{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:25:34Z","timestamp":1767108334180,"version":"3.40.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T00:00:00Z","timestamp":1743206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T00:00:00Z","timestamp":1743206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["3282024009","3282024009","3282024009","3282024009","3282024009"],"award-info":[{"award-number":["3282024009","3282024009","3282024009","3282024009","3282024009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s13389-025-00371-x","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:14:11Z","timestamp":1744085651000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9886-2524","authenticated-orcid":false,"given":"Ruipeng","family":"Hong","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhankun","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chaoen","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"issue":"06","key":"371_CR1","first-page":"727","volume":"6","author":"Z Wen-Tao","year":"2019","unstructured":"Wen-Tao, Z., Fu-Lei, J., Tian-You, D., Bo-Han, Y., Xue-Feng, Z., Ze-Jun, X., Zhen-Zhen, B., Lei-Bo, L.: Tangram:a bit-slice block cipher suitable for multiple platforms. J. Cryptol. Res. 6(06), 727\u2013747 (2019)","journal-title":"J. Cryptol. Res."},{"key":"371_CR2","doi-asserted-by":"publisher","first-page":"704","DOI":"10.13868\/j.cnki.jcr.000335","volume":"6","author":"C Ting-Ting","year":"2019","unstructured":"Ting-Ting, C., Mei-Qin, W., Yan-Hong, F., Kai, H., Yong, F., Lu-Ning, H.: Ballet:a software-friendly blcok cipher. J. Cryptol. Res. 6, 704\u2013712 (2019). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000335","journal-title":"J. Cryptol. Res."},{"issue":"06","key":"371_CR3","first-page":"713","volume":"6","author":"J Ke-Ting","year":"2019","unstructured":"Ke-Ting, J., Xiao-Yang, D., Cong-Ming, W., Zheng, L., Hai-Bo, Z.: On the design of block cipher fesh. J. Cryptol. Res. 6(06), 713\u2013726 (2019)","journal-title":"J. Cryptol. Res."},{"issue":"01","key":"371_CR4","first-page":"260","volume":"41","author":"W Jianxin","year":"2024","unstructured":"Jianxin, W., Hongke, X., Chao\u2019en, X., Lei, Z., Ruipeng, H.: Implementation of tangram block cipher algorithm based on fpga. J. Cryptol. Res. 41(01), 260\u2013265 (2024)","journal-title":"J. Cryptol. Res."},{"key":"371_CR5","doi-asserted-by":"crossref","unstructured":"Xiao, C., Hong, R., Zhang, L., Wang, J., Wang, J.: Implementation of ballet block cipher algorithm based on fpga. In: Wang, H. (ed.) International Conference on Signal Processing, Computer Networks, and Communications (SPCNC 2022), vol. 12626, p. 126262. SPIE, Zhengzhou (2023)","DOI":"10.1117\/12.2674588"},{"key":"371_CR6","first-page":"57","volume":"21","author":"W Jianxin","year":"2021","unstructured":"Jianxin, W., Shiqiang, Z., Chaoen, X., Lei, Z.: High-speed implementation of fesh block cipher algorithm based on fpga. Netinfo Security 21, 57\u201364 (2021)","journal-title":"Netinfo Security"},{"key":"371_CR7","doi-asserted-by":"crossref","unstructured":"Smith, J.L., Notz, W.A., Osseck, P.: An experimental application of cryptography to a remotely accessed data system. In: Donovan, J.J., Shields, R. (eds.) Proceedings of the ACM Annual conference-Volume 1, vol. 1, pp. 282\u2013297. Association for Computing Machinery, New York, NY, USA (1972)","DOI":"10.1145\/800193.569930"},{"key":"371_CR8","first-page":"1","volume":"23","author":"DE Standard","year":"1977","unstructured":"Standard, D.E., et al.: Federal information processing standards publication 46. Natnl. Bur. Stand., US Dep. Commer. 23, 1\u201318 (1977)","journal-title":"Natnl. Bur. Stand., US Dep. Commer."},{"key":"371_CR9","first-page":"342","volume-title":"Cryptographic hardware and embedded systems - CHES 2011","author":"K Shibutani","year":"1976","unstructured":"Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) Cryptographic hardware and embedded systems - CHES 2011, pp. 342\u2013357. Springer, Berlin (1976)"},{"key":"371_CR10","first-page":"995","volume":"2","author":"L Shuwang","year":"2016","unstructured":"Shuwang, L., Bozhan, S., Peng, W., Yingying, M., Lili, H.: Overview on sm4 algorithm. J. Inf. Sec. Res. 2, 995\u201310077 (2016)","journal-title":"J. Inf. Sec. Res."