清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

Searching the space of tower field implementations of the 𝔽<SUB align="right">2<SUP align="right">8</SUP> inverter - with applications to AES, Camellia and SM4

北京 中国 中国科学院 计算机科学 钥匙(锁) 信息安全 计算机安全 政治学 法学
作者
Zihao Wei,Siwei Sun,Lei Hu,Min Wei,René Peralta
出处
期刊:International Journal of Information and Computer Security [Inderscience Enterprises Ltd.]
卷期号:20 (1/2): 1-1
标识
DOI:10.1504/ijics.2023.127999
摘要

No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China4. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China5. Computer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPDF download
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
单薄绮露完成签到,获得积分10
刚刚
ECHO完成签到,获得积分10
1秒前
令狐新竹完成签到 ,获得积分10
1秒前
梓歆完成签到 ,获得积分10
5秒前
小伊001完成签到,获得积分10
32秒前
violetlishu完成签到 ,获得积分10
35秒前
大东东完成签到,获得积分10
50秒前
娇娇大王完成签到,获得积分10
55秒前
宗嘻嘻完成签到 ,获得积分10
56秒前
双眼皮跳蚤完成签到,获得积分10
58秒前
紫愿完成签到 ,获得积分10
1分钟前
xixi很困完成签到 ,获得积分10
1分钟前
阳炎完成签到,获得积分10
1分钟前
...完成签到 ,获得积分10
1分钟前
笨笨完成签到 ,获得积分10
1分钟前
光亮若翠完成签到,获得积分10
1分钟前
完美世界应助Billy采纳,获得10
2分钟前
东方欲晓完成签到 ,获得积分0
2分钟前
深情的凝云完成签到 ,获得积分10
2分钟前
陆黑暗完成签到 ,获得积分10
2分钟前
Eric完成签到 ,获得积分0
2分钟前
dent强完成签到 ,获得积分10
2分钟前
北笙完成签到 ,获得积分10
2分钟前
呆呆的猕猴桃完成签到 ,获得积分10
2分钟前
科研通AI2S应助Billy采纳,获得10
2分钟前
玉鱼儿完成签到 ,获得积分10
2分钟前
浮云完成签到 ,获得积分10
2分钟前
火星上小土豆完成签到 ,获得积分10
2分钟前
柒柒完成签到 ,获得积分10
3分钟前
zhang完成签到 ,获得积分10
3分钟前
苏州九龙小7完成签到 ,获得积分10
3分钟前
个性仙人掌完成签到 ,获得积分10
3分钟前
3分钟前
高大手链发布了新的文献求助10
3分钟前
mendicant完成签到,获得积分10
3分钟前
航行天下完成签到 ,获得积分10
3分钟前
zz完成签到 ,获得积分10
3分钟前
huangzsdy完成签到,获得积分10
3分钟前
后陡门的夏天完成签到 ,获得积分10
3分钟前
ANT完成签到 ,获得积分10
3分钟前
高分求助中
Sustainability in Tides Chemistry 2800
The Young builders of New china : the visit of the delegation of the WFDY to the Chinese People's Republic 1000
Rechtsphilosophie 1000
Bayesian Models of Cognition:Reverse Engineering the Mind 888
Le dégorgement réflexe des Acridiens 800
Defense against predation 800
XAFS for Everyone (2nd Edition) 600
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3134020
求助须知:如何正确求助?哪些是违规求助? 2784845
关于积分的说明 7768808
捐赠科研通 2440236
什么是DOI,文献DOI怎么找? 1297340
科研通“疑难数据库(出版商)”最低求助积分说明 624925
版权声明 600792