{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T10:59:09Z","timestamp":1648897149107},"reference-count":27,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1587\/transfun.2019cip0025","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:06:05Z","timestamp":1577829965000},"page":"2-10","source":"Crossref","is-referenced-by-count":0,"title":["Towards Minimizing RAM Requirement for Implementation of Grain-128a on ARM Cortex-M3"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Yuhei","family":"WATANABE","sequence":"first","affiliation":[{"name":"SEI-AIST Cyber Security Cooperative Research Laboratory"},{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]},{"given":"Hideki","family":"YAMAMOTO","sequence":"additional","affiliation":[{"name":"SEI-AIST Cyber Security Cooperative Research Laboratory"},{"name":"Sumitomo Electric Industries, Ltd. (SEI)"}]},{"given":"Hirotaka","family":"YOSHIDA","sequence":"additional","affiliation":[{"name":"SEI-AIST Cyber Security Cooperative Research Laboratory"},{"name":"National Institute of Advanced Industrial Science and Technology (AIST)"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] ECRYPT, \u201cestream: the ecrypt stream cipher project (2004-2008).\u201d Available: http:\/\/www.ecrypt.eu.org\/stream"},{"key":"2","unstructured":"[2] ISO\/IEC, ISO\/IEC 29192-3:2012, \u201cInformation technology-security techniques-lightweight cryptography-part 3: Stream ciphers.\u201d"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] D. Watanabe, K. Ideguchi, J. Kitahara, K. Muto, H. Furuichi, and T. Kaneko, \u201cEnocoro-80: A hardware oriented stream cipher,\u201d Proc. Third International Conference on Availability, Reliability and Security, ARES 2008, pp.1294-1300, IEEE Computer Society, 2008. 10.1109\/ares.2008.84","DOI":"10.1109\/ARES.2008.84"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] D. Watanabe, T. Owada, K. Okamoto, Y. Igarashi, and T. Kaneko, \u201cUpdate on enocoro stream cipher,\u201d Proc. International Symposium on Information Theory and its Applications, ISITA 2010, pp.778-783, IEEE, 2010. 10.1109\/isita.2010.5649627","DOI":"10.1109\/ISITA.2010.5649627"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] C.D. Canni\u00e8re, \u201cTrivium: A stream cipher construction inspired by block cipher design principles,\u201d Information Security, 9th International Conference, ISC 2006, Proceedings, Lecture Notes in Computer Science, vol.4176, pp.171-186, Springer, 2006. 10.1007\/11836810_13","DOI":"10.1007\/11836810_13"},{"key":"6","unstructured":"[6] ISO\/IEC, ISO\/IEC 29167-13:2015, \u201cInformation technology-automatic identification and data capture techniques-part 13: Crypto suite grain-128a security services for air interface communications.\u201d"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] D.J. Bernstein, S. K\u00f6lbl, S. Lucks, P.M.C. Massolino, F. Mendel, K. Nawaz, T. Schneider, P. Schwabe, F. Standaert, Y. Todo, and B. Viguier, \u201cGimli: A cross-platform permutation,\u201d Cryptographic Hardware and Embedded Systems-CHES 2017-19th International Conference, Proceedings, Lecture Notes in Computer Science, vol.10529, pp.299-320, Springer, 2017. 10.1007\/978-3-319-66787-4_15","DOI":"10.1007\/978-3-319-66787-4_15"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] S. Matsuda and S. Moriai, \u201cLightweight cryptography for the cloud: Exploit the power of bitslice implementation,\u201d Cryptographic Hardware and Embedded Systems-CHES 2012-14th International Workshop, Proceedings, Lecture Notes in Computer Science, vol.7428, pp.408-425, Springer, 2012. 10.1007\/978-3-642-33027-8_24","DOI":"10.1007\/978-3-642-33027-8_24"},{"key":"9","unstructured":"[9] Texas Instruments Incorporated., \u201cMicrocontrollers (MCU) other MCUs-products Arm-Cortex-M3,\u201d Available: http:\/\/www.ti.com\/microcontrollers\/other-mcus\/products.html#p887=ARM-Cortex-M3."