{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:36:31Z","timestamp":1774640191351,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031855924","type":"print"},{"value":"9783031855931","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85593-1_10","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:24:07Z","timestamp":1741807447000},"page":"155-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Singularization: A New Approach to\u00a0Designing Block Ciphers for\u00a0Resource-Constrained Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6156-8295","authenticated-orcid":false,"given":"Gilles","family":"Macario-Rat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5954-7199","authenticated-orcid":false,"given":"Mihail-Iulian","family":"Plesa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Adams, C., Gilchrist, J.: The cast-256 encryption algorithm. RFC 2612, pp. 1\u201319 (1999). https:\/\/dblp.org\/rec\/journals\/rfc\/rfc2612","DOI":"10.17487\/rfc2612"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"70040","DOI":"10.1109\/ACCESS.2023.3292829","volume":"11","author":"ASD Alluhaidan","year":"2023","unstructured":"Alluhaidan, A.S.D., Prabu, P.: End-to-end encryption in resource-constrained IoT device. IEEE Access 11, 70040\u201370051 (2023)","journal-title":"IEEE Access"},{"issue":"1","key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7425","volume":"35","author":"V Bhagat","year":"2023","unstructured":"Bhagat, V., Kumar, S., Gupta, S.K., Chaube, M.K.: Lightweight cryptographic algorithms based on different model architectures: a systematic review and futuristic applications. Concurr. Comput. Pract. Exper. 35(1), e7425 (2023)","journal-title":"Concurr. Comput. Pract. Exper."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Biham, E.: Differential Cryptanalysis, pp. 332\u2013336. Springer, Boston (2011)","DOI":"10.1007\/978-1-4419-5906-5_572"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4, 3\u201372 (1991)","journal-title":"J. Cryptol."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Casola, V., De\u00a0Benedictis, A., Albanese, M.: A moving target defense approach for protecting resource-constrained distributed devices. In: 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), pp. 22\u201329. IEEE (2013)","DOI":"10.1109\/IRI.2013.6642449"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1109\/COMST.2019.2963791","volume":"22","author":"JH Cho","year":"2020","unstructured":"Cho, J.H., et al.: Toward proactive, adaptive defense: a survey on moving target defense. IEEE Commun. Surv. Tutor. 22(1), 709\u2013745 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10_CR8","unstructured":"Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1080\/0161-110291890885","volume":"26","author":"HM Heys","year":"2002","unstructured":"Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189\u2013221 (2002)","journal-title":"Cryptologia"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Hoang, V.T., Rogaway, P.: On generalized feistel networks. In: Annual Cryptology Conference, pp. 613\u2013630. Springer (2010)","DOI":"10.1007\/978-3-642-14623-7_33"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373\u2013386 (1988)","journal-title":"SIAM J. Comput."},{"key":"10_CR12","unstructured":"Pub, F.: Data encryption standard (des). FIPS PUB, pp. 46\u20133 (1999)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Schneier, B.: Description of a new variable-length key, 64-bit block cipher (blowfish). In: International Workshop on Fast Software Encryption, pp. 191\u2013204. Springer (1993)","DOI":"10.1007\/3-540-58108-1_24"},{"key":"10_CR14","unstructured":"of\u00a0Standards, N.I., (NIST), T.: Skipjack and kea algorithm specifications. Technical report (1998). https:\/\/csrc.nist.gov\/Presentations\/1998\/Skipjack-and-KEA-Algorithm-Specifications"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Chrystel, G., Gilles, M.-R., Simona, D., Jean-Philippe, W., Alain, Cuaboz.: Position paper: strengthening applets on legacy SIM cards with singularization, a new moving target defense strategy. In: International Conference on Mobile, Secure, and Programmable Networking, pp. 71\u201374. Springer (2023)","DOI":"10.1007\/978-3-031-52426-4_5"}],"container-title":["Lecture Notes in Computer Science","Attacks and Defenses for the Internet-of-Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85593-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:24:11Z","timestamp":1741807451000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85593-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031855924","9783031855931"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85593-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Attacks and Defenses for Internet-of-Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hanghzou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adiot2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adiot.compute.dtu.dk\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}