{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T23:08:13Z","timestamp":1769641693316,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314636","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"157-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Usuba: high-throughput and constant-time ciphers, by construction"],"prefix":"10.1145","author":[{"given":"Darius","family":"Mercadier","sequence":"first","affiliation":[{"name":"Sorbonne University, France \/ CNRS, France \/ Inria, France \/ LIP6, France"}]},{"given":"Pierre-\u00c9variste","family":"Dagand","sequence":"additional","affiliation":[{"name":"Sorbonne University, France \/ CNRS, France \/ Inria, France \/ LIP6, France"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"IEEE Standard VHDL Language Reference Manual","year":"2008","unstructured":"2009. IEEE Standard VHDL Language Reference Manual . IEEE Std 1076- 2008 (Revision of IEEE Std 1076-2002) (26 2009). 2009. IEEE Standard VHDL Language Reference Manual. IEEE Std 1076-2008 (Revision of IEEE Std 1076-2002) (26 2009)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134078"},{"key":"e_1_3_2_2_3_1","volume-title":"Verifying ConstantTime Implementations. In 25th USENIX Security Symposium, USENIX Security 16","author":"Almeida Jos\u00e9 Bacelar","year":"2016","unstructured":"Jos\u00e9 Bacelar Almeida , Manuel Barbosa , Gilles Barthe , Fran\u00e7ois Dupressoir , and Michael Emmi . 2016 . Verifying ConstantTime Implementations. In 25th USENIX Security Symposium, USENIX Security 16 , Austin, TX, USA , August 10-12, 2016. 53\u201370. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/almeida Jos\u00e9 Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Fran\u00e7ois Dupressoir, and Michael Emmi. 2016. Verifying ConstantTime Implementations. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. 53\u201370. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/almeida"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_2_5_1","volume-title":"Taipei","author":"Banik Subhadeep","year":"2017","unstructured":"Subhadeep Banik , Sumit Kumar Pandey , Thomas Peyrin , Yu Sasaki , Siang Meng Sim , and Yosuke Todo . 2017 . GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference , Taipei , Taiwan, September 25-28, 2017, Proceedings . 321\u2013345. Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, and Yosuke Todo. 2017. GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings . 321\u2013345."},{"key":"e_1_3_2_2_6_1","volume-title":"ICICS 2015","author":"Bao Zhenzhen","year":"2015","unstructured":"Zhenzhen Bao , Peng Luo , and Dongdai Lin . 2015 . Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. In Information and Communications Security - 17th International Conference , ICICS 2015 , Beijing, China , December 9-11, 2015, Revised Selected Papers . 18\u201336. Zhenzhen Bao, Peng Luo, and Dongdai Lin. 2015. Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit Microcontrollers. In Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers . 18\u201336."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29320-7_21"},{"key":"e_1_3_2_2_8_1","volume-title":"High-Assurance Cryptography: Cryptographic Software We Can Trust","author":"Barthe Gilles","year":"2015","unstructured":"Gilles Barthe . 2015. High-Assurance Cryptography: Cryptographic Software We Can Trust . IEEE Security &amp; Privacy 13, 5 ( 2015 ), 86\u201389. Gilles Barthe. 2015. High-Assurance Cryptography: Cryptographic Software We Can Trust. IEEE Security &amp; Privacy 13, 5 (2015), 86\u201389."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29078-2_4"},{"key":"e_1_3_2_2_10_1","unstructured":"Daniel J. Bernstein. 2005. Cache-timing attacks on AES. http:\/\/cr.yp. to\/papers.html#cachetiming  Daniel J. Bernstein. 