{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:09:51Z","timestamp":1751947791868,"version":"3.41.2"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072014"],"award-info":[{"award-number":["62072014"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["3282024051","3282024009"],"award-info":[{"award-number":["3282024051","3282024009"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s44443-025-00065-8","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T10:42:31Z","timestamp":1748860951000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient quantum circuit research and implementation for 16-bit S-boxes based on composite field"],"prefix":"10.1007","volume":"37","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4509-7939","authenticated-orcid":false,"given":"Guoyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingchen","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Ruipeng","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Chaoen","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"65_CR1","doi-asserted-by":"publisher","first-page":"4817","DOI":"10.1007\/s40747-023-00988-7","volume":"9","author":"B Abd-El-Atty","year":"2023","unstructured":"Abd-El-Atty B (2023) Efficient s-box construction based on quantum-inspired quantum walks with pso algorithm and its application to image cryptosystem. Complex Intell Syst 9:4817\u20134835","journal-title":"Complex Intell Syst"},{"issue":"2","key":"65_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1049\/cds2.12011","volume":"15","author":"S Abed","year":"2021","unstructured":"Abed S, Jaffal R, Mohd BJ et al (2021) Performance evaluation of the SM4 cipher based on field-programmable gate array implementation. IET Circ Devices Syst 15(2):121\u2013135","journal-title":"IET Circ Devices Syst"},{"key":"65_CR3","doi-asserted-by":"crossref","unstructured":"Boyar J, Matthews P, Peralta R (2008) On the shortest linear straight-line program for computing linear forms. In: Mathematical foundations of computer science 2008, 33rd International Symposium, MFCS 2008, Torun, Poland, August 25-29, 2008, Proceedings, Lecture Notes in Computer Science, vol 5162. Springer, pp 168\u2013179","DOI":"10.1007\/978-3-540-85238-4_13"},{"key":"65_CR4","doi-asserted-by":"crossref","unstructured":"Boyar J, Peralta R (2010) A new combinational logic minimization technique with applications to cryptology. In: Experimental algorithms, 9th international symposium, SEA 2010, Ischia Island, Naples, Italy, May 20-22, 2010. Proceedings, Lecture notes in computer science, vol 6049. Springer, pp 178\u2013189","DOI":"10.1007\/978-3-642-13193-6_16"},{"key":"65_CR5","doi-asserted-by":"crossref","unstructured":"Canright D (2005) A very compact s-box for AES. In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, Lecture Notes in Computer Science, vol 3659. Springer, pp 441\u2013455","DOI":"10.1007\/11545262_32"},{"key":"65_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.chaos.2016.12.018","volume":"95","author":"\u00dc \u00c7avu\u015fo\u011flu","year":"2017","unstructured":"\u00c7avu\u015fo\u011flu \u00dc, Ka\u00e7ar S, Pehlivan I et al (2017) Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons Fractals 95:92\u2013101","journal-title":"Chaos, Solitons Fractals"},{"key":"65_CR7","unstructured":"Chun M, Baksi A, Chattopadhyay A (2023) DORCIS: depth optimized quantum implementation of substitution boxes. IACR Cryptol ePrint Arch p 286"},{"issue":"10","key":"65_CR8","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TC.2021.3135759","volume":"71","author":"D Chung","year":"2022","unstructured":"Chung D, Lee S, Choi D et al (2022) Alternative tower field construction for quantum implementation of the AES s-box. IEEE Trans Comput 71(10):2553\u20132564","journal-title":"IEEE Trans Comput"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"Curlin PS, Heiges J, Chan C et al (2025) A survey of hardware-based aes sboxes: area, performance, and security. ACM Comput Surv 57(9)","DOI":"10.1145\/3724114"},{"key":"65_CR10","doi-asserted-by":"crossref","unstructured":"Dasu VA, Baksi A, Sarkar S et\u00a0al (2019) LIGHTER-R: optimized reversible circuit implementation for sboxes. In: 32nd IEEE International System-on-Chip Conference, SOCC 2019, Singapore, September 3-6, 2019. IEEE, pp 260\u2013265","DOI":"10.1109\/SOCC46988.2019.1570548320"},{"key":"65_CR11","doi-asserted-by":"publisher","first-page":"090601","DOI":"10.1103\/PhysRevLett.134.090601","volume":"134","author":"D Gao","year":"2025","unstructured":"Gao D, Fan D, Zha C et al (2025) Establishing a new benchmark in quantum computational advantage with 105-qubit zuchongzhi 3.0 processor. Phys Rev Lett 134:090601","journal-title":"Phys Rev Lett"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"Grassl M, Langenberg B, Roetteler M et\u00a0al (2016) Applying grover\u2019s