{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:34:51Z","timestamp":1757626491755,"version":"3.44.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944574"},{"type":"electronic","value":"9783031944581"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94458-1_5","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:54:56Z","timestamp":1756569296000},"page":"94-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Hardware-Oriented Lightweight Block Cipher and\u00a0Its Application in\u00a0Surveillance Video"],"prefix":"10.1007","author":[{"given":"Xing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tianning","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changda","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"3317","DOI":"10.3390\/su15043317","volume":"15","author":"F Kamalov","year":"2023","unstructured":"Kamalov, F., Pourghebleh, B., Gheisari, M., et al.: Internet of medical things privacy and security: challenges, solutions, and future trends from a new perspective[J]. Sustainability 15(4), 3317 (2023)","journal-title":"Sustainability"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"202910","DOI":"10.1109\/ACCESS.2020.3036023","volume":"8","author":"MK Lee","year":"2020","unstructured":"Lee, M.K., Jang, E.S.: Start code-based encryption and decryption framework for HEVC[J]. IEEE Access 8, 202910\u2013202918 (2020)","journal-title":"IEEE Access"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chadha, A., Mallik, S., Chadha, A., et al.: Dual-layer video encryption using RSA algorithm[J]. arxiv preprint arxiv:1509.04387 (2015)","DOI":"10.5120\/20302-2341"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.sigpro.2016.01.017","volume":"125","author":"M Kumar","year":"2016","unstructured":"Kumar, M., Iqbal, A., Kumar, P.: A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography[J]. Signal Process. 125, 187\u2013202 (2016)","journal-title":"Signal Process."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Adam, M., Hammoudeh, M., Alrawashdeh, R., et al.: A survey on security, privacy, trust, and architectural challenges in IoT systems[J]. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3382709"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Kousalya, R., Kumar, G.A.S.: A survey of light-weight cryptographic algorithm for information security and hardware efficiency in resource constrained devices[C]\/\/. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking(ViTECoN). IEEE, pp. 1\u20135 (2019)","DOI":"10.1109\/ViTECoN.2019.8899376"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, K. C., Pandey, S. K., Samanta, S.: FUTURE: a lightweight block cipher using an optimal diffusion matrix[C]\/\/ In: International Conference on Cryptology in Africa. Cham: Springer Nature Switzerland, pp. 28\u201352 (2022)","DOI":"10.1007\/978-3-031-17433-9_2"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Huang, X., Li, L., Yang, J.: IVLBC: an involutive lightweight block cipher for internet of things[J]. IEEE Syst. J. (2022)","DOI":"10.1109\/JSYST.2022.3227951"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: Proc. 52nd Annu. Design Autom. Conf., San Francisco, CA, USA, pp.1\u20136 (2015)","DOI":"10.1145\/2744769.2747946"},{"issue":"16","key":"5_CR10","doi-asserted-by":"publisher","first-page":"13014","DOI":"10.1109\/JIOT.2021.3064203","volume":"8","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Li, L., Liu, B.: Shadow: a lightweight block cipher for IoT nodes[J]. IEEE Internet Things J. 8(16), 13014\u201313023 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, J., Guo, S., He, J.: ALLPC: a lightweight block cipher based on generalized Feistel networks for IoT[C]\/\/. In: 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC). IEEE, pp 1\u20138 (2021)","DOI":"10.1109\/IPCCC51483.2021.9679401"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: a lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21554-4_19"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Yeoh, W.Z., Teh, J.S., Sazali, M.I.S.B.M., $$\\mu ^{2}$$: A lightweight block cipher[C], . In: Computational Science and Technology: 6th ICCST,: Kota Kinabalu, Malaysia, 29\u201330 August 2019. Springer Singapore 2020, 281\u2013290 (2019)","DOI":"10.1007\/978-981-15-0058-9_27"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Banik, S., Bao, Z., Isobe, T., et al.: WARP: revisiting GFN for lightweight 128-bit block cipher[C]\/\/. In: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers 27. Springer International Publishing, pp. 535\u2013564 (2021)","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Zakaria, A .A., Azni, A. H., Ridzuan, F., et al.: Systematic literature review: trend analysis on the design of lightweight block cipher[J]. J. King Saud Univ. Comp. Info. Sci. (2023)","DOI":"10.1016\/j.jksuci.2023.04.003"},{"key":"5_CR16","volume":"70","author":"JS Teh","year":"2022","unstructured":"Teh, J.S., Biryukov, A.: Differential cryptanalysis of WARP[J]. J. Info. Sec. Appl. 70, 103316 (2022)","journal-title":"J. Info. Sec. Appl."},{"issue":"3","key":"5_CR17","doi-asserted-by":"publisher","first-page":"327","DOI":"10.46586\/tosc.v2020.i3.327-361","volume":"2020","author":"C Boura","year":"2020","unstructured":"Boura, C., Coggia, D.: Efficient MILP modelings for Sboxes and linear layers of SPN ciphers[J]. IACR Trans. Symm. Cryptol. 2020(3), 327\u2013361 (2020)","journal-title":"IACR Trans. Symm. Cryptol."},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/cryptography7010008","volume":"7","author":"R Almukhlifi","year":"2023","unstructured":"Almukhlifi, R., Vora, P.L.: Linear cryptanalysis of reduced-round simeck using super rounds[J]. Cryptography 7(1), 8 (2023)","journal-title":"Cryptography"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Gandhi, J., Shekhawat, D., Santosh, M., et al.: Security evaluation of lightweight SBoxes. In: [C]\/\/2023 IEEE International Symposium on Smart Electronic Systems (iSES). IEEE, pp. 315\u2013318 (2023)","DOI":"10.1109\/iSES58672.2023.00071"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-022-09440-4","volume":"36","author":"Y Liu","year":"2023","unstructured":"Liu, Y., Niu, Z., Sun, S., et al.: Rotational differential-linear cryptanalysis revisited[J]. J. Cryptol. 36(1), 3 (2023)","journal-title":"J. Cryptol."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-13066-8_6","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"J Alizadeh","year":"2014","unstructured":"Alizadeh, J., et al.: Cryptanalysis of SIMON variants with connections. In: Saxena, N., Sadeghi, A.-R. (eds.) RFIDSec 2014. LNCS, vol. 8651, pp. 90\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13066-8_6"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-74735-2_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A., et al.: PRESENT: an ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450\u2013466. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31"},{"issue":"1","key":"5_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7425","volume":"35","author":"V Bhagat","year":"2023","unstructured":"Bhagat, V., Kumar, S., Gupta, S.K., et al.: Lightweight cryptographic algorithms based on different model architectures\u202f: a systematic review and futuristic applications [J]. Conc. Comp. Pract. Exp. 35(1), e7425 (2023)","journal-title":"Conc. Comp. Pract. Exp."},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.future.2021.11.011","volume":"129","author":"M Rana","year":"2022","unstructured":"Rana, M., Mamun, Q., Islam, R.: Lightweight cryptography in IoT networks: a survey[J]. Futur. Gener. Comput. Syst. 129, 77\u201389 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"131","DOI":"10.3329\/rujse.v44i0.30398","volume":"44","author":"MM Ahamad","year":"2016","unstructured":"Ahamad, M.M., Abdullah, M.I.: Comparison of encryption algorithms for multimedia[J]. Rajshahi Univ. J. Sci. Eng. 44, 131\u2013139 (2016)","journal-title":"Rajshahi Univ. J. Sci. Eng."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94458-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:43:48Z","timestamp":1757457828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94458-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783031944574","9783031944581"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94458-1_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}