},{"key":"371_CR11","unstructured":"Rijmen, V., Daemen, J.: Advanced encryption standard. Proceedings of federal information processing standards publications, national institute of standards and technology 19, 22 (2001)"},{"key":"371_CR12","doi-asserted-by":"crossref","unstructured":"Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit block cipher suitable for multiple platforms-design andanalysis. In: Selected Areas in Cryptography, pp. 39\u201356. Springer, Berlin, Heidelberg (2001)","DOI":"10.1007\/3-540-44983-3_4"},{"key":"371_CR13","first-page":"2511","volume":"17","author":"W Xiaonian","year":"2023","unstructured":"Xiaonian, W., Rui, S., Daorao, D., Runlian, Z., Yongzhuang, W.: 16-bit s-box design method based on l-m-nfsr structure. J. Front. Comput. Sci. Technol. 17, 2511\u20132518 (2023)","journal-title":"J. Front. Comput. Sci. Technol."},{"key":"371_CR14","doi-asserted-by":"publisher","first-page":"146","DOI":"10.13868\/j.cnki.jcr.000585","volume":"10","author":"W Xiao-Nian","year":"2023","unstructured":"Xiao-Nian, W., Dao-Rao, D., Yong-Zhaung, W.: A 16-bit s-box design method based on feistel-nfsr structure. J. Cryptol. Res. 10, 146\u2013154 (2023). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000585","journal-title":"J. Cryptol. Res."},{"key":"371_CR15","doi-asserted-by":"publisher","first-page":"760","DOI":"10.13868\/j.cnki.jcr.000339","volume":"6","author":"X Hong","year":"2019","unstructured":"Hong, X., Ming, D., Lin, T., Wen-Feng, Q., Zhong-Xiao, W.: On the nbc algorithm. J. Cryptol. Res. 6, 760\u2013767 (2019). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000339","journal-title":"J. Cryptol. Res."},{"key":"371_CR16","doi-asserted-by":"crossref","unstructured":"Kelly, M., Kaminsky, A., Kurdziel, M., \u0141ukowiak, M., Radziszowski, S.: Customizable sponge-based authenticated encryption using 16-bit s-boxes. In: MILCOM 2015-2015 IEEE Military Communications Conference, pp. 43\u201348 (2015)","DOI":"10.1109\/MILCOM.2015.7357416"},{"key":"371_CR17","volume-title":"Large substitution boxes with efficient combinational implementations","author":"CA Wood","year":"2013","unstructured":"Wood, C.A.: Large substitution boxes with efficient combinational implementations. Rochester Institute of Technology, New York (2013)"},{"key":"371_CR18","volume-title":"Evaluating performance and efficiency of a 16-bit substitution box on an FPGA","author":"DF Stafford","year":"2021","unstructured":"Stafford, D.F.: Evaluating performance and efficiency of a 16-bit substitution box on an FPGA. Rochester Institute of Technology, New York (2021)"},{"key":"371_CR19","doi-asserted-by":"publisher","first-page":"155","DOI":"10.19665\/j.issn1001-2400.2021.03.020","volume":"48","author":"HE Shiyang","year":"2021","unstructured":"Shiyang, H.E., LI Hui, L.F.: Optimization and implementation of sm4 on fpga. J. Xidian Univ. 48, 155\u2013162 (2021). https:\/\/doi.org\/10.19665\/j.issn1001-2400.2021.03.020","journal-title":"J. Xidian Univ."},{"issue":"07","key":"371_CR20","first-page":"177","volume":"39","author":"W Chen-guang","year":"2013","unstructured":"Chen-guang, W., Shu-shan, Q., Yong, H.: Low complexity implementation of block cipher sm4 algorithm. Comput. Eng. 39(07), 177\u2013180 (2013)","journal-title":"Comput. Eng."},{"issue":"04","key":"371_CR21","first-page":"41","volume":"52","author":"L Jintong","year":"2019","unstructured":"Jintong, L., Ke, L., Jin, W., Xinwei, C., Huachao, X., Guofeng, L.: Cuttable structure design and hardware implementation of sm4 encryption algorithmp. Acta Scientiarum Naturalium Universitatis Nankaiensis 52(04), 41\u201345 (2019)","journal-title":"Acta Scientiarum Naturalium Universitatis Nankaiensis"},{"key":"371_CR22","unstructured":"Bai, X.: Research on power analysis attack resistant sms4 cipher vlsi design technology. PhD thesis, University of Science and Technology of China (2009)"},{"key":"371_CR23","doi-asserted-by":"publisher","first-page":"16","DOI":"10.19304\/j.cnki.issn1000-7180.2015.05.004","volume":"32","author":"L Hao","year":"2015","unstructured":"Hao, L., Li-ji, W., Xiang-min, Z.: Design and implementation of sm4 block cipher based on composite field. Microelectron. Comput. 