{"id":"https://openalex.org/W2013966269","doi":"https://doi.org/10.1109/isqed.2010.5450467","title":"On the design of different concurrent EDC schemes for S-Box and GF(p)","display_name":"On the design of different concurrent EDC schemes for S-Box and GF(p)","publication_year":2010,"publication_date":"2010-03-01","ids":{"openalex":"https://openalex.org/W2013966269","doi":"https://doi.org/10.1109/isqed.2010.5450467","mag":"2013966269"},"language":"en","primary_location":{"id":"doi:10.1109/isqed.2010.5450467","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2010.5450467","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 11th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081683515","display_name":"Jimson Mathew","orcid":"https://orcid.org/0000-0001-8247-9040"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"J. Mathew","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK","Department of Computer Science,  University of Bristol , UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Department of Computer Science,  University of Bristol , UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082934529","display_name":"Hafizur Rahaman","orcid":"https://orcid.org/0000-0001-9012-5437"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"H. Rahaman","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK","Department of Computer Science,  University of Bristol , UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Department of Computer Science,  University of Bristol , UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076588539","display_name":"Abusaleh Jabir","orcid":null},"institutions":[{"id":"https://openalex.org/I124261462","display_name":"Oxford Brookes University","ror":"https://ror.org/04v2twj65","country_code":"GB","type":"education","lineage":["https://openalex.org/I124261462"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"A. M. Jabir","raw_affiliation_strings":["Department of Computing & Electronics, Oxford Brookes University, UK","Dept. of Computing & Electronics, Oxford Brookes University, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing & Electronics, Oxford Brookes University, UK","institution_ids":["https://openalex.org/I124261462"]},{"raw_affiliation_string":"Dept. of Computing & Electronics, Oxford Brookes University, UK","institution_ids":["https://openalex.org/I124261462"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070359867","display_name":"Saraju P. Mohanty","orcid":"https://orcid.org/0000-0003-2959-6541"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. P. Mohanty","raw_affiliation_strings":["Department of CSE, University of North Texas, Denton, TX, USA","Dept. of CSE, Univ of North Texas, Denton, 76203, USA"],"affiliations":[{"raw_affiliation_string":"Department of CSE, University of North Texas, Denton, TX, USA","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"Dept. of CSE, Univ of North Texas, Denton, 76203, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113458314","display_name":"Dhiraj K. Pradhan","orcid":null},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Dhiraj K. Pradhan","raw_affiliation_strings":["Department of Computer Science, University of Bristol, UK","Department of Computer Science,  University of Bristol , UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Department of Computer Science,  University of Bristol , UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081683515"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":1.3935,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84432944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"83","issue":null,"first_page":"211","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7230694890022278},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.6730875968933105},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6437397003173828},{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.5476624965667725},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.513785183429718},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.5083162188529968},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5079930424690247},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5054090023040771},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.4532833695411682},{"id":"https://openalex.org/keywords/parity-bit","display_name":"Parity bit","score":0.4421333074569702},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43016350269317627},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39568865299224854},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.22065961360931396},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16397696733474731}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7230694890022278},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.6730875968933105},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6437397003173828},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.5476624965667725},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.513785183429718},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.5083162188529968},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5079930424690247},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5054090023040771},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4532833695411682},{"id":"https://openalex.org/C131521367","wikidata":"https://www.wikidata.org/wiki/Q625502","display_name":"Parity