2005. Cache-timing attacks on AES. http:\/\/cr.yp. to\/papers.html#cachetiming"},{"key":"e_1_3_2_2_11_1","unstructured":"Daniel J. Bernstein. 2007. qhasm software package. https:\/\/cr.yp.to\/ qhasm.html  Daniel J. Bernstein. 2007. qhasm software package. https:\/\/cr.yp.to\/ qhasm.html"},{"key":"e_1_3_2_2_12_1","volume-title":"State of the Art of Stream Ciphers Workshop, SASC","author":"Bernstein Daniel J.","year":"2008","unstructured":"Daniel J. Bernstein . 2008 . ChaCha, a variant of Salsa20 . In State of the Art of Stream Ciphers Workshop, SASC 2008, Lausanne, Switzerland . https:\/\/cr.yp.to\/papers.html#chacha Daniel J. Bernstein. 2008. ChaCha, a variant of Salsa20. In State of the Art of Stream Ciphers Workshop, SASC 2008, Lausanne, Switzerland . https:\/\/cr.yp.to\/papers.html#chacha"},{"key":"e_1_3_2_2_13_1","volume-title":"Bernstein and Tanja Lange (editors","author":"Daniel","year":"2018","unstructured":"Daniel J. Bernstein and Tanja Lange (editors ). 2018 . Supercop : System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives . https:\/\/bench.cr.yp.to\/supercop.html Daniel J. Bernstein and Tanja Lange (editors). 2018. Supercop: System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives. https:\/\/bench.cr.yp.to\/supercop.html"},{"key":"e_1_3_2_2_14_1","volume-title":"9th International Conference on Cryptology in India","author":"Daniel","year":"2008","unstructured":"Daniel J. Bernstein and Peter Schwabe. 2008. New AES Software Speed Records. In Progress in Cryptology - INDOCRYPT 2008 , 9th International Conference on Cryptology in India , Kharagpur, India , December 14-17, 2008 . Proceedings . 322\u2013336. Daniel J. Bernstein and Peter Schwabe. 2008. New AES Software Speed Records. In Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings . 322\u2013336."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375657.1375674"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Eli Biham. 1997. A fast new DES implementation in software. In FSE.   Eli Biham. 1997. A fast new DES implementation in software. In FSE.","DOI":"10.1007\/BFb0052352"},{"key":"e_1_3_2_2_17_1","volume-title":"5th International Workshop, FSE \u201998","author":"Biham Eli","year":"1998","unstructured":"Eli Biham , Ross J. Anderson , and Lars R. Knudsen . 1998. Serpent: A New Block Cipher Proposal. In Fast Software Encryption , 5th International Workshop, FSE \u201998 , Paris, France , March 23-25, 1998 , Proceedings . 222\u2013 238. Eli Biham, Ross J. Anderson, and Lars R. Knudsen. 1998. Serpent: A New Block Cipher Proposal. In Fast Software Encryption, 5th International Workshop, FSE \u201998, Paris, France, March 23-25, 1998, Proceedings . 222\u2013 238."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_2_19_1","volume-title":"Vale: Verifying High-Performance Cryptographic Assembly Code. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Bond Barry","year":"2017","unstructured":"Barry Bond , Chris Hawblitzel , Manos Kapritsos , K. Rustan M. Leino , Jacob R. Lorch , Bryan Parno , Ashay Rane , Srinath T. V. Setty , and Laure Thompson . 2017 . Vale: Verifying High-Performance Cryptographic Assembly Code. In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017. 917\u2013934. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/ technical-sessions\/presentation\/bond Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath T. V. Setty, and Laure Thompson. 2017. Vale: Verifying High-Performance Cryptographic Assembly Code. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017. 917\u2013934. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/ technical-sessions\/presentation\/bond"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648610"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_13"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_32"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05445-7_10"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/41625.41641"},{"key":"e_1_3_2_2_25_1","volume-title":"SecDev 2017","author":"Cauligi Sunjay","year":"2017","unstructured":"Sunjay Cauligi , Gary Soeller , Fraser Brown , Brian Johannesmeyer , Yunlu Huang , Ranjit Jhala , and Deian Stefan . 