012","year":"2012","author":"Saarinen M.-J. O.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"M. Salter and R. Housley. Suite B Profile for Transport Layer Security (TLS). IETF RFC 6460 January 2012.  M. Salter and R. Housley. Suite B Profile for Transport Layer Security (TLS). IETF RFC 6460 January 2012.","DOI":"10.17487\/rfc6460"},{"key":"e_1_3_2_1_33_1","unstructured":"VCAT and NIST. NIST Cryptographic Standards and Guidelines Development Process: Report and Recommendations of the Visiting Committee on Advanced Technology of the National Institute of Standards and Technology July 2014.  VCAT and NIST. NIST Cryptographic Standards and Guidelines Development Process: Report and Recommendations of the Visiting Committee on Advanced Technology of the National Institute of Standards and Technology July 2014."},{"key":"e_1_3_2_1_34_1","unstructured":"Xillybus. The guide to xillybus lite version 2.0. xillybus.com\/downloads\/doc\/xillybus_lite.pdf March 2014.  Xillybus. The guide to xillybus lite version 2.0. xillybus.com\/downloads\/doc\/xillybus_lite.pdf March 2014."},{"key":"e_1_3_2_1_35_1","unstructured":"Xillybus. Xillinux: A Linux distribution for Zedboard ZyBo MicroZed and SocKit. xillybus.com\/xillinux 2014.  Xillybus. Xillinux: A Linux distribution for Zedboard ZyBo MicroZed and SocKit. xillybus.com\/xillinux 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"T. Yl\u00f6nen and C. Lonvick. The secure shell (SSH) transport layer protocol. IETF RFC 4253 January 2006.  T. Yl\u00f6nen and C. Lonvick. The secure shell (SSH) transport layer protocol. IETF RFC 4253 January 2006.","DOI":"10.17487\/rfc4253"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 4th International Workshop on Trustworthy Embedded Devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2666141.2666144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:24Z","timestamp":1750231164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2666141.2666144"}},"subtitle":["Implementing an On-Chip Keyak\/WhirlBob Coprocessor"],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":36,"alternative-id":["10.1145\/2666141.2666144","10.1145\/2666141"],"URL":"https:\/\/doi.org\/10.1145\/2666141.2666144","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}