{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T04:40:39Z","timestamp":1772253639592,"version":"3.50.1"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100004386","name":"Universiti Malaya","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004386","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01116-x","type":"journal-article","created":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:08:00Z","timestamp":1758809280000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A panoramic survey of the advanced encryption standard: from architecture to security analysis, key management, real-world applications, and post-quantum challenges"],"prefix":"10.1007","volume":"24","author":[{"given":"Rahoul","family":"Ganesh","sequence":"first","affiliation":[]},{"given":"Burhan Ul Islam","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Abdul Raouf","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Amirrudin Bin","family":"Kamsin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"1116_CR1","doi-asserted-by":"publisher","unstructured":"Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Lect. Notes Comput. Sci. 1820, 277\u2013284 (1998). https:\/\/doi.org\/10.1007\/10721064_26","DOI":"10.1007\/10721064_26"},{"key":"1116_CR2","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology: Advanced Encryption Standard (AES): (2023). Available at: https:\/\/doi.org\/10.6028\/nist.fips.197-upd1","DOI":"10.6028\/nist.fips.197-upd1"},{"key":"1116_CR3","doi-asserted-by":"publisher","first-page":"p21","DOI":"10.6028\/nist.ir.8319","volume":"8319","author":"N Mouha","year":"2021","unstructured":"Mouha, N.: Review of the advanced encryption standard. Nat. Inst. Stand. Technol. Interag. Or. Intern. Rep. 8319, 21 (2021). https:\/\/doi.org\/10.6028\/nist.ir.8319","journal-title":"Nat. Inst. Stand. Technol. Interag. Or. Intern. Rep."},{"issue":"3","key":"1116_CR4","doi-asserted-by":"publisher","first-page":"404","DOI":"10.26483\/ijarcs.v8i3.3025","volume":"8","author":"S Rao","year":"2017","unstructured":"Rao, S., Mahto, D., Yadav, D., Khan, D.: The AES-256 cryptosystem resists quantum attacks. Int. J. Adv. Res. Comput. Sci. 8(3), 404\u2013408 (2017). https:\/\/doi.org\/10.26483\/ijarcs.v8i3.3025","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"issue":"3","key":"1116_CR5","doi-asserted-by":"publisher","first-page":"511","DOI":"10.6028\/jres.106.023","volume":"106","author":"J Nechvatal","year":"2001","unstructured":"Nechvatal, J., et al.: Report on the development of the advanced encryption standard (AES). J. Res. Natl. Inst. Stand. Technol. 106(3), 511\u2013577 (2001). https:\/\/doi.org\/10.6028\/jres.106.023","journal-title":"J. Res. Natl. Inst. Stand. Technol."},{"key":"1116_CR6","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-77360-3_6","volume-title":"Selected Areas in Cryptography \u2013 SAC 2007, Lecture Notes in Computer Science","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov, A.: Improved side-channel collision attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) Selected Areas in Cryptography \u2013 SAC 2007, Lecture Notes in Computer Science, vol. 4876, pp. 84\u201395. Springer, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77360-3_6"},{"key":"1116_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-32946-3_23","volume-title":"Financial Cryptography and Data Security \u2013 FC 2012, Lecture Notes in Computer Science","author":"M Wei\u00df","year":"2012","unstructured":"Wei\u00df, M., Heinz, B., Stumpf, F.: A cache timing attack on AES in virtualization environments. In: Keromytis, A.D. (ed.) Financial Cryptography and Data Security \u2013 FC 2012, Lecture Notes in Computer Science, vol. 7397, pp. 314\u2013328 (2012). Springer, Berlin, Heidelberg https:\/\/doi.org\/10.1007\/978-3-642-32946-3_23"},{"key":"1116_CR8","doi-asserted-by":"publisher","DOI":"10.48550\/arxiv.2008.03290","author":"A Jain","year":"2020","unstructured":"Jain, A.: U Guin A novel tampering attack on AES cores with hardware Trojans. ArXiv Preprint arXiv:2008 03290 (2020). https:\/\/doi.org\/10.48550\/arxiv.2008.03290","journal-title":"ArXiv Preprint arXiv:2008 03290"},{"key":"1116_CR9","doi-asserted-by":"publisher","unstructured":"Yuan, Y., Yang, Y., Wu, L., Zhang, X.: A high-performance encryption system based on AES algorithm with novel hardware implementation. In: IEEE Int. Conf. Electron Devices and Solid State Circuits (EDSSC), Shenzhen, China, pp. 1\u20132 (2018). https:\/\/doi.org\/10.1109\/EDSSC.2018.8487056","DOI":"10.1109\/EDSSC.2018.8487056"},{"key":"1116_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-29360-8_3","volume-title":"Post-Quantum Cryptography \u2013 PQCrypto 2016","author":"M Grassl","year":"2016","unstructured":"Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying grover\u2019s algorithm to AES: Quantum resource estimates. In: Takagi, T. (ed.) Post-Quantum Cryptography \u2013 PQCrypto 2016. Lecture Notes in Computer Science, vol. 9606, pp. 29\u201343. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_3"},{"key":"1116_CR11","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1504\/IJICS.2024.138494","volume":"23","author":"M Alenezi","year":"2024","unstructured":"Alenezi, M., Alabdulrazzaq, H., Alhatlani, H., Alobaid, F.: On the performance of AES algorithm variants. Int. J. Inf. Comput. Sections\u00a023, 322\u2013337 (2024). https:\/\/doi.org\/10.1504\/IJICS.2024.138494","journal-title":"Int. J. Inf. Comput. Sec"},{"key":"1116_CR12","doi-asserted-by":"publisher","unstructured":"Vishwakarma, A., Singh, B.: Implementation study of AES standard for IoT systems. In: IEEE Global Conf. Comput., Power and Commun. Technol. (GlobConPT), New Delhi, India, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/GlobConPT57482.2022.9938238","DOI":"10.1109\/GlobConPT57482.2022.9938238"},{"key":"1116_CR13","doi-asserted-by":"publisher","first-page":"139","DOI":"10.11648\/j.ajcst.20240704.12","volume":"7","author":"A Gorine","year":"2024","unstructured":"Gorine, A., Suhaib, M.: Exploring AES encryption implementation through quantum computing techniques. Am. J. Comput. Sci. Technol. 7, 139\u2013155 (2024). https:\/\/doi.org\/10.11648\/j.ajcst.20240704.12","journal-title":"Am. J. Comput. Sci. Technol."},{"key":"1116_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5120\/ijca2015907190","volume":"130","author":"O Srinivasa","year":"2015","unstructured":"Srinivasa, O.: Performance analysis of DES and triple DES. Int. J. Comput. Appl. 130, 30\u201334 (2015). https:\/\/doi.org\/10.5120\/ijca2015907190","journal-title":"Int. J. Comput. Appl."},{"key":"1116_CR15","doi-asserted-by":"publisher","unstructured":"Almuhammadi, S., Alhejri, I.: A comparative analysis of AES common modes of operation. In: IEEE 30th Canadian Conf. Elect. Comput. Eng. (CCECE), Windsor, ON, Canada, pp. 1\u20134 (2017). https:\/\/doi.org\/10.1109\/CCECE.2017.7946655","DOI":"10.1109\/CCECE.2017.7946655"},{"key":"1116_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.46586\/tosc.v2019.i2.55-93","volume":"20192","author":"X Bonnetain","year":"2019","unstructured":"Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symm Cryptol. 20192, 55\u201393 (2019). https:\/\/doi.org\/10.46586\/tosc.v2019.i2.55-93","journal-title":"IACR Trans. Symm Cryptol."},{"key":"1116_CR17","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/3-540-36400-5_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2002","author":"JD Goli\u0107","year":"2003","unstructured":"Goli\u0107, J.D., Tymen, C.: Multiplicative masking and power analysis of AES. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 198\u2013212. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_16"},{"key":"1116_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-69453-5_2","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Stebila","year":"2017","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the open quantum safe project. In: Avanzi, R., Heys, H. (eds.) Selected Areas in Cryptography \u2013 SAC 2016. Lecture Notes in Computer Science, vol. 10532, pp. 14\u201337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_2"},{"key":"1116_CR19","doi-asserted-by":"publisher","unstructured":"Sun, B., Liu, M., Guo, J., Qu, L., Rijmen, V.: New insights on AES-like SPN ciphers. In: Robshaw, M. and Katz, J. (eds.) Advances in Cryptology \u2013 CRYPTO 2016, Lecture Notes in Computer Science, vol. 9814, (2016). https:\/\/doi.org\/10.1007\/978-3-662-53018-4_22","DOI":"10.1007\/978-3-662-53018-4_22"},{"key":"1116_CR20","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-25385-0_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011, Lecture Notes in Computer Science","author":"A Bogdanov","year":"2011","unstructured":"Bogdanov, A., Khovratovich, D., Rechberger, C.: Biclique cryptanalysis of the full AES. In: Lee, D., Wang, X. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2011, Lecture Notes in Computer Science, vol. 7073, pp. 344\u2013371. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_19"},{"key":"1116_CR21","doi-asserted-by":"publisher","first-page":"02007","DOI":"10.1051\/e3sconf\/202450102007","volume":"501","author":"GU Jurayev","year":"2024","unstructured":"Jurayev, G.U., Bozorov, A.X., Boykoziyev: Round key formation algorithm for symmetric block encryption algorithms. E3S Web Conf. 501, 02007 (2024). https:\/\/doi.org\/10.1051\/e3sconf\/202450102007","journal-title":"E3S Web Conf."},{"key":"1116_CR22","doi-asserted-by":"publisher","unstructured":"Fouque, P.-A., Jean, J., Peyrin, T.: Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128. In: Canetti, R. and Garay, J.A. (eds.) Advances in Cryptology \u2013 CRYPTO 2013, Lecture Notes in Computer Science, vol. 8042, (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_11","DOI":"10.1007\/978-3-642-40041-4_11"},{"key":"1116_CR23","doi-asserted-by":"publisher","DOI":"10.20944\/preprints202009.0302.v1","author":"TX Meng","year":"2020","unstructured":"Meng, T.X., Buchanan, W.: Lightweight cryptographic algorithms on resource-constrained devices. Preprint. (2020). https:\/\/doi.org\/10.20944\/preprints202009.0302.v1","journal-title":"Preprint"},{"issue":"9","key":"1116_CR24","doi-asserted-by":"publisher","first-page":"627","DOI":"10.14569\/ijacsa.2024.0150964","volume":"15","author":"D Swetha","year":"2024","unstructured":"Swetha, D., Mohiddin, S.K.: Advancing quantum cryptography algorithms for secure data storage and processing in cloud computing: Enhancing robustness against emerging cyber threats. Int. J. Adv. Comput. Sci. Appl. 15(9), 627\u2013637 (2024). https:\/\/doi.org\/10.14569\/ijacsa.2024.0150964","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"8","key":"1116_CR25","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.24996\/ijs.2021.62.8.29","volume":"62","author":"MS Fadhil","year":"2021","unstructured":"Fadhil, M.S., Farhan, A.K., Fadhil, M.N.: A lightweight AES algorithm implementation for a secure IoT environment. Iraqi J. Sci. 62(8), 2759\u20132770 (2021). https:\/\/doi.org\/10.24996\/ijs.2021.62.8.29","journal-title":"Iraqi J. Sci."},{"key":"1116_CR26","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/s00145-010-9073-y","volume":"24","author":"M Liskov","year":"2011","unstructured":"Liskov, M., Rivest, R.L., Wagner, D.: Tweakable block ciphers. J. Cryptol. 24, 588\u2013613 (2011). https:\/\/doi.org\/10.1007\/s00145-010-9073-y","journal-title":"J. Cryptol."},{"key":"1116_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009. ASIACRYPT 2009. Lecture Notes in Computer Science","author":"A Biryukov","year":"2009","unstructured":"Biryukov, A., Khovratovich, D.: Related-Key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) Advances in Cryptology \u2013 ASIACRYPT 2009. ASIACRYPT 2009. Lecture Notes in Computer Science, vol. 5912. Springer, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_1"},{"key":"1116_CR28","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-13190-5_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Biryukov","year":"2010","unstructured":"Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A.: Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds. In: Gilbert, H. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 299\u2013319. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_15"},{"key":"1116_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_3","volume-title":"Information Security and Privacy. ACISP 2015. Lecture Notes in Computer Science ()","author":"B Tao","year":"2015","unstructured":"Tao, B., Wu, H.: Improving the biclique cryptanalysis of AES. In: Foo, E., Stebila, D. (eds.) Information Security and Privacy. ACISP 2015. Lecture Notes in Computer Science (), vol. 9144. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19962-7_3"},{"key":"1116_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45882-8_24","volume-title":"Internet of Things. Advances in Information and Communication Technology","author":"A Ghimire","year":"2024","unstructured":"Ghimire, A., Baligodugula, V.V., Amsaad, F.: Power analysis side-channel attacks on same and cross-device settings: A survey of machine learning techniques. In: Puthal, D., Mohanty, S., Choi, B.Y. (eds.) Internet of Things. Advances in Information and Communication Technology, vol. 684. Springer, Cham, Switzerland (2024). https:\/\/doi.org\/10.1007\/978-3-031-45882-8_24"},{"key":"1116_CR31","doi-asserted-by":"publisher","unstructured":"Liao, X., Zhang, H., Koshimura, M.: Reconstructing AES key schedule images with SAT and MaxSAT. IEICE Trans. Inf. Syst. E99 D, 141\u2013150 (2016). https:\/\/doi.org\/10.1587\/transinf.2015EDP7223","DOI":"10.1587\/transinf.2015EDP7223"},{"key":"1116_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.300325","volume":"16","author":"H Grari","year":"2022","unstructured":"Grari, H., Zine-Dine, K., Azouaoui, A., Lamzabi, S.: Deep learning-based cryptanalysis of a simplified AES cipher. Int. J. Inf. Secur. Priv. 16, 1\u201316 (2022). https:\/\/doi.org\/10.4018\/IJISP.300325","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"1116_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/23742917.2016.1231523","volume":"1","author":"O Lo","year":"2016","unstructured":"Lo, O., Buchanan, W., Carson, D.: Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). J. Cyber Secur. Technol. 1, 1\u201320 (2016). https:\/\/doi.org\/10.1080\/23742917.2016.1231523","journal-title":"J. Cyber Secur. Technol."},{"key":"1116_CR34","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Petkova-Nikova, S., Nikov, V.: Glitch-stopping circuits: Hardware secure masking without registers. In: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201924), Salt Lake City, UT, USA, pp. 3406\u20133420 (2024). https:\/\/doi.org\/10.1145\/3658644.3670335","DOI":"10.1145\/3658644.3670335"},{"key":"1116_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47363\/JMCA\/2023(2)140","volume":"2","author":"PS Emmanni","year":"2023","unstructured":"Emmanni, P.S.: The impact of quantum computing on cybersecurity. J. Math. Comput. Appl. 2, 1\u20134 (2023). https:\/\/doi.org\/10.47363\/JMCA\/2023(2)140","journal-title":"J. Math. Comput. Appl."},{"key":"1116_CR36","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.62441\/nano-ntp.v20iS13.79","volume":"20","author":"S Khan","year":"2024","unstructured":"Khan, S., Palani, K., Goswami, M., Rakhimjonovna, F., Mohammed, S., Menaga, D.: Quantum computing and its implications for cybersecurity: A comprehensive review of emerging threats and defenses. Nanotechnol Percep. 20, 1232\u20131248 (2024). https:\/\/doi.org\/10.62441\/nano-ntp.v20iS13.79","journal-title":"Nanotechnol Percep"},{"key":"1116_CR37","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2311.14845","author":"P Hillmann","year":"2023","unstructured":"Hillmann, P.: Lightweight public key encryption in post-quantum computing era. ArXiv Preprint arXiv:2311 14845. (2023). https:\/\/doi.org\/10.48550\/arXiv.2311.14845","journal-title":"ArXiv Preprint arXiv:2311 14845"},{"key":"1116_CR38","doi-asserted-by":"publisher","unstructured":"Grassl, M., Langenberg, B., Roetteler, M.: and R. Steinwandt.: Applying Grover\u2019s algorithm to AES: Quantum resource estimates. In: Proc. 7th Int. Conf. Post-Quantum CryptographyPQCrypto pp. 29\u201343, (2016). (2016). https:\/\/doi.org\/10.48550\/arXiv.1512.04965","DOI":"10.48550\/arXiv.1512.04965"},{"key":"1116_CR39","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-031-31034-8_12","volume-title":"Hardware Security Training, Hands-on and Hands-off","author":"M Tehranipoor","year":"2023","unstructured":"Tehranipoor, M., Anandakumar, N.N., Farahmandi, F.: Voltage glitch attack on an FPGA AES implementation. In: Hardware Security Training, Hands-on and Hands-off, pp. 267\u2013285. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-31034-8_12"},{"key":"1116_CR40","doi-asserted-by":"publisher","unstructured":"Sriniwas Shastry, P.V., Kulkarni, A., Sutaone, M.S.: ASIC implementation of AES. In: 2012 Annual IEEE India Conference (INDICON), Kochi, India, pp. 1255\u20131259 (2012). https:\/\/doi.org\/10.1109\/INDCON.2012.6420811","DOI":"10.1109\/INDCON.2012.6420811"},{"key":"1116_CR41","doi-asserted-by":"publisher","unstructured":"De Santis, F., Schauer, A., Sigl, G.: ChaCha20-Poly1305 authenticated encryption for high-speed embedded IoT applications. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), Lausanne, Switzerland, pp. 692\u2013697 (2017). https:\/\/doi.org\/10.23919\/DATE.2017.7927078","DOI":"10.23919\/DATE.2017.7927078"},{"key":"1116_CR42","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-63697-9_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2017","author":"T Ashur","year":"2017","unstructured":"Ashur, T., Dunkelman, O., Luykx, A.: Boosting authenticated encryption robustness with minimal modifications. In: Advances in Cryptology \u2013 CRYPTO 2017. Lecture Notes in Computer Science, vol. 10403, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-63697-9_1"},{"key":"1116_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v0.i0.0-0","volume":"1","author":"S Dey","year":"2016","unstructured":"Dey, S., Garai, H.K., Maitra, S.: Cryptanalysis of reduced round ChaCha \u2013 new attack & deeper analysis. IACR Trans. Symm Cryptol. 