2017 . FaCT: A Flexible, Constant-Time Programming Language. In IEEE Cybersecurity Development , SecDev 2017 , Cambridge, MA, USA , September 24-26, 2017 . 69\u201376. Sunjay Cauligi, Gary Soeller, Fraser Brown, Brian Johannesmeyer, Yunlu Huang, Ranjit Jhala, and Deian Stefan. 2017. FaCT: A Flexible, Constant-Time Programming Language. In IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017 . 69\u201376."},{"key":"e_1_3_2_2_26_1","volume-title":"Bernstein","author":"Dolbeau Romain","year":"2014","unstructured":"Romain Dolbeau and Daniel J . Bernstein . 2014 . chacha20 dolbeau amd64-avx2. https:\/\/bench.cr.yp.to\/supercop.html Romain Dolbeau and Daniel J. Bernstein. 2014. chacha20 dolbeau amd64-avx2. https:\/\/bench.cr.yp.to\/supercop.html"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i2.48-78"},{"key":"e_1_3_2_2_29_1","unstructured":"Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich and Martin Dixon. 2010. Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/ white-papers\/communications-ia-multi-buffer-paper.pdf  Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich and Martin Dixon. 2010. Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/ white-papers\/communications-ia-multi-buffer-paper.pdf"},{"key":"e_1_3_2_2_30_1","volume-title":"FSE 2014","author":"Grosso Vincent","year":"2014","unstructured":"Vincent Grosso , Ga\u00ebtan Leurent , Fran\u00e7ois-Xavier Standaert , and Kerem Varici . 2014 . LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. In Fast Software Encryption - 21st International Workshop , FSE 2014 , London, UK , March 3-5, 2014. Revised Selected Papers . 18\u201337. Vincent Grosso, Ga\u00ebtan Leurent, Fran\u00e7ois-Xavier Standaert, and Kerem Varici. 2014. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. In Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers . 18\u201337."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42415"},{"key":"e_1_3_2_2_32_1","unstructured":"Johannes G\u00f6tzfried. 2012. Serpent AVX2. https:\/\/github.com\/ jkivilin\/supercop-blockciphers\/tree\/beyond_master\/crypto_stream\/ serpent128ctr\/avx2-16way-1  Johannes G\u00f6tzfried. 2012. Serpent AVX2. https:\/\/github.com\/ jkivilin\/supercop-blockciphers\/tree\/beyond_master\/crypto_stream\/ serpent128ctr\/avx2-16way-1"},{"key":"e_1_3_2_2_33_1","unstructured":"Johannes G\u00f6tzfried. 2012. Serpent AVX2. https:\/\/github.com\/ jkivilin\/supercop-blockciphers\/tree\/beyond_master\/crypto_stream\/ serpent128ctr\/avx-8way-1  Johannes G\u00f6tzfried. 2012. Serpent AVX2. https:\/\/github.com\/ jkivilin\/supercop-blockciphers\/tree\/beyond_master\/crypto_stream\/ serpent128ctr\/avx-8way-1"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/358896.358899"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/645387.651547"},{"key":"e_1_3_2_2_36_1","unstructured":"Emilia K\u00e4sper and Peter Schwabe. 2009. AES-CTR nonconstant-time key setup. https:\/\/cryptojedi.org\/crypto\/data\/ aes-ctr-128-const-intel64-20090611.tar.bz2  Emilia K\u00e4sper and Peter Schwabe. 2009. AES-CTR nonconstant-time key setup. https:\/\/cryptojedi.org\/crypto\/data\/ aes-ctr-128-const-intel64-20090611.tar.bz2"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_1"},{"key":"e_1_3_2_2_38_1","volume-title":"Block Ciphers: Fast Implementations on x86-64 Architecture. https:\/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/ beyond_master\/crypto_stream\/aes128ctr\/avx","author":"Kivilinna Jussi","year":"2011","unstructured":"Jussi Kivilinna . 