},{"key":"10","unstructured":"[10] NXP Semiconductors, \u201cLPC1700 series: Scalable mainstream microcontrollers (MCUs) based on Arm Cortex-M3 cores,\u201d Available: https:\/\/www.nxp.com\/products\/processors-and-microcontrollers\/arm-based-processors-and-mcus\/lpc-cortex-m-mcus\/lpc1700-cortex-m3:MC_1403790745385#\/"},{"key":"11","unstructured":"[11] Silicon Laboratories, \u201cEFM32 tiny Gecko 32-bit microcontroller,\u201d Available: https:\/\/www.silabs.com\/products\/mcu\/32-bit\/efm32-tiny-gecko"},{"key":"12","unstructured":"[12] CryptoLUX, \u201cFelics-fair evaluation of lightweight cryptographic systems,\u201d Available: https:\/\/www.cryptolux.org\/index.php\/FELICS"},{"key":"13","unstructured":"[13] Arduino, \u201cArduino due,\u201d Available: https:\/\/store.arduino.cc\/usa\/due"},{"key":"14","unstructured":"[14] ECRYPT, \u201ceBACS: Encrypt benchmarking of cryptographic systems,\u201d Available: http:\/\/bench.cr.yp.to\/results-stream"},{"key":"15","unstructured":"[15] Agilent Technologies, \u201cJTC 003 mixed packet size throughput.\u201d"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] M. Hell, T. Johansson, and W. Meier, \u201cGrain: A stream cipher for constrained environments,\u201d International Journal of Wireless and Mobile Computing, vol.2, no.1, pp.86-93, 2007. 10.1504\/ijwmc.2007.013798","DOI":"10.1504\/IJWMC.2007.013798"},{"key":"17","unstructured":"[17] J.P. Aumasson, I. Dinur, L. Henzen, W. Meier, and A. Shamir, \u201cEfficient FPGA implementations of high-dimensional cube testers on the stream cipher grain-128,\u201d Workshop on Special Purpose Hardware for Attacking Cryptographic Systems (SHARCS'09), 2009."},{"key":"18","unstructured":"[18] ECRYPT, \u201cestream project, grain v1, api-compliant c code,\u201d Available: http:\/\/www.ecrypt.eu.org\/stream\/svn\/viewcvs.cgi\/ecrypt\/trunk\/submissions\/grain\/v1\/"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] M. \u00c5gren, M. Hell, T. Johansson, and W. Meier, \u201cGrain-128a: A new version of grain-128 with optional authentication,\u201d International Journal of Wireless and Mobile Computing, vol.5, no.1, pp.48-59, 2011. 10.1504\/ijwmc.2011.044106","DOI":"10.1504\/IJWMC.2011.044106"},{"key":"20","unstructured":"[20] M. \u00c5gren, M. Hell, T. Johansson, and W. Meier, \u201cA new version of grain-128 with authentication,\u201d Symmetric Key Encryption Workshop 2011, 2011-02-16\/2011-02-17, 2011."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Matsui and Y. Murakami, \u201cAES smaller than s-box \u2014 Minimalism in software design on low end microcontrollers,\u201d Lightweight Cryptography for Security and Privacy-Third International Workshop, LightSec 2014, Revised Selected Papers, Lecture Notes in Computer Science, vol.8898, pp.51-66, Springer, 2014. 10.1007\/978-3-319-16363-5_4","DOI":"10.1007\/978-3-319-16363-5_4"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] R. Cabral and J. L\u00f3pez, \u201cFast software implementation of QUARK on a 32-bit architecture,\u201d Lightweight Cryptography for Security and Privacy-4th International Workshop, LightSec 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol.9542, pp.115-130, Springer, 2015. 10.1007\/978-3-319-29078-2_7","DOI":"10.1007\/978-3-319-29078-2_7"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] P. Schwabe and K. Stoffelen, \u201cAll the AES you need on Cortex-M3 and M4,\u201d Selected Areas in Cryptography-SAC 2016-23rd International Conference, Revised Selected Papers, Lecture Notes in Computer Science, vol.10532, pp.180-194, Springer, 2016. 10.1007\/978-3-319-69453-5_10","DOI":"10.1007\/978-3-319-69453-5_10"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] C. Manifavas, G. Hatzivasilis, K. Fysarakis, and Y. Papaefstathiou, \u201cA survey of lightweight stream ciphers for embedded systems,\u201d Security and Communication Networks, vol.9, no.10, pp.1226-1246, 2016. 10.1002\/sec.1399","DOI":"10.1002\/sec.1399"},{"key":"25","unstructured":"[25] L. Ertaul and A. Woodall, \u201cIoT security: Performance evaluation of grain, mickey, and trivium-lightweight stream ciphers,\u201d The 2017 International Conference on Security and Management (SAM`17), Proceedings, pp.32-38, 2017."},{"key":"26","unstructured":"[26] Node MCU Team, \u201cNodeMcu,\u201d Available: http:\/\/www.nodemcu.com\/index_en.html"},{"key":"27","unstructured":"[27] T. Good and M. Benaissa, \u201cHardware performance of estream phase-iii stream cipher candidates,\u201d The State of the Art of Stream Ciphers, SASC 2008, 2008."}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIP0025\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,6]],"date-time":"2020-01-06T05:25:34Z","timestamp":1578288334000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/1\/E103.A_2019CIP0025\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2019cip0025","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}