{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:55:46Z","timestamp":1775620546315,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T00:00:00Z","timestamp":1599004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T00:00:00Z","timestamp":1599004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Basic Research Foundation of Engineering University of PAP of China","award":["WJY201916"],"award-info":[{"award-number":["WJY201916"]}]},{"name":"the NNSF of China","award":["No. 61704136"],"award-info":[{"award-number":["No. 61704136"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["No. 2018M631163"],"award-info":[{"award-number":["No. 2018M631163"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shaanxi Postdoctoral Research Project Foundation","award":["No. 2017BSHEDZZ29"],"award-info":[{"award-number":["No. 2017BSHEDZZ29"]}]},{"name":"Youth Research Project of Yan\u2019an University of China","award":["YDQ2018-05"],"award-info":[{"award-number":["YDQ2018-05"]}]},{"name":"Innovation and Entrepreneurship Training Program for College Students of China","award":["D2017136"],"award-info":[{"award-number":["D2017136"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12652-020-02497-8","type":"journal-article","created":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T10:02:59Z","timestamp":1599040979000},"page":"7727-7743","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["High-flexible hardware and instruction of composite Galois field multiplication targeted at symmetric crypto processor"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3619-7936","authenticated-orcid":false,"given":"Yang","family":"Su","sequence":"first","affiliation":[]},{"given":"Bai-Long","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing-Yuan","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,2]]},"reference":[{"issue":"3","key":"2497_CR1","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TLA.2018.8358671","volume":"16","author":"A Basallo","year":"2018","unstructured":"Basallo A, Senti E, Sanchez M (2018) Artificial intelligence techniques for information security risk assessment. IEEE Lat Am Trans 16(3):897\u2013901","journal-title":"IEEE Lat Am Trans"},{"key":"2497_CR2","first-page":"3","volume":"711","author":"M Basiri","year":"2017","unstructured":"Basiri M, Shukla S (2017) Flexible composite galois field multiplier designs. Commun Comput Inf Sci 711:3\u201314","journal-title":"Commun Comput Inf Sci"},{"key":"2497_CR3","doi-asserted-by":"crossref","unstructured":"Beame P, Impagliazzo R, Krajicek J et al (1994) Lower bounds on Hilbert's Nullstellensatz and propositional proofs. In: Proceedings 35th annual symposium on foundations of computer science, Santa Fe, NM, USA, pp 794\u2013806","DOI":"10.1109\/SFCS.1994.365714"},{"issue":"3","key":"2497_CR4","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/cryptography2030025","volume":"2","author":"JL Danger","year":"2018","unstructured":"Danger JL, El Housni Y, Facon A (2018) On the performance and security of multiplication in GF (2^N). Cryptography 2:3\u201325","journal-title":"Cryptography"},{"issue":"6","key":"2497_CR5","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1109\/TC.2015.2456023","volume":"65","author":"A Ebrahim","year":"2016","unstructured":"Ebrahim A, Abdulrahman H, Reyhani-Masoleh A (2016a) High-speed hybrid-double multiplication architectures using new serial-out bit-level mastrovito multipliers. IEEE Trans Comput 65(6):1734\u20131747","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"2497_CR6","doi-asserted-by":"publisher","first-page":"1734","DOI":"10.1109\/TC.2015.2456023","volume":"65","author":"A Ebrahim","year":"2016","unstructured":"Ebrahim A , Hasan A, Arash R (2016b) High-speed hybrid-double multiplication architectures using new serial-out bit-level mastrovito multipliers. IEEE Trans Comput 65(6):1734\u20131747","journal-title":"IEEE Trans Comput"},{"issue":"5","key":"2497_CR7","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TGRS.2009.2037899","volume":"48","author":"J Gabriel","year":"2010","unstructured":"Gabriel J, Dami\u00e0 G (2010) Toward SMOS L4 SSS products: improving L3 SSS with auxiliary SSS data. IEEE Trans Geosci Remote Sens 48(5):2204\u20132214","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"2","key":"2497_CR8","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TC.2015.2435775","volume":"65","author":"P Goutam","year":"2016","unstructured":"Goutam P, Anupam C (2016) Three snakes in one hole: the first systematic hardware accelerator design for SOSEMANUK with optional serpent and SNOW 2.0 modes. IEEE Trans Comput 65(2):640\u2013653","journal-title":"IEEE Trans Comput"},{"issue":"5","key":"2497_CR9","first-page":"16","volume":"32","author":"L Hao","year":"2015","unstructured":"Hao L, Liji W, Xiangming ZH (2015) Design and implementation of SM4 block cipher based on composite field. Microelectron Comput 32(5):16\u201320","journal-title":"Microelectron