2011 . Block Ciphers: Fast Implementations on x86-64 Architecture. https:\/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/ beyond_master\/crypto_stream\/aes128ctr\/avx Jussi Kivilinna. 2011. Block Ciphers: Fast Implementations on x86-64 Architecture. https:\/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/ beyond_master\/crypto_stream\/aes128ctr\/avx"},{"key":"e_1_3_2_2_39_1","unstructured":"Jussi Kivilinna. 2011. Serpent sse2 implementation. https: \/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/beyond_master\/ crypto_stream\/serpent128ctr\/sse2-8way  Jussi Kivilinna. 2011. Serpent sse2 implementation. https: \/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/beyond_master\/ crypto_stream\/serpent128ctr\/sse2-8way"},{"key":"e_1_3_2_2_40_1","volume-title":"Block Ciphers: fast Implementations on x86-64 Architecture . Master\u2019s thesis","author":"Kivilinna Jussi","unstructured":"Jussi Kivilinna . 2013. Block Ciphers: fast Implementations on x86-64 Architecture . Master\u2019s thesis . University of Oulu, Faculty of Science, Department of Information Processing Science , Information Processing Science. Jussi Kivilinna. 2013. Block Ciphers: fast Implementations on x86-64 Architecture . Master\u2019s thesis. University of Oulu, Faculty of Science, Department of Information Processing Science, Information Processing Science."},{"key":"e_1_3_2_2_41_1","volume-title":"RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings . 187\u2013202","author":"K\u00f6nighofer Robert","year":"2008","unstructured":"Robert K\u00f6nighofer . 2008 . A Fast and Cache-Timing Resistant Implementation of the AES. In Topics in Cryptology - CT-RSA 2008, The Cryptographers\u2019 Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings . 187\u2013202 . Robert K\u00f6nighofer. 2008. A Fast and Cache-Timing Resistant Implementation of the AES. In Topics in Cryptology - CT-RSA 2008, The Cryptographers\u2019 Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings . 187\u2013202."},{"key":"e_1_3_2_2_42_1","unstructured":"Matthew Kwan. 2000. Bitslice DES. http:\/\/www.darkside.com.au\/ bitslice\/  Matthew Kwan. 2000. Bitslice DES. http:\/\/www.darkside.com.au\/ bitslice\/"},{"key":"e_1_3_2_2_43_1","first-page":"51","article-title":"Reducing the Gate Count of Bitslice DES","volume":"2000","author":"Kwan Matthew","year":"2000","unstructured":"Matthew Kwan . 2000 . Reducing the Gate Count of Bitslice DES . IACR Cryptology ePrint Archive 2000 (2000), 51 . http:\/\/eprint.iacr.org\/2000\/ 051 Matthew Kwan. 2000. Reducing the Gate Count of Bitslice DES. IACR Cryptology ePrint Archive 2000 (2000), 51. http:\/\/eprint.iacr.org\/2000\/ 051","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351693"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3060597"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799313_22"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_9"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178433.3178437"},{"key":"e_1_3_2_2_50_1","volume-title":"RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings . 21\u201344","author":"Moghimi Ahmad","year":"2018","unstructured":"Ahmad Moghimi , Thomas Eisenbarth , and Berk Sunar . 2018 . MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. In Topics in Cryptology - CT-RSA 2018 - The Cryptographers\u2019 Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings . 21\u201344 . Ahmad Moghimi, Thomas Eisenbarth, and Berk Sunar. 2018. MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX. In Topics in Cryptology - CT-RSA 2018 - The Cryptographers\u2019 Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings . 21\u201344."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706356.1706376"},{"key":"e_1_3_2_2_52_1","volume-title":"Combining register allocation and instruction scheduling","author":"Motwani Rajeev","year":"1995","unstructured":"Rajeev Motwani , Krishna V Palem , Vivek Sarkar , and Salem Reyen . 