32, 16\u201320 (2015). https:\/\/doi.org\/10.19304\/j.cnki.issn1000-7180.2015.05.004","journal-title":"Microelectron. Comput."},{"issue":"03","key":"371_CR24","first-page":"921","volume":"45","author":"L Yanjun","year":"2023","unstructured":"Yanjun, L., Weiguo, Z., Yaodong, G., Ke, W.: Hardware optimization of s-box of camelia algorithm based on polynomial basis. J. Electron. Inf. Technol. 45(03), 921\u2013928 (2023)","journal-title":"J. Electron. Inf. Technol."},{"key":"371_CR25","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11545262_32","volume-title":"Cryptographic hardware and embedded systems - CHES 2005","author":"D Canright","year":"2005","unstructured":"Canright, D.: A very compact s-box for aes. In: Rao, J.R., Sunar, B. (eds.) Cryptographic hardware and embedded systems - CHES 2005, pp. 441\u2013455. Springer, Berlin (2005)"},{"issue":"7","key":"371_CR26","doi-asserted-by":"publisher","first-page":"20200035","DOI":"10.1587\/elex.17.20200035","volume":"17","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Zhang, X., Tang, L., Zheng, X., Ni, T., Wu, N.: A low critical path delay structure for composite field aes s-box based on constant matrices multiplication merging. IEICE Electron. Express 17(7), 20200035\u201320200035 (2020)","journal-title":"IEICE Electron. Express"},{"key":"371_CR27","doi-asserted-by":"publisher","first-page":"2721","DOI":"10.1109\/ACCESS.2021.3139040","volume":"10","author":"Y-T Teng","year":"2021","unstructured":"Teng, Y.-T., Chin, W.-L., Chang, D.-K., Chen, P.-Y., Chen, P.-W.: Vlsi architecture of s-box with high area efficiency based on composite field arithmetic. IEEE Access 10, 2721\u20132728 (2021)","journal-title":"IEEE Access"},{"issue":"04","key":"371_CR28","doi-asserted-by":"publisher","first-page":"228","DOI":"10.4236\/jcc.2024.124016","volume":"12","author":"Y Wang","year":"2024","unstructured":"Wang, Y., Bin, S., Zhu, S., Hu, X.: A high efficiency hardware implementation of s-boxes based on composite field for advanced encryption standard. J. Comput. Commun. 12(04), 228\u2013246 (2024)","journal-title":"J. Comput. Commun."},{"key":"371_CR29","volume-title":"A very compact rijndael s-box","author":"D Canright","year":"2004","unstructured":"Canright, D.: A very compact rijndael s-box. Technical report, Citeseer (2004)"},{"key":"371_CR30","volume-title":"Hardware implementation of finite-field arithmetic","author":"J-P Deschamps","year":"2009","unstructured":"Deschamps, J.-P.: Hardware implementation of finite-field arithmetic. McGraw-Hill Inc, New York (2009)"},{"key":"371_CR31","unstructured":"Chao, L.: Research on hardware implementation finite field opration. Master\u2019s thesis, Qingdao University of Science and Technology (2018)"},{"issue":"8","key":"371_CR32","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1109\/TC.2004.47","volume":"53","author":"A Reyhani-Masoleh","year":"2004","unstructured":"Reyhani-Masoleh, A., Hasan, M.A.: Low complexity bit parallel architectures for polynomial basis multiplication over gf (2m). IEEE Trans. Comput. 53(8), 945\u2013959 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"371_CR33","doi-asserted-by":"crossref","unstructured":"Werner, G., Farris, S., Kaminsky, A., Kurdziel, M., Lukowiak, M., Radziszowski, S.: Implementing authenticated encryption algorithm mk-3 on fpga. In: MILCOM 2016 - 2016 IEEE Military Communications Conference, pp. 1225\u20131230 (2016)","DOI":"10.1109\/MILCOM.2016.7795498"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00371-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13389-025-00371-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-025-00371-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T18:10:01Z","timestamp":1745345401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13389-025-00371-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,29]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["371"],"URL":"https:\/\/doi.org\/10.1007\/s13389-025-00371-x","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"type":"print","value":"2190-8508"},{"type":"electronic","value":"2190-8516"}],"subject":[],"published":{"date-parts":[[2025,3,29]]},"assertion":[{"value":"6 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"5"}}