Comput"},{"key":"2497_CR10","unstructured":"Hoang P, Phan D, Dao L, Pham C (2016) A compact, ultra-low power AES-CCM IP core for wireless body area networks. In: 2016 IFIP\/IEEE international conference on very large scale integration (VLSI-SoC), Tallinn, Estonia, pp 1\u20134"},{"issue":"11","key":"2497_CR11","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1109\/TCSII.2006.882360","volume":"53","author":"H Huaiyi","year":"2006","unstructured":"Huaiyi H, Anyeu W, Jihchiang Y (2006) Area-efficient VLSI design of reed-solomon decoder for 10GBase-LX4 optical communication systems. IEEE Trans Circuits Syst 53(11):1245\u20131249","journal-title":"IEEE Trans Circuits Syst"},{"issue":"7","key":"2497_CR12","doi-asserted-by":"publisher","first-page":"1815","DOI":"10.1109\/TCSI.2017.2677962","volume":"64","author":"X Jiafeng","year":"2017","unstructured":"Jiafeng X, Pramod Kumar M, Mingui S (2017) Efficient FPGA implementation of low-complexity systolic karatsuba multiplier over based on NIST polynomials. IEEE Trans Circuits Syst I Regul Pap 64(7):1815\u20131825","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"2497_CR13","unstructured":"Jianbo X (2012) Research on dedicated instructions for finite filed multiplication targeted at symmetric cryptography. Master's Degree Thesis, PLA Information Engineering University, Zhengzhou, China"},{"key":"2497_CR14","doi-asserted-by":"crossref","unstructured":"Jianing S; Zhenghao L (2011) Parallel structure of GF (214) and GF (216) multipliers based on composite finite fields. In: 2011 9th IEEE international conference on ASIC, Xiamen, Fujian, China, pp 768\u2013771","DOI":"10.1109\/ASICON.2011.6157318"},{"issue":"6","key":"2497_CR15","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1049\/iet-ifs.2017.0553","volume":"12","author":"L Jiao","year":"2018","unstructured":"Jiao L , Yongqiang L, Yonglin H (2018) Guess-and-determine attacks on PANAMA-like stream ciphers. IET Inf Secur 12(6):484\u2013497","journal-title":"IET Inf Secur"},{"key":"2497_CR16","unstructured":"Jinpeng L, Priyank K (2012) Formal verification of Galois field multipliers using computer algebra techniques. In: 2012 25th international conference on VLSI design, Hyderabad, India, pp 388\u2013393"},{"key":"2497_CR17","unstructured":"Jinpeng L, Priyank K, Florian E (2011) Verification of composite Galois field multipliers over $$GF((2^{m} )^{n} )$$ using computer algebra techniques. In: 2011 IEEE international high level design validation and test workshop, Napa Valley, California, USA, pp 136\u2013143"},{"key":"2497_CR18","unstructured":"Kevin M, Ethan L, Thomas J (2008) Optimizing Galois field arithmetic for diverse processor architectures and applications. In: 2008 IEEE international symposium on modeling, analysis and simulation of computers and telecommunication systems, Baltimore, Maryland, pp 1\u201310"},{"key":"2497_CR19","doi-asserted-by":"crossref","unstructured":"Madani M, Benkhaddra I, Tanougast C, Chitroub S (2017) FPGA implementation of an enhanced SNOW-3G stream cipher based on a hyperchaotic system. In: 2017 4th international conference on control, decision and information technologies (CoDIT), Barcelona, pp 1168\u20131173","DOI":"10.1109\/CoDIT.2017.8102758"},{"issue":"4","key":"2497_CR20","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"F Mario","year":"2018","unstructured":"Mario F, Pasquale P, Gianluca A, Giancarlo F (2018) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J 5(4):2483\u20132495","journal-title":"IEEE Internet Things J"},{"key":"2497_CR21","unstructured":"Marisa W, Budi R, Fajar Y et al (2011) Composite field multiplier based on look-up table for elliptic curve cryptography implementation. In: Proceedings of the 2011 international conference on electrical engineering and informatics, Bandung, Indonesia, pp 1\u20134"},{"issue":"1","key":"2497_CR22","first-page":"356","volume":"26","author":"L Meifeng","year":"2010","unstructured":"Meifeng L, Guanzhong D, Hang L (2010) Instruction set extension for accelerating Montgomery multiplication in GF(2^m). Appl Res Comput 26(1):356\u2013358","journal-title":"Appl Res Comput"},{"key":"2497_CR23","unstructured":"Miao L, Jiaobo X (2012) Reconfigurable design of composite field multiplication in symmetric cipher algorithms. In: Proceedings of the twenty-seventh National Symposium on computer security, Jiuzhaigou, Sichuan, China, pp 226\u2013229"},{"key":"2497_CR24","first-page":"109","volume":"59","author":"M Mohamed","year":"2017","unstructured":"Mohamed M, Sandeep SH (2017) Flexible VLSI architectures for Galois field multipliers. Integration 59:109\u2013124","journal-title":"Integration"},{"issue":"4","key":"2497_CR25","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MM.2016.66","volume":"36","author":"M Onur","year":"2016","unstructured":"Onur M, Rich B, Thomas G (2016) Common bonds: MIPS, HPS, two-level branch prediction, and compressed code RISC processor. IEEE Micro 36(4):70\u201385","journal-title":"IEEE Micro"},{"issue":"3","key":"2497_CR26","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1049\/iet-cds.2011.0278","volume":"6","author":"S Pontarelli","year":"2012","unstructured":"Pontarelli S, Salsano A (2012) On the use of Karatsuba formula to detect errors in multipliers. IET Circuits Devices Syst 6(3):152\u2013158","journal-title":"IET Circuits Devices Syst"},{"key":"2497_CR27","unstructured":"Shaohua T, Haibo Y (2014) Composite finite field multiplier. U.S. Patent No. 20140101220. 