1995. Combining register allocation and instruction scheduling . Courant Institute, New York University ( 1995 ). Rajeev Motwani, Krishna V Palem, Vivek Sarkar, and Salem Reyen. 1995. Combining register allocation and instruction scheduling. Courant Institute, New York University (1995)."},{"key":"e_1_3_2_2_53_1","first-page":"275","article-title":"Implementing BLAKE with AVX, AVX2, and XOP","volume":"2012","author":"Neves Samuel","year":"2012","unstructured":"Samuel Neves and Jean-Philippe Aumasson . 2012 . Implementing BLAKE with AVX, AVX2, and XOP . IACR Cryptology ePrint Archive 2012 (2012), 275 . http:\/\/eprint.iacr.org\/2012\/275 Samuel Neves and Jean-Philippe Aumasson. 2012. Implementing BLAKE with AVX, AVX2, and XOP. IACR Cryptology ePrint Archive 2012 (2012), 275. http:\/\/eprint.iacr.org\/2012\/275","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_57_1","volume-title":"AES Candidate Conference . 317\u2013329","author":"Osvik Dag Arne","year":"2000","unstructured":"Dag Arne Osvik . 2000 . Speeding up Serpent . In AES Candidate Conference . 317\u2013329 . Dag Arne Osvik. 2000. Speeding up Serpent. In AES Candidate Conference . 317\u2013329."},{"key":"e_1_3_2_2_58_1","unstructured":"Dag Arne Osvik and Jussi Kivilinna. 2002. Linux serpent. https:\/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/beyond_ master\/crypto_stream\/serpent128ctr\/linux_c  Dag Arne Osvik and Jussi Kivilinna. 2002. Linux serpent. https:\/\/github.com\/jkivilin\/supercop-blockciphers\/tree\/beyond_ master\/crypto_stream\/serpent128ctr\/linux_c"},{"key":"e_1_3_2_2_59_1","first-page":"3","article-title":"FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data","volume":"2018","author":"Park Jin","year":"2018","unstructured":"Jin Park and Dong Lee . 2018 . FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data . IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 , 3 (Aug. 2018), 469\u2013499. Jin Park and Dong Lee. 2018. FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data. IACR Transactions on Cryptographic Hardware and Embedded Systems 2018, 3 (Aug. 2018), 469\u2013499.","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_2_60_1","volume-title":"NL","author":"Patrick Conor","year":"2016","unstructured":"Conor Patrick , Bilgiday Yuce , Nahid Farhady Ghalaty , and Patrick Schaumont . 2016 . Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. In Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John\u2019s , NL , Canada, August 10-12, 2016, Revised Selected Papers . 231\u2013244. Conor Patrick, Bilgiday Yuce, Nahid Farhady Ghalaty, and Patrick Schaumont. 2016. Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy. In Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John\u2019s, NL, Canada, August 10-12, 2016, Revised Selected Papers . 231\u2013244."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89330-1_10"},{"key":"e_1_3_2_2_62_1","volume-title":"Mark","author":"Pharr Matt","year":"2012","unstructured":"Matt Pharr and William R . Mark . 2012 . ispc: A SPMD compiler for high-performance CPU programming. In InPar \u201912: Innovative Parallel Computing . 1\u201313. Matt Pharr and William R. Mark. 2012. ispc: A SPMD compiler for high-performance CPU programming. In InPar \u201912: Innovative Parallel Computing . 1\u201313."},{"key":"e_1_3_2_2_64_1","volume-title":"DATE 2017","author":"Reparaz Oscar","year":"2017","unstructured":"Oscar Reparaz , Josep Balasch , and Ingrid Verbauwhede . 2017 . Dude, is my code constant time?. In Design, Automation &amp; Test in Europe Conference &amp; Exhibition , DATE 2017 , Lausanne, Switzerland , March 27-31, 2017 . 1697\u20131702. Oscar Reparaz, Josep Balasch, and Ingrid Verbauwhede. 