清晨好,您是今天最早来到科研通的研友!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您科研之路漫漫前行!

Searching the space of tower field implementations of the 𝔽<SUB align="right">2<SUP align="right">8</SUP> inverter - with applications to AES, Camellia and SM4

北京 中国 中国科学院 计算机科学 钥匙(锁) 信息安全 计算机安全 政治学 法学
作者
Zihao Wei,Siwei Sun,Lei Hu,Min Wei,René Peralta
出处
期刊:International Journal of Information and Computer Security [Inderscience Publishers]
卷期号:20 (1/2): 1-1
标识
DOI:10.1504/ijics.2023.127999
摘要

No AccessSearching the space of tower field implementations of the 𝔽28 inverter - with applications to AES, Camellia and SM4Zihao Wei, Siwei Sun, Lei Hu, Man Wei and René PeraltaZihao WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Siwei SunState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Lei HuState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China, Man WeiState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China and René PeraltaComputer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPublished Online:December 21, 2022pp 1-26https://doi.org/10.1504/IJICS.2023.127999PDF ToolsAdd to FavouritesDownload CitationsTrack Citations Share this article on social mediaShareShare onFacebookTwitterLinkedInReddit AboutAbstractThe tower field implementation of the 𝔽28 inverter is not only the key technique for compact implementations of the S-boxes of several internationally standardised block ciphers such as AES, Camellia, and SM4, but also the underlying structure many side-channel attack resistant AES implementations rely on. In this work, we conduct an exhaustive study of the tower field representations of the 𝔽28 inverter with normal bases by applying several state-of-the-art combinatorial logic minimisation techniques. As a result, we achieve improved implementations of the AES, Camellia and SM4 S-boxes in terms of area footprint. Surprisingly, we are still able to improve the currently known most compact implementation of the AES S-box from CHES 2018 by 5.5 GE, beating the record again. For Camellia and SM4, the improvements are even more significant. The Verilog codes of our implementations of the AES, Camellia and SM4 S-boxes are openly available.Keywordstower field, inverter, S-box, AES, Camellia, SM4 Next article FiguresReferencesRelatedDetails Volume 20Issue 1-22023 ISSN: 1744-1765eISSN: 1744-1773 HistoryPublished onlineDecember 21, 2022 Copyright © 2023 Inderscience Enterprises Ltd.Keywordstower fieldinverterS-boxAESCamelliaSM4Authors and AffiliationsZihao Wei1 Siwei Sun2 Lei Hu3 Man Wei4 René Peralta5 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China4. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China5. Computer Security Division, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930, USAPDF download
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
ding应助wbh采纳,获得10
1秒前
greenlu完成签到,获得积分10
2秒前
现实的曼安完成签到 ,获得积分10
4秒前
送不送书7完成签到 ,获得积分10
6秒前
简时完成签到 ,获得积分10
8秒前
完美梨愁完成签到 ,获得积分10
8秒前
故意的怜晴完成签到 ,获得积分10
11秒前
myq完成签到 ,获得积分10
18秒前
量子星尘发布了新的文献求助10
24秒前
醉熏的千柳完成签到 ,获得积分10
46秒前
ramsey33完成签到 ,获得积分10
1分钟前
Muran发布了新的文献求助10
1分钟前
1分钟前
mark33442完成签到,获得积分10
1分钟前
1分钟前
秀丽的芷珍完成签到 ,获得积分10
1分钟前
个性仙人掌完成签到 ,获得积分10
1分钟前
wbh发布了新的文献求助10
1分钟前
量子星尘发布了新的文献求助10
1分钟前
CipherSage应助七人七采纳,获得30
1分钟前
秋夜临完成签到,获得积分0
1分钟前
喏晨完成签到 ,获得积分10
2分钟前
汉堡包应助温暖笑容采纳,获得10
2分钟前
wbh发布了新的文献求助10
3分钟前
量子星尘发布了新的文献求助10
3分钟前
ding应助香菜大姐采纳,获得10
3分钟前
心系天下完成签到 ,获得积分10
3分钟前
quantumdot完成签到,获得积分10
3分钟前
3分钟前
如意枫叶发布了新的文献求助10
3分钟前
wanghao完成签到 ,获得积分10
3分钟前
3分钟前
小管发布了新的文献求助10
3分钟前
诸觅双完成签到 ,获得积分10
3分钟前
chwjx完成签到 ,获得积分10
4分钟前
lyj完成签到 ,获得积分10
4分钟前
4分钟前
四月完成签到 ,获得积分10
4分钟前
浚稚完成签到 ,获得积分10
4分钟前
小管完成签到,获得积分10
4分钟前
高分求助中
【提示信息,请勿应助】关于scihub 10000
The Mother of All Tableaux: Order, Equivalence, and Geometry in the Large-scale Structure of Optimality Theory 3000
Social Research Methods (4th Edition) by Maggie Walter (2019) 2390
A new approach to the extrapolation of accelerated life test data 1000
北师大毕业论文 基于可调谐半导体激光吸收光谱技术泄漏气体检测系统的研究 390
Phylogenetic study of the order Polydesmida (Myriapoda: Diplopoda) 370
Robot-supported joining of reinforcement textiles with one-sided sewing heads 360
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 冶金 细胞生物学 免疫学
热门帖子
关注 科研通微信公众号,转发送积分 4008607
求助须知:如何正确求助?哪些是违规求助? 3548284
关于积分的说明 11298733
捐赠科研通 3282975
什么是DOI,文献DOI怎么找? 1810274
邀请新用户注册赠送积分活动 885976
科研通“疑难数据库(出版商)”最低求助积分说明 811218