{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:56Z","timestamp":1740099476306,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030304393"},{"type":"electronic","value":"9783030304409"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30440-9_20","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:13:03Z","timestamp":1567563183000},"page":"209-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["New Encryption Method with Adaptable Computational and Memory Complexity Using Selected Hash Function"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8311-9511","authenticated-orcid":false,"given":"Grzegorz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Mateusz","family":"Wojsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"issue":"12","key":"20_CR1","doi-asserted-by":"publisher","first-page":"15457","DOI":"10.1007\/s11042-017-5124-9","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura, H., Sleem, L., Noura, M., Mansour, M., Chehab, A., Couturier, A.: A new efficient lightweight and secure image cipher scheme. Multimed. Tools Appl. 77(12), 15457\u201315484 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"7","key":"20_CR2","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1002\/sec.375","volume":"5","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Heys, H., Li, C.: Energy efficiency of encryption schemes applied to wireless sensor networks. Secur. Commun. Netw. 5(7), 789\u2013808 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Sallam, S., Beheshti, B.D.: A survey on lightweight cryptographic algorithms. In: Proceedings of IEEE Region 10 Annual International Conference on TENCON 2018, pp. 1784\u20131789. TENCON, October 2018","DOI":"10.1109\/TENCON.2018.8650352"},{"key":"20_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-662-53887-6_5","volume-title":"Advances in Cryptology - ASIACRYPT 2016","author":"A Bogdanov","year":"2016","unstructured":"Bogdanov, A., Isobe, T., Tischhauser, E.: Towards practical whitebox cryptography: optimizing efficiency and space hardness. In: Cheon, J., Takagi, T. (eds.) Advances in Cryptology - ASIACRYPT 2016. LNCS, vol. 10031, pp. 126\u2013158. Springer, Heidelberg (2016)"},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/s10623-014-9970-4","volume":"73","author":"K Shibutani","year":"2014","unstructured":"Shibutani, K., Bogdanov, A.: Towards the optimality of Feistel ciphers with substitution-permutation functions. Des. Codes Cryptogr. 73(2), 667\u2013682 (2014)","journal-title":"Des. Codes Cryptogr."},{"key":"20_CR6","first-page":"456","volume-title":"Lecture Notes in Networks and Systems","author":"Jaros\u0142aw Sugier","year":"2018","unstructured":"Sugier, J.: Implementation efficiency of BLAKE2 cryptographic algorithm in contemporary popular-grade FPGA devices. In: Kabashkin, I., Yatskiv, I., Prentkovskis, O (eds.) Lecture Notes in Networks and Systems, vol. 36\u00a0pp. 456\u2013465. Springer, Heidelberg (2018)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Szefer, J., Chen, Y.Y., Lee, R.B.: General-purpose FPGA platform for efficient encryption and hashing. In: Charot, F., Hannig, F., Teich, J., Wolinski, C. (eds.) IEEE International Conference on Application-Specific Systems Architectures and Processors. IEEE (2010)","DOI":"10.1109\/ASAP.2010.5540976"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Hei, X.L., Song, B.H., Ling, C.J.: SHIPHER: a new family of light-weight block ciphers based on dynamic operators. In: IEEE International Conference on Communications. IEEE (2017)","DOI":"10.1109\/ICC.2017.7996731"},{"key":"20_CR9","first-page":"658","volume-title":"Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016","author":"K. B. Jithendra","year":"2017","unstructured":"Jithendra, K.B., Shahana, T.K.: Elastic serial substitution box for block ciphers with integrated hash function generation. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) Proceedings of Sai Intelligent Systems Conference (INTELLISYS) 2016, vol 2. LNNS, vol. 16, pp. 658\u2013671. Springer, Heidelberg (2018)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Noura, H., Courousse, D.: Lightweight, dynamic, and flexible cipher scheme for wireless and mobile networks. In: Mitton, N., Kantarci, ME., Gallais, A., Papavassiliou, S. (eds.) Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, vol. 155, pp. 225\u2013236. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-319-25067-0_18"},{"issue":"6","key":"20_CR11","doi-asserted-by":"publisher","first-page":"636","DOI":"10.14429\/dsj.67.10791","volume":"67","author":"M Kumar","year":"2017","unstructured":"Kumar, M., Dey, D., Pal, S.K., Panigrahi, A.: HeW: a hash function based on lightweight block cipher FeW. Defence Sci. J. 67(6), 636\u2013644 (2017)","journal-title":"Defence Sci. J."},{"key":"20_CR12","first-page":"610","volume-title":"Advances in Intelligent Systems and Computing","author":"R Alvarez-Sanchez","year":"2018","unstructured":"Alvarez-Sanchez, R., Andrade-Bazurto, A., Santos-Gonzalez, I., Zamora-Gomez, A.: AES-CTR as a password-hashing function. In: Garcia, H.P., Alfonso-Cendon, J., Gonzale, L.S., Quintian, H., Corchado, E. (eds.) Advances in Intelligent Systems and Computing, vol. 649, pp. 610\u2013617. Springer, Heidelberg (2018)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Takahashi, H., Nakano, S., Lakhani, U.: SHA256d hash rate enhancement by L3 cache. In: IEEE Global Conference on Consumer Electronics. IEEE (2018)","DOI":"10.1109\/GCCE.2018.8574821"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30440-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T02:22:43Z","timestamp":1567563763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30440-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030304393","9783030304409"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30440-9_20","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}