{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:12Z","timestamp":1725845652752},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_15","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"209-217","source":"Crossref","is-referenced-by-count":3,"title":["Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases"],"prefix":"10.1007","author":[{"given":"Alberto F.","family":"Mart\u00ednez-Herrera","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Mex-Perera","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Nolazco-Flores","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"15_CR1","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-94-007-2598-0_69","volume-title":"IT Convergence and Services","author":"I Abbasi","year":"2011","unstructured":"Abbasi, I., Afzal, M.: A compact S-Box design for SMS4 block cipher. In: Park, J.J., Arabnia, H., Chang, H.-B., Shon, T. (eds.) IT Convergence and Services. Lecture Notes in Electrical Engineering, pp. 641\u2013658. Springer, Netherlands (2011)"},{"unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Specifications of Camellia, a 128 bits block cipher. Technical report 1, Mitsubishi and NTT DoCoMo, Tokio, Japan, August (2001)","key":"15_CR2"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s13389-011-0009-8","volume":"1","author":"J-L Beuchat","year":"2011","unstructured":"Beuchat, J.-L., Okamoto, E., Yamazaki, T.: A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO. J. Crypt. Eng. 1(2), 101\u2013121 (2011)","journal-title":"J. Crypt. Eng."},{"doi-asserted-by":"crossref","unstructured":"Canright, D.: A very compact Rijndael S-box. Technical report, Naval Postgraduate School, Monterey, CA, USA (2005)","key":"15_CR4","DOI":"10.21236\/ADA434781"},{"key":"15_CR5","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Information Security and Cryptography. Springer, Heidelberg (2002)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-14423-3_6","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"J Erickson","year":"2010","unstructured":"Erickson, J., Ding, J., Christensen, C.: Algebraic cryptanalysis of SMS4: Gr\u00f6bner basis attack and SAT attack compared. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 73\u201386. Springer, Heidelberg (2010)"},{"unstructured":"IEEE: IEEE Std 1363\u20132000 IEEE Standard Specifications for Public-Key Cryptography (2000)","key":"15_CR7"},{"unstructured":"IEEE: IEEE Standard Specifications for Public-Key Cryptography- Amendment 1: Additional Techniques. IEEE Std 1363a\u20132004 (Amendment to IEEE Std 1363\u20132000), pp. 1\u2013159 (2004)","key":"15_CR8"},{"key":"15_CR9","volume-title":"Hardware Implementation of Finite-Field Arithmetic","author":"J-P Deschamps","year":"2009","unstructured":"Deschamps, J.-P., Luis, I.J., Gustavo, D.S.: Hardware Implementation of Finite-Field Arithmetic, vol. 2009. McGraw Hill, New York (2009)"},{"unstructured":"Boyar, J., Peralta, R.: A depth-16 circuit for the AES S-box. Cryptology ePrint Archive, Report 2011\/332 (2011). \n                      http:\/\/eprint.iacr.org\/","key":"15_CR10"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-73458-1_13","volume-title":"Information Security and Privacy","author":"F Liu","year":"2007","unstructured":"Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.-P.: Analysis of the SMS4 block cipher. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 158\u2013170. Springer, Heidelberg (2007)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-35404-5_22","volume-title":"Cryptology and Network Security","author":"AF Mart\u00ednez-Herrera","year":"2012","unstructured":"Mart\u00ednez-Herrera, A.F., Mex-Perera, J.C., Nolazco-Flores, J.A.: Some representations of the S-Box of Camellia in GF(((2\n                      \n                        \n                      \n                      $$^\\text{2 }$$\n                    )\n                      \n                        \n                      \n                      $$^\\text{2 }$$\n                    )\n                      \n                        \n                      \n                      $$^\\text{2 }$$\n                    ). In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 296\u2013309. Springer, Heidelberg (2012)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-30574-3_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N Mentens","year":"2005","unstructured":"Mentens, N., Batina, L., Preneel, B., Verbauwhede, I.: A systematic evaluation of compact hardware implementations for the Rijndael S-Box. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 323\u2013333. Springer, Heidelberg (2005)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-540-85855-3_16","volume-title":"Security and Cryptography for Networks","author":"S Nikova","year":"2008","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Using normal bases for compact hardware implementations of the AES S-Box. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 236\u2013245. Springer, Heidelberg (2008)"},{"unstructured":"Paar, C.: Efficient VLSI architectures for bit-parallel computation in Galois fields. Dissertation, Institute for Experimental Mathematics, Universitt Essen, Essen (1994)","key":"15_CR15"},{"doi-asserted-by":"crossref","unstructured":"Rogawski, M., Gaj, K.: A high-speed unified hardware architecture for AES and the SHA-3 candidate Gr\u00f8stl. In: 2012 15th Euromicro Conference on Digital System Design (DSD), pp. 568\u2013575 (2012)","key":"15_CR16","DOI":"10.1109\/DSD.2012.8"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/10958513_20","volume-title":"Information Security","author":"A Satoh","year":"2003","unstructured":"Satoh, A., Morioka, S.: Hardware-focused performance comparison for the standard block ciphers AES, Camellia, and triple-DES. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 252\u2013266. Springer, Heidelberg (2003)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-540-45238-6_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"A Satoh","year":"2003","unstructured":"Satoh, A., Morioka, S.: Unified hardware architecture for 128-bit block ciphers AES and Camellia. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 304\u2013318. Springer, Heidelberg (2003)"},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A fast algorithm for computing multiplicative inverses in GF(\n                      \n                        \n                      \n                      $$2^{m}$$\n                    ) using normal bases. Inf. Comput. 78(3), 171\u2013177 (1988)","journal-title":"Inf. Comput."},{"unstructured":"Diffie, W., Ledin, G. (translators): SMS4 encryption algorithm for wireless networks. Cryptology ePrint Archive, Report 2008\/329, Translation version of the original document in Chinese (2008). \n                      http:\/\/www.oscca.gov.cn\/UpFile\/200621016423197990.pdf","key":"15_CR20"},{"key":"15_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES SBoxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 67. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Bai, X., Guo, L.: An efficient implementation of SMS4 cipher with multiplicative masking resistant to differential power analysis attack. In: WRI International Conference on Communications and Mobile Computing, CMC 2009, vol. 3, pp. 364\u2013369 (2009)","key":"15_CR22","DOI":"10.1109\/CMC.2009.182"},{"issue":"6","key":"15_CR23","first-page":"1318","volume":"94","author":"N Yasuyuki","year":"2011","unstructured":"Yasuyuki, N., Kenta, N., Tetsumi, T., Naoto, H., Yoshitaka, M.: Mixed bases for efficient inversion in F\n                      \n                        \n                      \n                      $$((2^{2})^{2})^{2}$$\n                     and conversion matrices of subbytes of AES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94(6), 1318\u20131327 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"9","key":"15_CR24","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/TVLSI.2004.832943","volume":"12","author":"X Zhang","year":"2004","unstructured":"Zhang, X., Parhi, K.: High-speed VLSI architectures for the AES algorithm. IEEE Trans. Very Large Scale Integr. VLSI Syst. 12(9), 957\u2013967 (2004)","journal-title":"IEEE Trans. Very Large Scale Integr. VLSI Syst."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:39:01Z","timestamp":1559356741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}