4"},{"key":"2497_CR28","unstructured":"Sooraj M, Swathi J, Anit S et al (2019) Driver face recognition and sober drunk classification using thermal images. In: 2019 International conference on communication and signal processing (ICCSP), Melmaruvathur; India, pp 400\u2013404"},{"key":"2497_CR29","doi-asserted-by":"crossref","unstructured":"Wei L, Xiaoyang Z, Longmei N (2016) A high-flexibility and energy-efficient application-specific cryptography VLIW processor for symmetric cipher algorithms. In: 2016 13th IEEE international conference on solid-state and integrated circuit technology (ICSICT), Hangzhou, China, pp 1281\u20131284","DOI":"10.1109\/ICSICT.2016.7998715"},{"issue":"2","key":"2497_CR30","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1109\/JIOT.2018.2883403","volume":"6","author":"M Xie","year":"2019","unstructured":"Xie M, Yan Z, Yao Z, Atiquzzaman M (2019) Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J 6(2):2205\u20132224","journal-title":"IEEE Internet Things J"},{"key":"2497_CR31","unstructured":"Xueyin ZH (2010) Research on technology of reconfigurable galois field arithmetic unit targeted at symmetric cipher. Master's Degree Thesis, PLA Information Engineering University, Zhengzhou, China"},{"issue":"10","key":"2497_CR32","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/CC.2016.7733046","volume":"13","author":"S Yang","year":"2016","unstructured":"Yang S, Xiaoyuan Y, Yuechuan W (2016a) Research and design of reconfigurable matrix multiplication over finite field in VLIW processor. China Commun 13(10):222\u2013232","journal-title":"China Commun"},{"key":"2497_CR33","doi-asserted-by":"crossref","unstructured":"Yang S, Yuechuan W, Mingshu ZH (2016b) Research and design of dedicated instruction for reconfigurable matrix multiplication of VLIW processor. In: 2016 Intelligent networking and collaborative systems, Ostrava, Czech Republic, pp 324\u2013327","DOI":"10.1109\/INCoS.2016.18"},{"issue":"12","key":"2497_CR34","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TVLSI.2012.2231101","volume":"21","author":"W Ying","year":"2013","unstructured":"Ying W, Xuegong ZH, Lingli W (2013) SPREAD: a streaming-based partially reconfigurable architecture and programming model. IEEE Trans Very Large Scale Integr Syst 21(12):2179\u20132192","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"issue":"10","key":"2497_CR35","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1109\/TVLSI.2011.2162594","volume":"20","author":"CH Young","year":"2012","unstructured":"Young CH, Nam CH, Chang K (2012) New bit parallel multiplier with low space complexity for all irreducible trinomials over GF(2n). IEEE Trans Very Large Scale Integr Syst 20(10):1903\u20131908","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"issue":"8","key":"2497_CR36","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1109\/TVLSI.2007.900755","volume":"15","author":"X Yuan","year":"2007","unstructured":"Yuan X, Wayne W, Haris L (2007) Code decompression unit design for VLIW embedded processors. IEEE Trans Very Large Scale Integr Syst 15(8):975\u2013980","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"2497_CR37","doi-asserted-by":"crossref","unstructured":"Zhiyuan W, Jianhua H, Ziming G (2009) The SOBER family ciphers reconfigurable processing architecture design. In: Proceedings of the fifth international conference on information assurance and security, IAS 2009. Xi'an, China, pp 322\u2013326","DOI":"10.1109\/IAS.2009.159"},{"issue":"1","key":"2497_CR38","doi-asserted-by":"publisher","first-page":"143","DOI":"10.3390\/s19010163","volume":"19","author":"W Zhu","year":"2019","unstructured":"Zhu W, Yan Y, Xiaojun T (2019) Dynamically reconfigurable encryption and decryption system design for the internet of things information security. Sensors 19(1):143","journal-title":"Sensors"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02497-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02497-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02497-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T23:59:39Z","timestamp":1668556779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02497-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,2]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["2497"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02497-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,2]]},"assertion":[{"value":"11 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}