Check out the new USENIX Web site.
... register1
Mapping the encryption or decryption key to the Key register is straightforward, bytes $ a_0, a_1, ..., a_{15}$ of the key are mapped one to one to bytes $ k_0, k_1, ..., k_{15}$ of the Key register respectively.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.