{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:01:54Z","timestamp":1725544914468},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642118012"},{"type":"electronic","value":"9783642118029"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11802-9_37","type":"book-chapter","created":{"date-parts":[[2010,2,5]],"date-time":"2010-02-05T17:47:19Z","timestamp":1265392039000},"page":"326-335","source":"Crossref","is-referenced-by-count":2,"title":["Processor Customization for Software Implementation of the AES Algorithm for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"N\u00e9stor","family":"Su\u00e1rez","sequence":"first","affiliation":[]},{"given":"Gustavo M.","family":"Callic\u00f3","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Sarmiento","sequence":"additional","affiliation":[]},{"given":"Octavio","family":"Santana","sequence":"additional","affiliation":[]},{"given":"Anteneh A.","family":"Abbo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-74991-2_1","volume-title":"Algorithms for Sensor and Ad Hoc Networks","author":"H.J. Hof","year":"2007","unstructured":"Hof, H.J.: Applications of Sensor Networks. In: Wagner, D., Wattenhofer, R. (eds.) Algorithms for Sensor and Ad Hoc Networks. LNCS, vol.\u00a04621, pp. 1\u201320. Springer, Heidelberg (2007)"},{"key":"37_CR2","unstructured":"National Institute of Standards and Technology: Report on the development of the Advanced Encryption Standard (AES) (October 2000)"},{"key":"37_CR3","unstructured":"Institute\u00a0of Electrical, Electronics\u00a0Engineers (IEEE): IEEE 802.15.4-2006, Revision of IEEE 802.15.4-2003 (2006)"},{"key":"37_CR4","unstructured":"ZigBee Alliance, http:\/\/www.zigbee.org\/"},{"issue":"6","key":"37_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM\u00a047(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"issue":"1","key":"37_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"Y.W. Law","year":"2006","unstructured":"Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw.\u00a02(1), 65\u201393 (2006)","journal-title":"ACM Trans. Sen. Netw."},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: SenSys 2004, Baltimore, November 2004, pp. 162\u2013175 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"37_CR8","unstructured":"Silicon\u00a0Hive\u2019s website, http:\/\/www.siliconhive.com\/"},{"key":"37_CR9","unstructured":"International Organization\u00a0for Standardization: ISO\/IEC 10116, Information technology \u2013 Security techniques \u2013 Modes of operation for an n-bit block cipher (2006)"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for block cipher modes of operation: Methods and techniques. NIST Special Publication 800-38A (2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1145\/313817.313928","volume-title":"ISLPED 1999","author":"T. Simunic","year":"1999","unstructured":"Simunic, T., Benini, L., Micheli, G.D.: Energy-efficient design of battery-powered embedded systems. In: ISLPED 1999, pp. 212\u2013217. ACM, New York (1999)"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"G. Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient software implementation of AES on 32-bit platforms. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 159\u2013171. Springer, Heidelberg (2003)"},{"key":"37_CR13","unstructured":"Rijmen, V.: Efficient implementation of the rijndael S-Box"},{"key":"37_CR14","series-title":"Lecture Notes in Computer Science","first-page":"67","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"M. Lamberger","year":"2002","unstructured":"Lamberger, M., Oswald, E., Wolkerstorfer, J.: An ASIC Implementation of the AES SBoxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, p. 67. Springer, Heidelberg (2002)"},{"key":"37_CR15","unstructured":"Daemen, J., Rijmen, V.: Aes proposal: Rijndael"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"},{"key":"37_CR17","unstructured":"Gladman, B.: Reference code, http:\/\/www.gladman.me.uk\/"},{"key":"37_CR18","unstructured":"Sch\u00e4dl, J.G., Tillich, S., Rechberger, C., Hofmann, M., Medwed, M.: Energy evaluation of software implementations of block ciphers under memory constraints. In: DATE 2007, pp. 1110\u20131115 (2007)"}],"container-title":["Lecture Notes in Computer Science","Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11802-9_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T20:24:24Z","timestamp":1558815864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11802-9_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642118012","9783642118029"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11802-9_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}