algorithm to aes: quantum resource estimates. In: Post-quantum cryptography. Springer International Publishing, pp 29\u201343","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"65_CR13","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1038\/s41567-022-01539-6","volume":"18","author":"J Haferkamp","year":"2022","unstructured":"Haferkamp J, Faist P, Kothakonda NBT et al (2022) Linear growth of quantum circuit complexity. Nat Phys 18:528\u2013532","journal-title":"Nat Phys"},{"key":"65_CR14","first-page":"3659","volume":"77","author":"M Hazzazi","year":"2023","unstructured":"Hazzazi M, Sajjad M, Bassfar Z et al (2023) Nonlinear components of a block cipher over Eisenstein integers. Comput Mater Cont 77:3659","journal-title":"Comput Mater Cont"},{"issue":"9","key":"65_CR15","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11128-023-04105-y","volume":"22","author":"X Jing","year":"2023","unstructured":"Jing X, Li Y, Zhao G et al (2023) Quantum circuit implementation and resource analysis of Lblock and Lici. Quantum Inf Process 22(9):347","journal-title":"Quantum Inf Process"},{"key":"65_CR16","doi-asserted-by":"publisher","first-page":"10736","DOI":"10.1038\/s41598-019-47174-9","volume":"9","author":"T Jones","year":"2019","unstructured":"Jones T, Brown A, Bush I et al (2019) QuEST and high performance simulation of quantum computers. Sci Rep 9:10736","journal-title":"Sci Rep"},{"key":"65_CR17","doi-asserted-by":"crossref","unstructured":"Kelly M, Kaminsky A, Kurdziel MT et\u00a0al (2015) Customizable sponge-based authenticated encryption using 16-bit s-boxes. In: 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. IEEE, pp 43\u201348","DOI":"10.1109\/MILCOM.2015.7357416"},{"key":"65_CR18","unstructured":"Langenberg B, Pham H, Steinwandt R (2019) Reducing the cost of implementing AES as a quantum circuit. IACR Cryptol ePrint Arch p 854"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Lee Y, Lee J, Chung B et\u00a0al (2024) Physical qubits estimation for quantum S-box. In: 15th International conference on Information and Communication Technology Convergence, ICTC 2024, Jeju Island, Republic of Korea, October 16-18, 2024. IEEE, pp 1369\u20131370","DOI":"10.1109\/ICTC62082.2024.10826924"},{"key":"65_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11433-022-1921-y","volume":"65","author":"Z Li","year":"2022","unstructured":"Li Z, Cai B, Sun H et al (2022) Novel quantum circuit implementation of Advanced Encryption Standard with low costs. Sci China Phys Mech Astron 65:1\u201317","journal-title":"Sci China Phys Mech Astron"},{"issue":"4","key":"65_CR21","first-page":"1","volume":"53","author":"Z Li","year":"2023","unstructured":"Li Z, Gao F, Qin S et al (2023) Quantum circuit for implementing Camellia S-box with low costs. Sci Sin Phys Mech Astron 53(4):1\u20139","journal-title":"Sci Sin Phys Mech Astron"},{"key":"65_CR22","first-page":"1","volume":"11","author":"Q Li","year":"2024","unstructured":"Li Q, Luo Q, Lyu Y et al (2024) Quantum circuit optimization for SM4 cryptographic algorithm S-box. J Cryptologic Res 11:1\u201311","journal-title":"J Cryptologic Res"},{"issue":"1","key":"65_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s42400-024-00207-x","volume":"7","author":"Y Li","year":"2024","unstructured":"Li Y, Zhang W, Lin Y et al (2024) A circuit area optimization of MK-3 S-box. Cybersecur 7(1):17","journal-title":"Cybersecur"},{"key":"65_CR24","volume-title":"Finite fields","author":"R Lidl","year":"1997","unstructured":"Lidl R, Niederreiter H (1997) Finite fields. Cambridge University Press"},{"key":"65_CR25","doi-asserted-by":"crossref","unstructured":"Liu J, Tan X, Li M et al (2024) Efficient quantum circuit implementation of the SM4 S-box. Sci Sin Phys Mech Astron 54(4):1\u20139","DOI":"10.1360\/SSPMA-2023-0386"},{"key":"65_CR26","doi-asserted-by":"crossref","unstructured":"Liu Q, Preneel B, Zhao Z et\u00a0al (2023) Improved quantum circuits for AES: reducing the depth and the number of qubits. In: Guo J, Steinfeld R (eds) Advances in cryptology - ASIACRYPT 2023 - 29th international conference on the theory and application of cryptology and information security, Guangzhou, China, December 4-8, 2023, Proceedings, Part III, Lecture Notes in Computer Science, vol 14440. Springer, pp 67\u201398","DOI":"10.1007\/978-981-99-8727-6_3"},{"key":"65_CR27","doi-asserted-by":"crossref","unstructured":"Li Y, Wang M (2014) Constructing s-boxes for lightweight cryptography with feistel structure. In: Batina L, Robshaw M (eds) Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, Lecture Notes in Computer Science, vol 8731. Springer, pp 127\u2013146","DOI":"10.1007\/978-3-662-44709-3_8"},{"issue":"6","key":"65_CR28","first-page":"820","volume":"50","author":"Q Luo","year":"2021","unstructured":"Luo Q, Li X, Yang G (2021) Quantum circuit implementation of