{"id":"https://openalex.org/W2766573818","doi":"https://doi.org/10.7287/peerj.preprints.3300v1","title":"4, 8, 32, 64 bit Substitution Box generation using Irreducible or Reducible Polynomials over Galois Field GF(pq)","display_name":"4, 8, 32, 64 bit Substitution Box generation using Irreducible or Reducible Polynomials over Galois Field GF(pq)","publication_year":2017,"publication_date":"2017-09-29","ids":{"openalex":"https://openalex.org/W2766573818","doi":"https://doi.org/10.7287/peerj.preprints.3300v1","mag":"2766573818"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.3300v1","pdf_url":null,"source":null,"license":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"type":"article","type_crossref":"posted-content","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.7287/peerj.preprints.3300v1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052227941","display_name":"Sankhanil Dey","orcid":null},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sankhanil Dey","raw_affiliation_string":"University of Calcutta, Institute of Radio Physics and Electronics, Kolkata, West Bengal, India","raw_affiliation_strings":["University of Calcutta, Institute of Radio Physics and Electronics, Kolkata, West Bengal, India"]},{"author_position":"last","author":{"id":"https://openalex.org/A5086446469","display_name":"Ranjan Ghosh","orcid":null},"institutions":[{"id":"https://openalex.org/I106542073","display_name":"University of Calcutta","ror":"https://ror.org/01e7v7w47","country_code":"IN","type":"education","lineage":["https://openalex.org/I106542073"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ranjan Ghosh","raw_affiliation_string":"University of Calcutta, Institute of Radio Physics and Electronics, Kolkata, West Bengal, India","raw_affiliation_strings":["University of Calcutta, Institute of Radio Physics and Electronics, Kolkata, West Bengal, India"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":false,"cited_by_count":1,"cited_by_percentile_year":{"min":70,"max":76},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9846,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptanalysis of Block Ciphers and Hash Functions","score":0.9825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"bit substitution box generation","score":0.6583},{"keyword":"irreducible polynomials","score":0.3661},{"keyword":"field","score":0.3236}],"concepts":[{"id":"https://openalex.org/C94398972","wikidata":"https://www.wikidata.org/wiki/Q92552","display_name":"Galois theory","level":2,"score":0.688604},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6691856},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.6625771},{"id":"https://openalex.org/C165030954","wikidata":"https://www.wikidata.org/wiki/Q1476663","display_name":"Irreducible polynomial","level":4,"score":0.5515792},{"id":"https://openalex.org/C2778220771","wikidata":"https://www.wikidata.org/wiki/Q1522579","display_name":"Substitution (logic)","level":2,"score":0.51331276},{"id":"https://openalex.org/C156350748","wikidata":"https://www.wikidata.org/wiki/Q5513324","display_name":"GF(2)","level":3,"score":0.50615996},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.5037336},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.496954},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4713656},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.44644594},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.39004514},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3530894},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.309206},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.16712904},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15571746},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.15319625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.13384083},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C101044782","wikidata":"https://www.wikidata.org/wiki/Q6787887","display_name":"Matrix polynomial","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.3300v1","pdf_url":null,"source":null,"license":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.7287/peerj.preprints.3300v1","pdf_url":null,"source":null,"license":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1528972180","https://openalex.org/W2587136861","https://openalex.org/W2142116768","https://openalex.org/W4387838227","https://openalex.org/W2785547368","https://openalex.org/W1574908871","https://openalex.org/W2351523304","https://openalex.org/W4248505260","https://openalex.org/W2149204794","https://openalex.org/W2951463244"],"ngrams_url":"https://api.openalex.org/works/W2766573818/ngrams","abstract_inverted_index":{"Substitution":[0,62,86],"Box":[1],"or":[2,69,93,134],"S-Box":[3,32],"had":[4],"been":[5,39,65,82],"generated":[6,40,66,96],"using":[7,41,143],"4-bit":[8],"Boolean":[9],"Functions":[10],"(BFs)":[11],"for":[12],"Encryption":[13,21,35],"and":[14,19,27],"Decryption":[15],"Algorithm":[16],"of":[17,33,99,121,139],"Lucifer":[18],"Data":[20],"Standard":[22,36],"(DES)":[23],"in":[24,54],"late":[25,28],"sixties":[26],"seventies":[29],"respectively.":[30],"The":[31],"Advance":[34],"have":[37,64,81],"also":[38],"Irreducible":[42,68],"Polynomials":[43,71],"over":[44,72,102],"Galois":[45,73,79,90,106,144],"field":[46,74,107,145],"GF(2":[47],"8":[48],")":[49,110],"adding":[50],"an":[51],"additive":[52],"constant":[53],"early":[55],"twenty":[56],"first":[57],"century.":[58],"In":[59],"this":[60],"paper":[61],"Boxes":[63],"from":[67,97],"Reducible":[70],"GF(p":[75],"q":[76,109,148,151],").":[77],"Binary":[78,105],"fields":[80],"used":[83],"to":[84,113],"generate":[85],"Boxes.":[87],"Since":[88],"the":[89,94],"Field":[91],"Number":[92,95],"coefficients":[98],"a":[100,103],"polynomial":[101],"particular":[104],"(2":[108],"is":[111,127,141],"similar":[112],"log":[114,122],"2":[115,123],"q+1":[116,124],"bit":[117,125],"BFs.":[118],"So":[119],"generation":[120,138],"S-Boxes":[126,140],"possible.":[128],"Now":[129],"if":[130],"p":[131],"=":[132,152],"prime":[133],"non-prime":[135],"number":[136],"then":[137],"possible":[142],"GF":[146],"(p":[147],"),":[149],"where":[150],"p-1.":[153]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2766573818","counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2024-03-26T19:24:22.739317","created_date":"2017-11-10"}