{"id":"https://openalex.org/W4392785313","doi":"https://doi.org/10.1186/s42400-024-00207-x","title":"A circuit area optimization of MK-3\u00a0S-box","display_name":"A circuit area optimization of MK-3\u00a0S-box","publication_year":2024,"publication_date":"2024-02-03","ids":{"openalex":"https://openalex.org/W4392785313","doi":"https://doi.org/10.1186/s42400-024-00207-x"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-024-00207-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00207-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00207-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00207-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100382119","display_name":"Yanjun Li","orcid":"https://orcid.org/0000-0002-6277-4189"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanjun Li","raw_affiliation_strings":["Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, 450001, China","Information Industry Information Security Evaluation Center, The 15th Research Institute of China Electronic Technology Group Corporation, Beijing, 100083, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zhengzhou, 450001, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Information Industry Information Security Evaluation Center, The 15th Research Institute of China Electronic Technology Group Corporation, Beijing, 100083, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100381054","display_name":"Weiguo Zhang","orcid":"https://orcid.org/0000-0002-8393-3185"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiguo Zhang","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai Distric, Beijing, 100083, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai Distric, Beijing, 100083, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089391279","display_name":"Yiping Lin","orcid":"https://orcid.org/0009-0002-6332-3731"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiping Lin","raw_affiliation_strings":["Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai Distric, Beijing, 100083, China"],"affiliations":[{"raw_affiliation_string":"Beijing Electronic Science and Technology Institute, No.7 Fufeng Road, Fengtai Distric, Beijing, 100083, China","institution_ids":["https://openalex.org/I202334528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032836815","display_name":"Jian Zou","orcid":"https://orcid.org/0000-0002-0864-0905"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Zou","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, 350108, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, 350108, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000505099","display_name":"Jian Liu","orcid":"https://orcid.org/0000-0003-1920-2641"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Liu","raw_affiliation_strings":["Information Industry Information Security Evaluation Center, The 15th Research Institute of China Electronic Technology Group Corporation, Beijing, 100083, China"],"affiliations":[{"raw_affiliation_string":"Information Industry Information Security Evaluation Center, The 15th Research Institute of China Electronic Technology Group Corporation, Beijing, 100083, China","institution_ids":["https://openalex.org/I4210160629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100382119"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210160629"],"apc_list":null,"apc_paid":null,"fwci":0.7088,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.7298834,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5222076773643494},{"id":"https://openalex.org/keywords/engineering-drawing","display_name":"Engineering drawing","score":0.36357274651527405},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2698530852794647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5222076773643494},{"id":"https://openalex.org/C199639397","wikidata":"https://www.wikidata.org/wiki/Q1788588","display_name":"Engineering drawing","level":1,"score":0.36357274651527405},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2698530852794647}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-024-00207-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00207-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00207-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:05564aaeb902464788a95b8ac01d293c","is_oa":true,"landing_page_url":"https://doaj.org/article/05564aaeb902464788a95b8ac01d293c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 7, Iss 1, Pp 1-11 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-024-00207-x","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-024-00207-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-024-00207-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4392785313.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1499906440","https://openalex.org/W1784953981","https://openalex.org/W1967380110","https://openalex.org/W2003858108","https://openalex.org/W2007751412","https://openalex.org/W2096050004","https://openalex.org/W2109265351","https://openalex.org/W2112244944","https://openalex.org/W2117584890","https://openalex.org/W2149174385","https://openalex.org/W2169932713","https://openalex.org/W2209780761","https://openalex.org/W2218847395","https://openalex.org/W2497867845","https://openalex.org/W2791612455","https://openalex.org/W3009304466","https://openalex.org/W3148156159","https://openalex.org/W4237491555","https://openalex.org/W4238134147","https://openalex.org/W4247903245"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"MILCOM":[2],"2015,":[3],"Kelly":[4],"et":[5],"al.":[6],"proposed":[7,162],"the":[8,15,23,33,47,54,59,67,72,87,92,119,129,136,148,151,160,164,167,171],"authentication":[9],"encryption":[10],"algorithm":[11],"MK-3,":[12],"which":[13],"applied":[14],"16-bit":[16,24],"S-box.":[17],"This":[18],"paper":[19,176],"aims":[20],"to":[21,66,118,134],"implement":[22],"S-box":[25,154,173],"with":[26,159],"less":[27],"circuit":[28,168],"area.":[29],"First,":[30],"we":[31,45,70],"classified":[32],"irreducible":[34,63],"polynomials":[35],"over":[36,53,94,102,110,122,138],"$$\\mathbb":[37,75,80,95,103,111,123,141],"{F}_{2^n}$$":[38],"<mml:math":[39,77,82,97,105,113,125,143],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mn>2</mml:mn><mml:mi>n</mml:mi></mml:msup></mml:msub></mml:math>":[40],"into":[41],"three":[42,60],"kinds.":[43],"Then":[44],"compared":[46],"logic":[48],"gates":[49],"required":[50],"for":[51],"multiplication":[52],"finite":[55,90],"field":[56,140],"constructed":[57,71],"by":[58,163,179],"types":[61],"of":[62,89,150,170],"polynomials.":[64],"According":[65],"comparison":[68],"result,":[69],"composite":[73],"fields,":[74,91],"{F}_{(2^4)^2}$$":[76,124],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mn>4</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:msub></mml:math>":[78,126],"and":[79],"{F}_{(2^8)^2}$$":[81,104],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mn>8</mml:mn></mml:msup><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:msub></mml:math>":[83,106],".":[84,107,127,145],"Based":[85],"on":[86],"isomorphism":[88],"operations":[93,137],"{F}_{2^{16}}$$":[96],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mn>2</mml:mn><mml:mn>16</mml:mn></mml:msup></mml:msub></mml:math>":[98],"can":[99,115],"be":[100,116],"conducted":[101],"Similarly,":[108],"elements":[109,121],"{F}_{2^8}$$":[112],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mn>2</mml:mn><mml:mn>8</mml:mn></mml:msup></mml:msub></mml:math>":[114],"mapped":[117],"corresponding":[120],"Next,":[128],"SAT":[130],"solver":[131],"was":[132,155],"used":[133],"optimize":[135],"smaller":[139],"{F}_{2^4}$$":[142],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi><mml:msup><mml:mn>2</mml:mn><mml:mn>4</mml:mn></mml:msup></mml:msub></mml:math>":[144],"At":[146],"last,":[147],"architecture":[149],"optimized":[152],"MK-3":[153,172],"worked":[156],"out.":[157],"Compared":[158],"implementation":[161],"original":[165],"designer,":[166],"area":[169],"in":[174],"this":[175],"is":[177],"reduced":[178],"at":[180],"least":[181],"55.9%.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
