{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:01:39Z","timestamp":1769832099071,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T00:00:00Z","timestamp":1494806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,15]]},"DOI":"10.1145\/3075564.3079069","type":"proceedings-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T12:47:29Z","timestamp":1496839649000},"page":"409-414","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Design of S-boxes Defined with Cellular Automata Rules"],"prefix":"10.1145","author":[{"given":"Stjepan","family":"Picek","sequence":"first","affiliation":[{"name":"KU Leuven, imec-COSIC, Leuven, Belgium"}]},{"given":"Luca","family":"Mariot","sequence":"additional","affiliation":[{"name":"DISCo, Universit\u00e0 degli Studi di, Milano-Bicocca, Milano, Italy"}]},{"given":"Bohan","family":"Yang","sequence":"additional","affiliation":[{"name":"KU Leuven, imec-COSIC, Leuven, Belgium"}]},{"given":"Domagoj","family":"Jakobovic","sequence":"additional","affiliation":[{"name":"University of Zagreb, Zagreb, Croatia"}]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[{"name":"KU Leuven, imec-COSIC, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2017,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Midori: A Block Cipher for Low Energy (Extended Version). Cryptology ePrint Archive, Report 2015\/1142.","author":"Banik Subhadeep","year":"2015","unstructured":"Subhadeep Banik , Andrey Bogdanov , Takanori Isobe , Kyoji Shibutani , Harunaga Hiwatari , Toru Akishita , and Francesco Regazzoni . 2015 . Midori: A Block Cipher for Low Energy (Extended Version). Cryptology ePrint Archive, Report 2015\/1142. (2015). http:\/\/eprint.iacr.org\/ Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni. 2015. Midori: A Block Cipher for Low Energy (Extended Version). Cryptology ePrint Archive, Report 2015\/1142. (2015). http:\/\/eprint.iacr.org\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31301-6_10"},{"key":"e_1_3_2_1_3_1","first-page":"369","article-title":"RadioGat\u00fan, a belt-and-mill hash function","volume":"2006","author":"Bertoni Guido","year":"2006","unstructured":"Guido Bertoni , Joan Daemen , Micha\u00ebl Peeters , and Gilles Van Assche . 2006 . RadioGat\u00fan, a belt-and-mill hash function . IACR Cryptology ePrint Archive 2006 (2006), 369 . Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2006. RadioGat\u00fan, a belt-and-mill hash function. IACR Cryptology ePrint Archive 2006 (2006), 369.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_4_1","volume-title":"The KECCAK reference. (January","author":"Bertoni Guido","year":"2011","unstructured":"Guido Bertoni , Joan Daemen , Mich\u00e4el Peeters , and Gilles Van Assche . 2011. The KECCAK reference. (January 2011 ). http:\/\/keccak.noekeon.org\/ Guido Bertoni, Joan Daemen, Mich\u00e4el Peeters, and Gilles Van Assche. 2011. The KECCAK reference. (January 2011). http:\/\/keccak.noekeon.org\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_1_6_1","volume-title":"Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC","author":"Boyar Joan","year":"2012","unstructured":"Joan Boyar and Ren\u00e9 Peralta . 2012. A Small Depth-16 Circuit for the AES S-Box . In Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 , Heraklion, Crete, Greece , 2012. Proceedings, Dimitris Gritzalis, Steven Furnell, and Marianthi Theoharidou (Eds.). Springer Berlin Heidelberg , 287--298. Joan Boyar and Ren\u00e9 Peralta. 2012. A Small Depth-16 Circuit for the AES S-Box. In Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, 2012. Proceedings, Dimitris Gritzalis, Steven Furnell, and Marianthi Theoharidou (Eds.). Springer Berlin Heidelberg, 287--298."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2008.10.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647935.740914"},{"key":"e_1_3_2_1_9_1","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"Carlet Claude","unstructured":"Claude Carlet . 2010. Boolean Functions for Cryptography and Error Correcting Codes . In Boolean Models and Methods in Mathematics, Computer Science, and Engineering ( 1 st ed.), Yves Crama and Peter L. Hammer (Eds.). Cambridge University Press , New York, NY, USA, 257--397. Claude Carlet. 2010. Boolean Functions for Cryptography and Error Correcting Codes. In Boolean Models and Methods in Mathematics, Computer Science, and Engineering (1st ed.), Yves Crama and Peter L. Hammer (Eds.). Cambridge University Press, New York, NY, USA, 257--397.","edition":"1"},{"key":"e_1_3_2_1_10_1","volume-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","author":"Carlet Claude","unstructured":"Claude Carlet . 2010. Vectorial Boolean Functions for Cryptography . In Boolean Models and Methods in Mathematics, Computer Science, and Engineering ( 1 st ed.), Yves Crama and Peter L. Hammer (Eds.). Cambridge University Press , New York, USA, 398--469. Claude Carlet. 2010. Vectorial Boolean Functions for Cryptography. In Boolean Models and Methods in Mathematics, Computer Science, and Engineering (1st ed.), Yves Crama and Peter L. Hammer (Eds.). Cambridge University Press, New York, USA, 398--469.","edition":"1"},{"key":"e_1_3_2_1_11_1","volume-title":"Computer Design: VLSI in Computers and Processors, 1993. ICCD '93. Proceedings., 1993 IEEE International Conference on. 610--613","author":"Claesen L.","unstructured":"L. Claesen , J. Daemen , M. Genoe , and G. Peeters . 