{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:02:28Z","timestamp":1743123748041,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030166564"},{"type":"electronic","value":"9783030166571"}],"license":[{"start":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:00:00Z","timestamp":1555027200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-16657-1_98","type":"book-chapter","created":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T20:04:30Z","timestamp":1555013070000},"page":"1050-1059","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lightweight Cipher Using GRP Bit Permutation and Tweak"],"prefix":"10.1007","author":[{"given":"Aruna","family":"Gawade","sequence":"first","affiliation":[]},{"given":"Narendra","family":"Shekokar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,12]]},"reference":[{"key":"98_CR1","unstructured":"Mckay, K.A., Bassham, L., Turan, M.S., Mouha, N.: Report on lightweight cryptography, NISTIR 8114"},{"key":"98_CR2","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: an ultra-lightweight block cipher. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"98_CR3","unstructured":"Shi, Z., Lee, R.B.: Bit permutation instructions for accelerating software cryptography. IEEE (2000)"},{"key":"98_CR4","first-page":"442","volume":"13","author":"N Raval","year":"2014","unstructured":"Raval, N., Bansod, G., Pisharoty, N.: Implementation of efficient bit permutation box for embedded security. WSEAS Trans. Comput. 13, 442\u2013451 (2014)","journal-title":"WSEAS Trans. Comput."},{"issue":"1","key":"98_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TIFS.2014.2365734","volume":"10","author":"G Bansod","year":"2015","unstructured":"Bansod, G., Raval, N., Pisharoty, N.: Implementation of a new lightweight encryption design for embedded security. IEEE Trans. Inf. Forensics Secur. 10(1), 142\u2013151 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"98_CR6","doi-asserted-by":"crossref","unstructured":"Pehlivanoglu, M.K., Akleylek, S., Tolga Sakall, M.: On the design strategies of diffusion layers and key schedule in lightweight block ciphers. IEEE (2017)","DOI":"10.1109\/UBMK.2017.8093436"},{"key":"98_CR7","doi-asserted-by":"crossref","unstructured":"James, M., Kumar, D.S.: An implementation of modified lightweight advanced encryption standard in FPGA. RAEREST (2016)","DOI":"10.1016\/j.protcy.2016.08.148"},{"key":"98_CR8","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/s00145-010-9073-y","volume":"24","author":"M Liskov","year":"2011","unstructured":"Liskov, M., Rivest, R.: Tweakable block ciphers. J. Cryptol. 24, 588\u2013613 (2011)","journal-title":"J. Cryptol."},{"issue":"11","key":"98_CR9","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.1016\/j.comnet.2012.03.027","volume":"56","author":"N Saputro","year":"2012","unstructured":"Saputro, N., Akkaya, K., Uludag, S.: A survey of routing protocols for smart grid communications. Comput. Netw. 56(11), 2742\u20132771 (2012)","journal-title":"Comput. Netw."},{"key":"98_CR10","doi-asserted-by":"crossref","unstructured":"Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-Bit Blockcipher CLEFIA (Extended Abstract). Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74619-5_12"},{"key":"98_CR11","unstructured":"https:\/\/tools.ietf.org\/html\/rfc7539"},{"key":"98_CR12","unstructured":"https:\/\/www.tayloredge.com\/reference\/Mathematics\/TEA-XTEA.pdf"},{"key":"98_CR13","unstructured":"http:\/\/shodhganga.inflibnet.ac.in\/bitstream\/10603\/113318\/2\/11-chapter%202.pdf"},{"key":"98_CR14","unstructured":"http:\/\/www.cse.uconn.edu\/~zshi\/publications\/shi_thesis.pdf"},{"key":"98_CR15","doi-asserted-by":"crossref","unstructured":"Gawade, A.U., Shekokar, N.: Lightweight secure RPL: a need in IoT. In: International Conference on Information Technology (2017)","DOI":"10.1109\/ICIT.2017.31"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16657-1_98","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T07:13:48Z","timestamp":1707981228000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-16657-1_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,12]]},"ISBN":["9783030166564","9783030166571"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16657-1_98","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,4,12]]},"assertion":[{"value":"12 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA 2018","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vellore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}