bit","level":2,"score":0.4421333074569702},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43016350269317627},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39568865299224854},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.22065961360931396},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16397696733474731},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/isqed.2010.5450467","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isqed.2010.5450467","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 11th International Symposium on Quality Electronic Design (ISQED)","raw_type":"proceedings-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/0a5ca4dd-eae4-4f30-a4bf-c3d8f557517c","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/0a5ca4dd-eae4-4f30-a4bf-c3d8f557517c","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mathew, J & Dhiraj, P 2010, On the Design of Different Concurrent EDC Schemes for S-box and GF(P)\". in Proceedings of the 11th IEEE International Symposium on Quality Electronic Design (ISQED). Institute of Electrical and Electronics Engineers (IEEE). < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001398 >","raw_type":"contributionToPeriodical"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/0a5ca4dd-eae4-4f30-a4bf-c3d8f557517c","is_oa":false,"landing_page_url":"http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001398","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mathew, J & Dhiraj, P 2010, On the Design of Different Concurrent EDC Schemes for S-box and GF(P)\". in Proceedings of the 11th IEEE International Symposium on Quality Electronic Design (ISQED). Institute of Electrical and Electronics Engineers (IEEE). < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001398 >","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W87321833","https://openalex.org/W1481330728","https://openalex.org/W1486216952","https://openalex.org/W1556212265","https://openalex.org/W1572300106","https://openalex.org/W1980073965","https://openalex.org/W1986310972","https://openalex.org/W2021708499","https://openalex.org/W2057209427","https://openalex.org/W2066425771","https://openalex.org/W2080481349","https://openalex.org/W2087866481","https://openalex.org/W2103002136","https://openalex.org/W2104003712","https://openalex.org/W2104183585","https://openalex.org/W2115982353","https://openalex.org/W2122819799","https://openalex.org/W2128765501","https://openalex.org/W2131287315","https://openalex.org/W2149204794","https://openalex.org/W2153973094","https://openalex.org/W2162465831","https://openalex.org/W2165752884","https://openalex.org/W2342204193","https://openalex.org/W4300188436","https://openalex.org/W6628765973","https://openalex.org/W6676043056"],"related_works":["https://openalex.org/W2943247777","https://openalex.org/W2740543340","https://openalex.org/W2371167013","https://openalex.org/W1493958394","https://openalex.org/W1582340598","https://openalex.org/W2794545997","https://openalex.org/W2584980534","https://openalex.org/W2182731056","https://openalex.org/W1600949677","https://openalex.org/W2779867339"],"abstract_inverted_index":{"Recent":[0],"studies":[1],"have":[2],"shown":[3],"that":[4],"an":[5,50],"attacker":[6],"can":[7],"retrieve":[8],"confidential":[9],"information":[10],"from":[11,139],"cryptographic":[12,28,59],"hardware":[13,31],"(e.g.":[14],"the":[15,66,74,80,85,140,143,152,161],"secret":[16],"key)":[17],"by":[18,165],"introducing":[19],"internal":[20],"faults.":[21],"A":[22],"secure":[23],"and":[24,69,93,110,128,134,145],"reliable":[25],"implementation":[26],"of":[27,79,160],"algorithms":[29],"in":[30,58,84],"must":[32],"be":[33,49],"able":[34],"to":[35,53,108,150],"detect":[36,109],"or":[37],"correct":[38,111],"such":[39,55],"malicious":[40],"attacks.":[41],"Error":[42],"detection/correction":[43],"(EDC),":[44],"through":[45],"fault":[46,56],"tolerance,":[47],"could":[48],"effective":[51],"way":[52],"mitigate":[54],"attacks":[57],"hardware.":[60],"To":[61],"this":[62],"end,":[63],"we":[64],"analyze":[65],"area,":[67],"delay,":[68],"power":[70],"overhead":[71],"for":[72],"designing":[73],"S-Box,":[75,132],"which":[76,118],"is":[77],"one":[78],"main":[81],"complex":[82],"blocks":[83],"Advanced":[86],"Encryption":[87],"Standard":[88],"(AES),":[89],"with":[90],"error":[91,105,167],"detection":[92,168],"correction":[94,146],"capability.":[95,169],"We":[96],"use":[97],"multiple":[98],"Parity":[99],"Predictions":[100],"(PPs),":[101],"based":[102],"on":[103],"various":[104],"correcting":[106],"codes,":[107,125],"errors.":[112],"Various":[113],"coding":[114],"techniques":[115],"are":[116,137,148],"presented,":[117],"include":[119],"simple":[120],"parity":[121,124],"prediction,":[122],"split":[123],"Hamming,":[126],"Hsiao,":[127],"LDPC":[129],"codes.":[130],"The":[131,155],"GF(p),":[133],"PP":[135],"circuits":[136,147],"synthesized":[138],"specifications,":[141],"while":[142],"decoding":[144],"combined":[149],"form":[151],"complete":[153],"designs.":[154],"analysis":[156],"shows":[157],"a":[158],"comparison":[159],"different":[162],"approaches":[163],"characterized":[164],"their":[166]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