1993. Subterranean: A 600 Mbit\/sec cryptographic VLSI chip . In Computer Design: VLSI in Computers and Processors, 1993. ICCD '93. Proceedings., 1993 IEEE International Conference on. 610--613 . L. Claesen, J. Daemen, M. Genoe, and G. Peeters. 1993. Subterranean: A 600 Mbit\/sec cryptographic VLSI chip. In Computer Design: VLSI in Computers and Processors, 1993. ICCD '93. Proceedings., 1993 IEEE International Conference on. 610--613."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037656"},{"key":"e_1_3_2_1_13_1","volume-title":"5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. 60--74","author":"Daemen Joan","unstructured":"Joan Daemen and Craig S. K. Clapp . 1998. Fast Hashing and Stream Encryption with PANAMA. In Fast Software Encryption , 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. 60--74 . Joan Daemen and Craig S. K. Clapp. 1998. Fast Hashing and Stream Encryption with PANAMA. In Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings. 60--74."},{"key":"e_1_3_2_1_14_1","first-page":"259","article-title":"Invertible shift-invariant transformations on binary arrays","volume":"62","author":"Daemen Joan","year":"1994","unstructured":"Joan Daemen , Ren\u00e9 Govaerts , and Joos Vandewalle . 1994 . Invertible shift-invariant transformations on binary arrays . Appl. Math. Comput. 62 , 2 (1994), 259 -- 277 . Joan Daemen, Ren\u00e9 Govaerts, and Joos Vandewalle. 1994. Invertible shift-invariant transformations on binary arrays. Appl. Math. Comput. 62, 2 (1994), 259--277.","journal-title":"Appl. Math. Comput."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647930.740565"},{"key":"e_1_3_2_1_16_1","volume-title":"The Design of Rijndael","author":"Daemen Joan","unstructured":"Joan Daemen and Vincent Rijmen . 2002. The Design of Rijndael . Springer-Verlag New York, Inc. , Secaucus, NJ, USA . Joan Daemen and Vincent Rijmen. 2002. The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus, NJ, USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Cellular Automata and Cooperative Systems","author":"Gutowitz Howard","unstructured":"Howard Gutowitz . 1993. Cryptography with dynamical systems . In Cellular Automata and Cooperative Systems . Springer , 237--274. Howard Gutowitz. 1993. Cryptography with dynamical systems. In Cellular Automata and Cooperative Systems. Springer, 237--274."},{"key":"e_1_3_2_1_18_1","volume-title":"Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques","author":"Nyberg Kaisa","year":"1991","unstructured":"Kaisa Nyberg . 1991. Perfect Nonlinear S-Boxes . In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques , Brighton, UK , April 8-11, 1991 , Proceedings (Lecture Notes in Computer Science), Vol. 547 . Springer , 378--386. Kaisa Nyberg. 1991. Perfect Nonlinear S-Boxes. In Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings (Lecture Notes in Computer Science), Vol. 547. Springer, 378--386."},{"key":"e_1_3_2_1_19_1","volume-title":"Advances in Cryptology - EUROCRYPT' 92, RainerA","author":"Nyberg Kaisa","unstructured":"Kaisa Nyberg . 1993. On the construction of highly nonlinear permutations . In Advances in Cryptology - EUROCRYPT' 92, RainerA . Rueppel (Ed.). Lecture Notes in Computer Science, Vol. 658 . Springer Berlin Heidelberg , 92--98. Kaisa Nyberg. 1993. On the construction of highly nonlinear permutations. In Advances in Cryptology - EUROCRYPT' 92, RainerA. Rueppel (Ed.). Lecture Notes in Computer Science, Vol. 658. Springer Berlin Heidelberg, 92--98."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908812.2908915"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2764698"},{"key":"e_1_3_2_1_22_1","unstructured":"Riccardo Poli William B. Langdon and Nicholas Freitag McPhee. 2008. A field guide to genetic programming. Published via http:\/\/lulu.com and freely available at http:\/\/www.gp-field-guide.org.uk. (With contributions by J. R. Koza).   Riccardo Poli William B. Langdon and Nicholas Freitag McPhee. 2008. A field guide to genetic programming. Published via http:\/\/lulu.com and freely available at http:\/\/www.gp-field-guide.org.uk. (With contributions by J. R. Koza)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(72)80009-6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"}],"event":{"name":"CF '17: Computing Frontiers Conference","location":"Siena Italy","acronym":"CF '17","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the Computing Frontiers Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3075564.3079069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:42Z","timestamp":1750215822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3075564.3079069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,15]]},"references-count":24,"alternative-id":["10.1145\/3075564.3079069","10.1145\/3075564"],"URL":"https:\/\/doi.org\/10.1145\/3075564.3079069","relation":{},"subject":[],"published":{"date-parts":[[2017,5,15]]},"assertion":[{"value":"2017-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}