{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T17:41:29Z","timestamp":1749318089447},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1109\/tifs.2011.2157687","type":"journal-article","created":{"date-parts":[[2011,5,27]],"date-time":"2011-05-27T15:51:39Z","timestamp":1306511499000},"page":"3-13","source":"Crossref","is-referenced-by-count":20,"title":["A Formal Approach to Designing Cryptographic Processors Based on $GF(2^m)$ Arithmetic Circuits"],"prefix":"10.1109","volume":"7","author":[{"given":"Naofumi","family":"Homma","sequence":"first","affiliation":[]},{"given":"Kazuya","family":"Saito","sequence":"additional","affiliation":[]},{"given":"Takafumi","family":"Aoki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2007.895755"},{"key":"ref11","first-page":"536","author":"cox","year":"1996","journal-title":"Ideals Varieties and Algorithms"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2007.4601876"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1088222.1088224"},{"key":"ref14","author":"hankerson","year":"2009","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref15","year":"2001","journal-title":"Advanced Encryption Standard (AES)"},{"key":"ref16","first-page":"103","article-title":"A simple algebraic representation of rijndael","volume":"2259","author":"ferguson","year":"2001","journal-title":"Proc SAC 2001 Lecture Notes in Computer Science"},{"key":"ref17","first-page":"1","article-title":"Essential algebraic structure within the aes","volume":"2442","author":"murphy","year":"2002","journal-title":"CRYPTO 2002 Lecture Notes in Computer Science"},{"key":"ref18","first-page":"485","article-title":"Asic performance comparison for the iso standard block ciphers","author":"sugawara","year":"2007","journal-title":"The 3rd Joint workshop on Information Security"},{"key":"ref19","year":"0","journal-title":"Cryptographic Hardware Project"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2010.936785"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1996.569822"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/217474.217583"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL.1997.601413"},{"key":"ref7","year":"2004","journal-title":"Advanced Formal Verification"},{"key":"ref2","author":"parhami","year":"2000","journal-title":"Computer Arithmetic Algorithms and Hardware Designs"},{"key":"ref1","author":"koren","year":"2001","journal-title":"Computer Arithmetic Algorithms"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-44585-4_45","article-title":"Towards efficient verification of arithmetic algorithms over Galois fields <formula formulatype=\"inline\"> <tex Notation=\"TeX\">${\\hbox{GF}}(2^m)$<\/tex><\/formula>","volume":"lncs 2102","author":"morioka","year":"2001","journal-title":"Proc Conf Computer-Aided Verification"},{"key":"ref20","first-page":"271","article-title":"An optimized S-box circuit architecture for low power AES design","volume":"2523","author":"morioka","year":"2002","journal-title":"CHES 2002 Lecture Notes Comput Sci"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2049037"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190586"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6126189\/05773490.pdf?arnumber=5773490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:54:07Z","timestamp":1642006447000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5773490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":22,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2011.2157687","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2]]}}}