{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:47:36Z","timestamp":1729612056334,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/wcncw.2015.7122526","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T16:03:19Z","timestamp":1434643399000},"page":"41-46","source":"Crossref","is-referenced-by-count":1,"title":["Towards distributing block ciphers computations"],"prefix":"10.1109","author":[{"given":"Andrea G.","family":"Forte","sequence":"first","affiliation":[]},{"given":"Gianluigi","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"239","article-title":"A compact Rijndael hardware architecture with S-box optimization","author":"satoh","year":"2001","journal-title":"Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT) -Advances in Cryptology"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","article-title":"aes implementation on a grain of sand","volume":"152","author":"feldhofer","year":"2005","journal-title":"Information Security IEE Proceedings"},{"key":"ref12","first-page":"67","article-title":"An ASIC implementation of the AES S-Boxes","author":"wolkerstorfer","year":"2002","journal-title":"Proc Topics Cryptol (CT-RSA)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","article-title":"PRESENT: An ultra-lightweight block cipher","author":"bogdanov","year":"2007","journal-title":"9th Intl Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","article-title":"LBlock: a lightweight block cipher","author":"wu","year":"2011","journal-title":"Proc of the International Conference on Applied Cryptography and Network Security"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/3-540-60590-8_29","article-title":"TEA, a tiny encryption algorithm","author":"wheeler","year":"1995","journal-title":"Proceedings of the 2nd International Workshop on Fast Software Encryption"},{"key":"ref17","article-title":"Tea extensions","author":"needham","year":"1997","journal-title":"Cambridge University Technical Report"},{"key":"ref18","first-page":"272","article-title":"KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers","author":"de canniere","year":"2009","journal-title":"Proc 1st Int Workshop Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref19","first-page":"2011","article-title":"Arduino AESLib","author":"landman","year":"0"},{"key":"ref4","first-page":"1110","article-title":"Energy evaluation of software implementations of block ciphers under memory constraints","author":"gro\u00dfsch\u00e4dl","year":"2007","journal-title":"Proc of the Conference on Design Automation and Test in Europe (DATE)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.16"},{"key":"ref6","first-page":"302","article-title":"Energy, performance, area versus security trade-offs for stream ciphers","author":"batina","year":"2004","journal-title":"The State of the Art of Stream Ciphers Workshop Record"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/11807964_38","article-title":"Energy comparison of AES and SHA-l for ubiquitous computing","author":"kaps","year":"2006","journal-title":"Emerging Directions in Embedded and Ubiquitous Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_13"},{"key":"ref7","first-page":"270","article-title":"Instruction set extensions for efficient AES implementation on 32-bit processors","author":"tillich","year":"2006","journal-title":"Proc 1st Int Workshop Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LPE.2003.1231830"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258477"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11604938_23"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.12.029"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1035242"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566840"}],"event":{"name":"2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","start":{"date-parts":[[2015,3,9]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2015,3,12]]}},"container-title":["2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7120773\/7122513\/07122526.pdf?arnumber=7122526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T04:11:09Z","timestamp":1566879069000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7122526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wcncw.2015.7122526","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}