1, 1 (2016). https:\/\/doi.org\/10.46586\/tosc.v0.i0.0-0","journal-title":"IACR Trans. Symm Cryptol."},{"issue":"3","key":"1116_CR44","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1080\/19393551003657019","volume":"19","author":"C Gikas","year":"2010","unstructured":"Gikas, C.: A general comparison of FISMA, HIPAA, ISO 27000 and PCI-DSS standards. Inf. Secur. J.: Glob Perspect. 19(3), 132\u2013141 (2010). https:\/\/doi.org\/10.1080\/19393551003657019","journal-title":"Inf. Secur. J.: Glob Perspect."},{"key":"1116_CR45","doi-asserted-by":"publisher","unstructured":"Golightly, L., Wnuk, K., Shanmugan, N., Shaban, A., Longstaff, J., Chang, V.: Towards a working conceptual framework: Cyber law for data privacy and information security management for the Industrial Internet of Things application domain. In: Proceedings of the 2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), Beijing, China, pp. 86\u201394 (2022). https:\/\/doi.org\/10.1109\/IIoTBDSC57192.2022.00027","DOI":"10.1109\/IIoTBDSC57192.2022.00027"},{"key":"1116_CR46","doi-asserted-by":"publisher","unstructured":"Liu, S., Li, Y., Jin, Z.: Research on enhanced AES algorithm based on key operations. In: 2023 IEEE 5th Int. Conf. on Civil Aviation Safety and Information Technology (ICCASIT), Dali, China, pp. 318\u2013322 (2023). https:\/\/doi.org\/10.1109\/ICCASIT58768.2023.10351719","DOI":"10.1109\/ICCASIT58768.2023.10351719"},{"issue":"3","key":"1116_CR47","doi-asserted-by":"publisher","first-page":"113","DOI":"10.3390\/e19030113","volume":"19","author":"T Yoo","year":"2017","unstructured":"Yoo, T., Kang, J.-S., Yeom, Y.: Recoverable random numbers in an internet of things operating system. Entropy. 19(3), 113 (2017). https:\/\/doi.org\/10.3390\/e19030113","journal-title":"Entropy"},{"key":"1116_CR48","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-46800-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015, Lecture Notes in Computer Science","author":"T Shrimpton","year":"2015","unstructured":"Shrimpton, T., Terashima, R.S.: A provable-security analysis of intel\u2019s secure key RNG. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2015, Lecture Notes in Computer Science, vol. 9056, pp. 93\u2013118. Springer, Berlin, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_4"},{"key":"1116_CR49","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90Ar1","author":"E Barker","year":"2015","unstructured":"Barker, E., Kelsey, J.: Recommendation for random number generation using deterministic random bit generators. NIST Spec. Publ 800-90A Rev. 1. (2015). https:\/\/doi.org\/10.6028\/NIST.SP.800-90Ar1","journal-title":"NIST Spec. Publ 800-90A Rev. 1"},{"key":"1116_CR50","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-32009-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"T Jager","year":"2012","unstructured":"Jager, T., Kohlar, F., Sch\u00e4ge, S., Schwenk, J.: On the security of TLS-DHE in the standard model. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2012. Lecture Notes in Computer Science, vol. 7417, pp. 273\u2013293. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_17"},{"key":"1116_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92708-0_18","volume-title":"Network and System Security (NSS 2021), Lecture Notes in Computer Science","author":"M Hedabou","year":"2021","unstructured":"Hedabou, M.: Cloud key management based on verifiable secret sharing. In: Network and System Security (NSS 2021), Lecture Notes in Computer Science, vol. 13041. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92708-0_18"},{"issue":"5","key":"1116_CR52","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3390\/sym11050669","volume":"11","author":"MU Aftab","year":"2019","unstructured":"Aftab, M.U., Qin, Z., Teo, S.T.H., Khan, S.U.: Permission-based separation of duty in dynamic role-based access control model. Symmetry. 11(5), 669 (2019). https:\/\/doi.org\/10.3390\/sym11050669","journal-title":"Symmetry"},{"key":"1116_CR53","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-030-17982-3_18","volume-title":"Lecture Notes in Computer Science","author":"H An","year":"2019","unstructured":"An, H., Choi, R., Kim, K.: Blockchain-based decentralized key management system with quantum resistance. In: Choon, C., Sok, N. (eds.) Lecture Notes in Computer Science, vol. 11402, pp. 265\u2013278. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17982-3_18"},{"key":"1116_CR54","doi-asserted-by":"publisher","unstructured":"Gomes, A., Santos, C., Wanzeller, C., Martins, P.: Database encryption for balance between performance and security. J. Inf. Assur. Cybersec. 1\u20139 (2021). https:\/\/doi.org\/10.5171\/2021.614511","DOI":"10.5171\/2021.614511"},{"key":"1116_CR55","doi-asserted-by":"publisher","unstructured":"Ashiru, A., Yarima, K.I., Isah, U., Chandra, S.: High speed VPN using enhanced AES algorithm. Int. J. Eng. Res. Technol. 4 (2015). https:\/\/doi.org\/10.17577\/IJERTV4IS030753","DOI":"10.17577\/IJERTV4IS030753"},{"key":"1116_CR56","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-68385-0_9","volume-title":"Intelligent Systems Technologies and Applications (ISTA 2017)","author":"B Arunkumar","year":"2018","unstructured":"Arunkumar, B., Kousalya, G.: Analysis of AES-GCM cipher suites in TLS. In: Thampi, S., Mitra, S., Mukhopadhyay, J., Li, K.C., James, A., Berretti, S. (eds.) Intelligent Systems Technologies and Applications (ISTA 2017), vol. 683, pp. 99\u2013109. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-68385-0_9"},{"key":"1116_CR57","doi-asserted-by":"publisher","unstructured":"Choon, C., Sok, N.: Open-source VPN software: Performance comparison for remote access. In: Proceedings of the 2022 Int. Conf. on Computer and Information Sciences (ICCIS), pp. 29\u201334 (2022). https:\/\/doi.org\/10.1145\/3561877.3561882","DOI":"10.1145\/3561877.3561882"},{"key":"1116_CR58","doi-asserted-by":"publisher","unstructured":"Donenfeld, J.: WireGuard: Next generation kernel network tunnel. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2017). https:\/\/doi.org\/10.14722\/ndss.2017.23160","DOI":"10.14722\/ndss.2017.23160"},{"key":"1116_CR59","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5120\/11422-6766","volume":"67","author":"A Sachdev","year":"2013","unstructured":"Sachdev, A., Bhansali, M.: Enhancing cloud computing security using AES algorithm. Int. J. Comput. Appl. 67, 19\u201323 (2013). https:\/\/doi.org\/10.5120\/11422-6766","journal-title":"Int. J. Comput. Appl."},{"key":"1116_CR60","doi-asserted-by":"publisher","unstructured":"Akhil, K.M., Kumar, M.P., Pushpa, B.R.: Enhanced cloud data security using AES algorithm. In: 2017 Int. Conf. on Intelligent Computing and Control (I2C2), Coimbatore, India, pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/I2C2.2017.8321820","DOI":"10.1109\/I2C2.2017.8321820"},{"key":"1116_CR61","doi-asserted-by":"publisher","unstructured":"Alkady, Y., Farouk, F., Rizk, R.: Fully homomorphic encryption with AES in cloud computing security. In: Proceedings of the International Conference on Advanced Intelligent Systems and Informatics (AISI 2019) (2019). https:\/\/doi.org\/10.1007\/978-3-319-99010-1_34","DOI":"10.1007\/978-3-319-99010-1_34"},{"key":"1116_CR62","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.35940\/ijeat.A1082.109119","volume":"9","author":"V Nandan","year":"2019","unstructured":"Nandan, V., Rao, K.: An efficient AES algorithm for IoT based applications. Int. J. Eng. Adv. Technol. 9, 1939\u20131944 (2019). https:\/\/doi.org\/10.35940\/ijeat.A1082.109119","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"1116_CR63","doi-asserted-by":"publisher","unstructured":"Mishra, S.K., Cherukuri, C., Dheeraj, P.V., Puthal, D.: A hybrid encryption approach using DNA-based shift protected algorithm and AES for edge-cloud system security. In: 2023 OITS International Conference on Information Technology (OCIT), Raipur, India, pp. 781\u2013786 (2023). https:\/\/doi.org\/10.1109\/OCIT59427.2023.10430653","DOI":"10.1109\/OCIT59427.2023.10430653"},{"key":"1116_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.55041\/IJSREM29484","volume":"08","author":"D Limbachia","year":"2024","unstructured":"Limbachia, D.: Encryption of card details using AES with a 128-bit key: A secure approach to data protection. Int. J. Sci. Res. Eng. Manag. 08, 1\u20135 (2024). https:\/\/doi.org\/10.55041\/IJSREM29484","journal-title":"Int. J. Sci. Res. Eng. Manag"},{"key":"1116_CR65","doi-asserted-by":"publisher","unstructured":"Bonner, E., O\u2019Raw, J., Curran, K.: Implementing the payment card industry (PCI) data security standard (DSS). TELKOMNIKA (Telecommun. Comput. Electron. Control). 