S-box for SM4 cryptographic algorithm. J Univ Electron Sci Technol China 50(6):820\u2013826","journal-title":"J Univ Electron Sci Technol China"},{"issue":"6","key":"65_CR29","first-page":"812","volume":"51","author":"Q Luo","year":"2022","unstructured":"Luo Q, Li X, Yand G et al (2022) Quantum circuit implementation of s-box for sm4 cryptographic algorithm based on composite field arithmetic. J Univ Electron Sci Technol China 51(6):812\u2013818","journal-title":"J Univ Electron Sci Technol China"},{"key":"65_CR30","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1007\/s40747-021-00556-x","volume":"9","author":"V Nandan","year":"2023","unstructured":"Nandan V, Rao RGS (2023) Low-power aes s-box design using dual-basis tower field extension method for cyber security applications. Complex Intell Syst 9:2959\u20132967","journal-title":"Complex Intell Syst"},{"key":"65_CR31","doi-asserted-by":"crossref","unstructured":"Rahman Z, Yi X, Billah M et\u00a0al (2022) Enhancing AES using chaos and logistic map-based key generation technique for securing iot-based smart home. IACR Cryptol ePrint Arch p 410","DOI":"10.3390\/electronics11071083"},{"key":"65_CR32","doi-asserted-by":"crossref","unstructured":"Sajjad M, Shah T, ul Haq T et al (2024) SPN based RGB image encryption over Gaussian integers. Heliyon 10:1\u201317","DOI":"10.1016\/j.heliyon.2024.e30353"},{"key":"65_CR33","doi-asserted-by":"publisher","first-page":"6425","DOI":"10.1038\/s41598-025-89993-z","volume":"15","author":"M Sajjad","year":"2025","unstructured":"Sajjad M, Shah T, Hamza R et al (2025) Multiple color images security by SPN over the residue classes of Gaussian integer $${Z}[i]_{h}$$. Sci Rep 15:6425","journal-title":"Sci Rep"},{"issue":"4","key":"65_CR34","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1007\/s11277-018-5647-z","volume":"100","author":"P Saravanan","year":"2018","unstructured":"Saravanan P, Kalpana P (2018) Novel reversible design of Advanced Encryption Standard cryptographic algorithm for wireless sensor networks. Wirel Pers Commun 100(4):1427\u20131458","journal-title":"Wirel Pers Commun"},{"issue":"9","key":"65_CR35","doi-asserted-by":"publisher","first-page":"25657","DOI":"10.1007\/s11042-023-16518-z","volume":"83","author":"T Shah","year":"2024","unstructured":"Shah T, Khan DA, Ali A (2024) Design of nonlinear component of block cipher using quaternion integers. Multim Tools Appl 83(9):25657\u201325674","journal-title":"Multim Tools Appl"},{"key":"65_CR36","unstructured":"Stafford DF (2021) Evaluating performance and efficiency of a 16-bit substitution box on an FPGA. Master\u2019s thesis, Rochester Institute of Technology"},{"key":"65_CR37","doi-asserted-by":"publisher","first-page":"49","DOI":"10.22331\/q-2018-01-31-49","volume":"2","author":"DS Steiger","year":"2018","unstructured":"Steiger DS, H\u00e4ner T, Troyer M (2018) ProjectQ: an open source software framework for quantum computing. Quantum 2:49","journal-title":"Quantum"},{"key":"65_CR38","doi-asserted-by":"crossref","unstructured":"Wang Z, Wei S, Long G (2022) A quantum circuit design of AES requiring fewer quantum qubits and gate operations. Front Phys 17","DOI":"10.1007\/s11467-021-1141-2"},{"key":"65_CR39","unstructured":"Wood CA (2013) Large substitution boxes with efficient combinational implementations. Master\u2019s thesis, Rochester Institute of Technology"},{"issue":"01","key":"65_CR40","first-page":"146","volume":"10","author":"X Wu","year":"2023","unstructured":"Wu X, Dou D, Wei Y et al (2023) A 16-bit S-box design method based on Feistel-NFSR structure. J Cryptologic Res 10(01):146\u2013154","journal-title":"J Cryptologic Res"},{"key":"65_CR41","first-page":"10","volume":"11","author":"X Wu","year":"2024","unstructured":"Wu X, Wu T, Huang Z et al (2024) Construction of 16-bit dynamic S-box based on chaotic map and NFSR. Inf Sec Commun Privacy 11:10\u201319","journal-title":"Inf Sec Commun Privacy"},{"issue":"6","key":"65_CR42","first-page":"760","volume":"6","author":"H Xu","year":"2019","unstructured":"Xu H, Duan M, Tan L et al (2019) On the NBC algorithm. J Cryptologic Res 6(6):760\u2013767","journal-title":"J Cryptologic Res"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00065-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00065-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00065-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T13:03:25Z","timestamp":1751893405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00065-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["65"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00065-8","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"type":"print","value":"1319-1578"},{"type":"electronic","value":"2213-1248"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"18 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"55"}}