2017. Dude, is my code constant time?. In Design, Automation &amp; Test in Europe Conference &amp; Exhibition, DATE 2017, Lausanne, Switzerland, March 27-31, 2017 . 1697\u20131702."},{"key":"e_1_3_2_2_65_1","unstructured":"Fr\u00e9d\u00e9ric Rocheteau. 1992. Extension du langage LUSTRE et application \u00e0 la conception de circuits : le langage LUSTRE-V4 et le syst\u00e8me POLLUX. (Extension of the lustre language and application to hardware design : the lustre-v4 language and the pollux system) . Ph.D. Dissertation. Grenoble Institute of Technology France. https:\/\/tel.archives-ouvertes. fr\/tel-00342092  Fr\u00e9d\u00e9ric Rocheteau. 1992. Extension du langage LUSTRE et application \u00e0 la conception de circuits : le langage LUSTRE-V4 et le syst\u00e8me POLLUX. (Extension of the lustre language and application to hardware design : the lustre-v4 language and the pollux system) . Ph.D. Dissertation. Grenoble Institute of Technology France. https:\/\/tel.archives-ouvertes. fr\/tel-00342092"},{"key":"e_1_3_2_2_66_1","volume-title":"SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, Denmark . 16\u201317","author":"Ullrich Markus","year":"2011","unstructured":"Markus Ullrich , Christophe De Canniere , Sebastiaan Indesteege , \u00d6zg\u00fcl K\u00fc\u00e7\u00fck , Nicky Mouha , and Bart Preneel . 2011 . Finding optimal bitsliced implementations of 4\u00d7 4-bit S-boxes . In SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, Denmark . 16\u201317 . http:\/\/skew2011.mat.dtu.dk\/proceedings\/Finding% 20Optimal%20Bitsliced%20Implementations%20of%204%20to% 204-bit%20S-boxes.pdf Markus Ullrich, Christophe De Canniere, Sebastiaan Indesteege, \u00d6zg\u00fcl K\u00fc\u00e7\u00fck, Nicky Mouha, and Bart Preneel. 2011. Finding optimal bitsliced implementations of 4\u00d7 4-bit S-boxes. In SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, Denmark . 16\u201317. http:\/\/skew2011.mat.dtu.dk\/proceedings\/Finding% 20Optimal%20Bitsliced%20Implementations%20of%204%20to% 204-bit%20S-boxes.pdf"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/75277.75283"},{"key":"e_1_3_2_2_68_1","first-page":"84","article-title":"RECTANGLE: A Bit-slice UltraLightweight Block Cipher Suitable for Multiple Platforms","volume":"2014","author":"Zhang Wentao","year":"2014","unstructured":"Wentao Zhang , Zhenzhen Bao , Dongdai Lin , Vincent Rijmen , Bohan Yang , and Ingrid Verbauwhede . 2014 . RECTANGLE: A Bit-slice UltraLightweight Block Cipher Suitable for Multiple Platforms . IACR Cryptology ePrint Archive 2014 (2014), 84 . http:\/\/eprint.iacr.org\/2014\/084 Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, and Ingrid Verbauwhede. 2014. RECTANGLE: A Bit-slice UltraLightweight Block Cipher Suitable for Multiple Platforms. IACR Cryptology ePrint Archive 2014 (2014), 84. http:\/\/eprint.iacr.org\/2014\/084","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_69_1","first-page":"536","article-title":"HACL*: A Verified Modern Cryptographic Library","volume":"2017","author":"Zinzindohou\u00e9 Jean Karim","year":"2017","unstructured":"Jean Karim Zinzindohou\u00e9 , Karthikeyan Bhargavan , Jonathan Protzenko , and Benjamin Beurdouche . 2017 . HACL*: A Verified Modern Cryptographic Library . IACR Cryptology ePrint Archive 2017 (2017), 536 . http:\/\/eprint.iacr.org\/2017\/536 Jean Karim Zinzindohou\u00e9, Karthikeyan Bhargavan, Jonathan Protzenko, and Benjamin Beurdouche. 2017. HACL*: A Verified Modern Cryptographic Library. IACR Cryptology ePrint Archive 2017 (2017), 536. http:\/\/eprint.iacr.org\/2017\/536","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Phoenix AZ USA","acronym":"PLDI '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":64,"alternative-id":["10.1145\/3314221.3314636","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314636","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}