{"id":"https://openalex.org/W4409659829","doi":"https://doi.org/10.1109/lascas64004.2025.10966232","title":"High Throughput-to-Area AES: The Role of Small S-Box in Lightweight Cryptographic Design","display_name":"High Throughput-to-Area AES: The Role of Small S-Box in Lightweight Cryptographic Design","publication_year":2025,"publication_date":"2025-02-25","ids":{"openalex":"https://openalex.org/W4409659829","doi":"https://doi.org/10.1109/lascas64004.2025.10966232"},"language":"en","primary_location":{"id":"doi:10.1109/lascas64004.2025.10966232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lascas64004.2025.10966232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 16th Latin America Symposium on Circuits and Systems (LASCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020666627","display_name":"Yuri Silva Vaz","orcid":"https://orcid.org/0000-0001-8894-6201"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Yuri Silva Vaz","raw_affiliation_strings":["Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil"],"affiliations":[{"raw_affiliation_string":"Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110901710","display_name":"J\u00falio C. B. Mattos","orcid":"https://orcid.org/0000-0002-0619-9271"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"J\u00falio C. B. Mattos","raw_affiliation_strings":["Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil"],"affiliations":[{"raw_affiliation_string":"Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil","institution_ids":["https://openalex.org/I169248161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030974893","display_name":"Rafael Soares","orcid":"https://orcid.org/0000-0001-9493-7272"},"institutions":[{"id":"https://openalex.org/I169248161","display_name":"Universidade Federal de Pelotas","ror":"https://ror.org/05msy9z54","country_code":"BR","type":"education","lineage":["https://openalex.org/I169248161"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Rafael Iankowski Soares","raw_affiliation_strings":["Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil"],"affiliations":[{"raw_affiliation_string":"Technological Development Center, Federal University of Pelotas (UFPel),Pelotas,Brazil","institution_ids":["https://openalex.org/I169248161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020666627"],"corresponding_institution_ids":["https://openalex.org/I169248161"],"apc_list":null,"apc_paid":null,"fwci":2.4253,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88951939,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.7979542016983032},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7513564229011536},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.732641875743866},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6820416450500488},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6166847348213196},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5458706617355347},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4022958278656006},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4003511667251587},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.35275769233703613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2062336802482605},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18809840083122253},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.1751480996608734},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08302631974220276}],"concepts":[{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.7979542016983032},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7513564229011536},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.732641875743866},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6820416450500488},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6166847348213196},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5458706617355347},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4022958278656006},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4003511667251587},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.35275769233703613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2062336802482605},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18809840083122253},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.1751480996608734},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08302631974220276}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lascas64004.2025.10966232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lascas64004.2025.10966232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 16th Latin America Symposium on Circuits and Systems (LASCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5859020988","display_name":null,"funder_award_id":"001","funder_id":"https://openalex.org/F4320321091","funder_display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior"}],"funders":[{"id":"https://openalex.org/F4320321091","display_name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","ror":"https://ror.org/00x0ma614"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2114972738","https://openalex.org/W2735429669","https://openalex.org/W2741152051","https://openalex.org/W2761029450","https://openalex.org/W3033299617","https://openalex.org/W4387396224","https://openalex.org/W4390606098","https://openalex.org/W4391305777","https://openalex.org/W4401537983","https://openalex.org/W6729468152"],"related_works":["https://openalex.org/W2786303832","https://openalex.org/W2059218952","https://openalex.org/W2890717930","https://openalex.org/W4253256042","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Data":[0],"security":[1,59,186,197],"is":[2,44,80,192],"an":[3,30,45,117,133],"essential":[4],"prerequisite":[5],"for":[6,144,204],"the":[7,15,87,95,98,104,158,163,171,181,185,189],"effective":[8],"functioning":[9],"of":[10,18,89,97,107,154,168,188],"modern":[11],"systems.":[12],"It":[13,148],"guarantees":[14],"secure":[16],"transmission":[17],"information":[19],"to":[20,53,68,162],"thwart":[21],"unauthorized":[22],"access":[23],"and":[24,57,202],"potential":[25],"data":[26,36],"breaches.":[27],"Cryptography":[28],"plays":[29],"indispensable":[31],"role":[32],"in":[33,78,174],"safeguarding":[34],"sensitive":[35],"during":[37],"communication.":[38],"The":[39,129],"Advanced":[40],"Encryption":[41],"Standard":[42],"(AES)":[43],"esteemed":[46],"choice":[47],"among":[48],"symmetric":[49],"key":[50],"algorithms,":[51],"owing":[52],"its":[54,62,200],"proven":[55],"reliability":[56,201],"robust":[58],"features.":[60],"Despite":[61],"extensive":[63],"adoption,":[64],"optimizing":[65],"AES":[66,108],"implementations":[67],"achieve":[69],"high":[70],"throughput":[71,96,135],"while":[72,93],"minimizing":[73],"hardware":[74,112],"resource":[75],"consumption,":[76],"particularly":[77],"area,":[79],"a":[81,110,122,140,150,175],"significant":[82],"challenge.":[83],"This":[84,114],"study":[85],"addresses":[86],"challenge":[88],"reducing":[90],"area":[91,137,152],"usage":[92],"enhancing":[94],"algorithm":[99,191],"by":[100],"focusing":[101],"on":[102],"improving":[103],"throughput-to-area":[105,169],"efficiency":[106],"through":[109,194],"novel":[111],"implementation.":[113,165],"approach":[115],"introduces":[116],"optimized":[118],"SubBytes":[119],"stage":[120],"featuring":[121],"smaller":[123],"S-box":[124],"comprising":[125],"just":[126],"16":[127],"elements.":[128],"proposed":[130],"optimization":[131],"enables":[132],"enhanced":[134],"per":[136],"(Mbpslk-gate),":[138],"providing":[139],"more":[141],"balanced":[142],"solution":[143],"lightweight":[145],"en-cryption":[146],"applications.":[147],"allowed":[149],"notable":[151],"reduction":[153],"84%,":[155],"alongside":[156],"doubling":[157],"maximum":[159],"frequency":[160],"compared":[161],"original":[164,182],"In":[166],"terms":[167],"efficiency,":[170],"optimizations":[172],"resulted":[173],"value":[176],"12.5":[177],"times":[178],"greater":[179],"than":[180],"design's.":[183],"Furthermore,":[184],"robustness":[187],"modified":[190],"confirmed":[193],"three":[195],"distinct":[196],"tests,":[198],"validating":[199],"suitability":[203],"practical":[205],"deployment.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