9 (2011). https:\/\/doi.org\/10.12928\/telkomnika.v9i2.709","DOI":"10.12928\/telkomnika.v9i2.709"},{"key":"1116_CR66","doi-asserted-by":"publisher","unstructured":"Kim, J., Lee, B.J., Yoo, S.K.: Design of real-time encryption module for secure data protection of wearable healthcare devices. In: 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Osaka, Japan, pp. 2283\u20132286 (2013). https:\/\/doi.org\/10.1109\/EMBC.2013.6609993","DOI":"10.1109\/EMBC.2013.6609993"},{"key":"1116_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_11","volume-title":"Financial Cryptography and Data Security","author":"FB Durak","year":"2021","unstructured":"Durak, F.B., Guajardo, J.: Improving the efficiency of AES protocols in multi-party computation. In: Borisov, N., Diaz, C. (eds.) Financial Cryptography and Data Security. Lecture Notes in Computer Science, vol. 12674. Springer, pp. 11, Berlin, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64322-8_11"},{"key":"1116_CR68","doi-asserted-by":"publisher","unstructured":"Pathak, A., Patil, T., Pawar, S., Raut, P., Khairnar, S.: Secure authentication using zero knowledge proof. In: 2021 Asian Conference on Innovation in Technology (ASIANCON), Pune, India, pp. 1\u20138 (2021). https:\/\/doi.org\/10.1109\/ASIANCON51346.2021.9544807","DOI":"10.1109\/ASIANCON51346.2021.9544807"},{"key":"1116_CR69","doi-asserted-by":"publisher","unstructured":"Gielata, A., Russek, P., Wiatr, K.: AES hardware implementation in FPGA for algorithm acceleration purpose. In: Proceedings of the International Conference on Signals and Electronic Systems (ICSES), pp. 137\u2013140 (2008). https:\/\/doi.org\/10.1109\/ICSES.2008.4673377","DOI":"10.1109\/ICSES.2008.4673377"},{"issue":"3","key":"1116_CR70","doi-asserted-by":"publisher","first-page":"853","DOI":"10.3390\/s24030853","volume":"24","author":"W-C Tsai","year":"2024","unstructured":"Tsai, W.-C.: Field-programmable gate array-based implementation of zero-trust stream data encryption for enabling 6G-narrowband internet of things massive device access. Sensors. 24(3), 853 (2024). https:\/\/doi.org\/10.3390\/s24030853","journal-title":"Sensors"},{"key":"1116_CR71","doi-asserted-by":"publisher","first-page":"26334","DOI":"10.1109\/ACCESS.2024.3351119","volume":"12","author":"MY Shakor","year":"2024","unstructured":"Shakor, M.Y., Khaleel, M.I., Safran, M., Alfarhood, S., Zhu, M.: Dynamic AES encryption and blockchain key management: A novel solution for cloud data security. IEEE Access. 12, 26334\u201326343 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3351119","journal-title":"IEEE Access."},{"key":"1116_CR72","doi-asserted-by":"publisher","unstructured":"Chen, Q.: The application of AES algorithm in intelligent wireless network information security protection system. In: 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), Hassan, India, pp. 1\u20135 (2024). https:\/\/doi.org\/10.1109\/IACIS61494.2024.10721834","DOI":"10.1109\/IACIS61494.2024.10721834"},{"key":"1116_CR73","doi-asserted-by":"publisher","unstructured":"Bavdekar, R., Chopde, E.J., Agrawal, A., Bhatia, A., Tiwari, K.: Post quantum cryptography: A review of techniques, challenges and standardizations. In: 2023 International Conference on Information Networking (ICOIN), Bangkok, Thailand, pp. 146\u2013151 (2023). https:\/\/doi.org\/10.1109\/ICOIN56518.2023.10048976","DOI":"10.1109\/ICOIN56518.2023.10048976"},{"issue":"1","key":"1116_CR74","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.30574\/wjarr.2023.17.1.1449","volume":"17","author":"J Reza","year":"2023","unstructured":"Reza, J., Ali, K.M.Y., Rakibuzzaman, M.S., Islam, M.A.: Investigating data encryption technologies in Securing business information systems. World J. Adv. Res. Rev. 17(1), 1355\u20131362 (2023). https:\/\/doi.org\/10.30574\/wjarr.2023.17.1.1449","journal-title":"World J. Adv. Res. Rev."},{"key":"1116_CR75","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2004, Lecture Notes in Computer Science","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) Cryptographic Hardware and Embedded Systems \u2013 CHES 2004, Lecture Notes in Computer Science, vol. 3156, pp. 16\u201329. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"1116_CR76","doi-asserted-by":"publisher","unstructured":"Kocher, P.