{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:39:15Z","timestamp":1763102355529,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059882","type":"journal-article","created":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T03:27:22Z","timestamp":1740626842000},"page":"1491-1507","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing AES S-Box Implementation: A SAT-Based Approach with Tower Field Representations"],"prefix":"10.32604","volume":"83","author":[{"given":"Jingya","family":"Feng","sequence":"first","affiliation":[]},{"given":"Ying","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Feng","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"5232","DOI":"10.1109\/TVT.2020.2981127","article-title":"Trust management scheme based on hybrid cryptography for secure communications in VANETs","volume":"69","author":"Tangade","year":"2020","journal-title":"IEEE Trans Vehicular Technol"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"108961","DOI":"10.1016\/j.compeleceng.2023.108961","article-title":"Internet of things security: a multi-agent-based defense system design","volume":"111","author":"Ayd\u0131n","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref3","unstructured":"National Institute of Standards and Technology. Advanced Encryption Standard (AES). Federal Information Processing Standards Publication (FIPS PUB 197). U.S. Department of Commerce; 2021 [cited 2024 Dec 10]. Available from: https:\/\/csrc.nist.gov\/files\/pubs\/fips\/197\/final\/docs\/fips-197.pdf."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"17678","DOI":"10.1109\/JIOT.2024.3359714","article-title":"Novel high throughput-to-area efficiency and strong-resilience datapath of AES for lightweight implementation in IoT devices","volume":"11","author":"Cheng","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TCE.2023.3332872","article-title":"The design of a high-throughput hardware architecture for the AES-GCM algorithm","volume":"70","author":"Lin","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2563","DOI":"10.1109\/TC.2024.3449094","article-title":"Optimized quantum circuit of AES with interlacing-uncompute structure","volume":"73","author":"Zhang","year":"2024","journal-title":"IEEE Trans Comput"},{"key":"ref7","series-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2001","first-page":"171","article-title":"Efficient Rijndael encryption implementation with composite field arithmetic","author":"Rudra","year":"2001"},{"key":"ref8","series-title":"Advances in Cryptology\u2013ASIACRYPT 2001","first-page":"239","article-title":"A compact Rijndael hardware architecture with S-box optimization","author":"Satoh","year":"2001"},{"key":"ref9","series-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2005","first-page":"441","article-title":"A very compact S-box for AES","author":"Canright","year":"2005"},{"key":"ref10","series-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2010","first-page":"234","author":"Nogami","year":"2010"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-642-34117-5_4","author":"Nekado","year":"2012","journal-title":"Advances in information and computer security"},{"key":"ref12","series-title":"Experimental Algorithms, 9th International Symposium, SEA 2010","first-page":"178","article-title":"A new combinational logic minimization technique with applications to cryptology","author":"Boyar","year":"2010"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-642-30436-1_24","author":"Boyar","year":"2012","journal-title":"Information security and privacy research"},{"key":"ref14","series-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2015","first-page":"63","author":"Ueno","year":"2015"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s13389-018-0187-8","volume":"9","author":"Ueno","year":"2019","journal-title":"J Cryptographic Eng"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"298","DOI":"10.46586\/tches.v2018.i2.298-336","article-title":"Smashing the implementation records of AES S-box","volume":"2018","author":"Reyhani-Masoleh","year":"2018","journal-title":"IACR Trans Cryptograp Hardw Embedded Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1109\/TC.2019.2922601","article-title":"New low-area designs for the AES forward, inverse and combined S-boxes","volume":"69","author":"Reyhani-Masoleh","year":"2020","journal-title":"IEEE Trans Comput"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"91","DOI":"10.46586\/tches.v2019.i4.91-125","article-title":"New circuit minimization techniques for smaller and faster AES S-boxes","volume":"2019","author":"Maximov","year":"2019","journal-title":"IACR Trans Cryptograp Hardw Embedded Syst"},{"key":"ref19","first-page":"3978","article-title":"AES S-box hardware with efficiency improvement based on linear mapping optimization","volume":"69","author":"Nakashima","year":"2022","journal-title":"IEEE Transact Circ Syst II: Express Briefs"},{"key":"ref20","first-page":"1169","article-title":"Low area and low power threshold implementation design technique for AES S-box","volume":"70","author":"Song","year":"2023","journal-title":"IEEE Transact Circ Syst II: Express Briefs"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/LES.2024.3478070","article-title":"Analysis of S-box hardware resources to improve AES intrinsic security against power attacks","volume":"16","author":"Singha","year":"2024","journal-title":"IEEE Embed Syst Letters"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"330","DOI":"10.46586\/tosc.v2019.i1.330-394","article-title":"PEIGEN-A platform for evaluation, implementation, and generation of S-boxes","volume":"2019","author":"Bao","year":"2019","journal-title":"IACR Transact Symmet Cryptol"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"158","DOI":"10.46586\/tosc.v2022.i1.158-182","article-title":"Towards low-latency implementation of linear layers","volume":"2022","author":"Liu","year":"2022","journal-title":"IACR Transact Symmet Cryptol"},{"key":"ref24","series-title":"International Conference on Cryptology in India-INDOCRYPT","first-page":"159","article-title":"Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes","author":"Lu","year":"2021"},{"key":"ref25","first-page":"334","article-title":"Novel optimized implementations of lightweight cryptographic S-boxes via SAT solvers","volume":"71","author":"Feng","year":"2024","journal-title":"IEEE Transact Circ Syst I: Regular Papers"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_59882\/TSP_CMC_59882.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:35:19Z","timestamp":1763102119000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059882","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}