{"id":"https://openalex.org/W2147313173","doi":"https://doi.org/10.1093/comjnl/bxp048","title":"Secure Testable S-box Architecture for Cryptographic Hardware Implementation","display_name":"Secure Testable S-box Architecture for Cryptographic Hardware Implementation","publication_year":2009,"publication_date":"2009-05-27","ids":{"openalex":"https://openalex.org/W2147313173","doi":"https://doi.org/10.1093/comjnl/bxp048","mag":"2147313173"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxp048","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp048","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082934529","display_name":"Hafizur Rahaman","orcid":"https://orcid.org/0000-0001-9012-5437"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"H. Rahaman","raw_affiliation_strings":["Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081683515","display_name":"Jimson Mathew","orcid":"https://orcid.org/0000-0001-8247-9040"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"J. Mathew","raw_affiliation_strings":["Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113458314","display_name":"Dhiraj K. Pradhan","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"D. K. Pradhan","raw_affiliation_strings":["Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol,Bristol BS8 1UB,UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082934529"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.2678,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.6085517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"53","issue":"5","first_page":"581","last_page":"591"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11032","display_name":"VLSI and Analog Circuit Testing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7981200814247131},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7257717847824097},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5916357040405273},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5807076096534729},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.5224061012268066},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4334898293018341},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.4213183522224426},{"id":"https://openalex.org/keywords/hardware-architecture","display_name":"Hardware architecture","score":0.417501300573349},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4160999655723572},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4033811688423157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36699509620666504},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24450021982192993},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.20492136478424072},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07131004333496094}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7981200814247131},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7257717847824097},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5916357040405273},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5807076096534729},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.5224061012268066},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4334898293018341},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.4213183522224426},{"id":"https://openalex.org/C65232700","wikidata":"https://www.wikidata.org/wiki/Q5656403","display_name":"Hardware architecture","level":3,"score":0.417501300573349},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4160999655723572},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4033811688423157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36699509620666504},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24450021982192993},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.20492136478424072},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07131004333496094},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/comjnl/bxp048","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp048","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/27f05997-8107-4cfd-8aff-775e9b5beec6","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/27f05997-8107-4cfd-8aff-775e9b5beec6","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Rahaman, H, Mathew, J & Dhiraj, P 2009, 'Secure Testable S-box Architecture for Cryptographic Hardware Implementation', The Computer Journal. < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001046 >","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/27f05997-8107-4cfd-8aff-775e9b5beec6","is_oa":false,"landing_page_url":"https://research-information.bristol.ac.uk/en/publications/secure-testable-sbox-architecture-for-cryptographic-hardware-implementation(27f05997-8107-4cfd-8aff-775e9b5beec6).html","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Rahaman, H, Mathew, J & Dhiraj, P 2009, 'Secure Testable S-box Architecture for Cryptographic Hardware Implementation', The Computer Journal. < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001046 >","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2954599081","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W87530933","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216","https://openalex.org/W2102905434"],"abstract_inverted_index":{"It":[0],"has":[1],"been":[2],"recently":[3],"shown":[4],"that":[5,29,45],"observability":[6],"of":[7,42,63,107,135],"design":[8],"for":[9,101,150],"testability":[10],"techniques":[11],"compromises":[12],"cryptographic":[13],"hardware":[14,72,133],"implementation":[15,59],"security":[16,157],"in":[17,68,123],"a":[18,43,56,80,89],"straightforward":[19],"manner.":[20],"During":[21],"test,":[22],"the":[23,39,48,64,76,105,108,124,155],"chip":[24,109],"can":[25,146],"be":[26],"configured":[27],"so":[28],"it":[30],"is":[31,61],"possible":[32],"to":[33,118],"observe":[34],"temporal":[35],"data":[36],"resulting":[37],"from":[38],"encryption":[40,70],"process":[41],"plaintext":[44],"eventually":[46],"exposes":[47],"secret":[49],"key.":[50],"To":[51],"this":[52],"end,":[53],"we":[54],"propose":[55],"C-testable":[57,127],"S-box":[58,77],"which":[60],"one":[62,145],"most":[65],"complex":[66],"blocks":[67],"advanced":[69],"standard":[71],"implementation.":[73],"We":[74],"divide":[75],"structure":[78,94],"into":[79,154],"positive":[81],"polarity":[82],"Reed\u2013Muller":[83],"form":[84],"and":[85],"tested":[86],"independently":[87],"using":[88],"BIST":[90],"circuit.":[91],"The":[92,126],"proposed":[93],"does":[95],"not":[96],"use":[97],"any":[98],"scan":[99],"chain":[100],"testability,":[102],"hence":[103],"avoiding":[104],"vulnerability":[106],"during":[110],"testing.":[111],"Only":[112],"14":[113],"constant":[114],"vectors":[115],"are":[116],"sufficient":[117],"achieve":[119],"100%":[120],"fault":[121],"coverage":[122],"S-box.":[125],"feature":[128,144],"comes":[129],"with":[130],"an":[131,141],"extra":[132],"overhead":[134],"15":[136],"per":[137],"cent.":[138],"By":[139],"introducing":[140,151],"on-chip":[142,156],"testing":[143],"avoid":[147],"potential":[148],"paths":[149],"unwanted":[152],"access":[153],"blocks.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