-A., et al.: Spectre attacks: Exploiting speculative execution. In: IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, pp. 1\u201319 (2019). https:\/\/doi.org\/10.1109\/SP.2019.00002","DOI":"10.1109\/SP.2019.00002"},{"key":"1116_CR77","doi-asserted-by":"publisher","unstructured":"Moradi, A., Poschmann, A., Ling, S., Paar, C., Wang, H.: Pushing the limits: A very compact and a threshold implementation of AES. In: Lecture Notes in Computer Science, vol. 6632, pp. 69\u201388 (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_6","DOI":"10.1007\/978-3-642-20465-4_6"},{"key":"1116_CR78","doi-asserted-by":"publisher","unstructured":"Bjorkqvist, M., Cachin, C., Engelmann, F., Sorniotti, A.: Scalable key management for distributed cloud storage. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), Orlando, FL, USA, pp. 250\u2013256 (2018). https:\/\/doi.org\/10.1109\/IC2E.2018.00051","DOI":"10.1109\/IC2E.2018.00051"},{"key":"1116_CR79","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s10462-024-10774-7","volume":"57","author":"H Li","year":"2024","unstructured":"Li, H., Ge, L., Tian, L.: Survey: Federated learning data security and privacy-preserving in edge-Internet of things. Artif. Intell. Rev. 57, 130 (2024). https:\/\/doi.org\/10.1007\/s10462-024-10774-7","journal-title":"Artif. Intell. Rev."},{"key":"1116_CR80","doi-asserted-by":"publisher","unstructured":"Dao, M.-H., Hoang, V.-P., Dao, V.-L., Tran, X.-T.: An energy efficient AES encryption core for hardware security implementation in IoT systems. In: Proc. 2018 Int. Conf. on Advanced Technologies for Communications (ATC), pp. 301\u2013304 (2018). https:\/\/doi.org\/10.1109\/ATC.2018.8587500","DOI":"10.1109\/ATC.2018.8587500"},{"issue":"7","key":"1116_CR81","doi-asserted-by":"publisher","first-page":"986","DOI":"10.3390\/e25070986","volume":"25","author":"H Kim","year":"2023","unstructured":"Kim, H., Lim, S., Kang, Y., Kim, W., Kim, D., Yoon, S., Seo, H.: Deep-learning-based cryptanalysis of lightweight block ciphers revisited. Entropy. 25(7), 986 (2023). https:\/\/doi.org\/10.3390\/e25070986","journal-title":"Entropy"},{"key":"1116_CR82","doi-asserted-by":"publisher","unstructured":"Ming, J., Zhou, Y., Li, H., et al.: A secure and highly efficient first-order masking scheme for AES linear operations. Cybersecur. 4(14) (2021). https:\/\/doi.org\/10.1186\/s42400-021-00082-w","DOI":"10.1186\/s42400-021-00082-w"},{"key":"1116_CR83","doi-asserted-by":"publisher","first-page":"365","DOI":"10.13154\/tches.v2020.i4.365-388","volume":"20204","author":"F Unterstein","year":"2020","unstructured":"Unterstein, F., Schink, M., Schamberger, T., Tebelmann, L., Ilg, M., Heyszl, J.: Retrofitting leakage resilient authenticated encryption to microcontrollers. ACR Trans. Cryptogr Hardw. Embedd Syst. 20204, 365\u2013388 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i4.365-388","journal-title":"ACR Trans. Cryptogr Hardw. Embedd Syst."},{"key":"1116_CR84","doi-asserted-by":"publisher","first-page":"101094","DOI":"10.1016\/j.jestch.2022.101094","volume":"34","author":"S Choudhary","year":"2022","unstructured":"Choudhary, S., Gupta, A.: HybridPKE: A forward-secure non-interactive quantum-safe hybrid key exchange scheme. Eng. Sci. Technol. Int. J. 34, 101094 (2022). https:\/\/doi.org\/10.1016\/j.jestch.2022.101094","journal-title":"Eng. Sci. Technol. Int. J."},{"issue":"2","key":"1116_CR85","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MNANO.2022.3141514","volume":"16","author":"M Ma","year":"2022","unstructured":"Ma, M., et al.: Efficient in-memory AES encryption implementation using a general memristive logic: Surmounting the data movement bottleneck. IEEE Nanotechnol Mag. 16(2), 24\u2013C3 (2022). https:\/\/doi.org\/10.1109\/MNANO.2022.3141514","journal-title":"IEEE Nanotechnol Mag"},{"issue":"1","key":"1116_CR86","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/fi17010032","volume":"17","author":"Z Wang","year":"2025","unstructured":"Wang, Z., Zhou, Y.: Analysis and evaluation of intel software guard Extension-based trusted execution environment usage in edge intelligence and internet of things scenarios. Future Internet. 17(1), 32 (2025). https:\/\/doi.org\/10.3390\/fi17010032","journal-title":"Future Internet"},{"key":"1116_CR87","doi-asserted-by":"publisher","first-page":"100847","DOI":"10.1016\/j.measen.2023.100847","volume":"28","author":"D Sowmyadevi","year":"2023","unstructured":"Sowmyadevi, D., Shanmugapriya, I.: Unsupervised machine learning based key management in wireless sensor networks. Meas. Sens. 28, 100847 (2023). https:\/\/doi.org\/10.1016\/j.measen.2023.100847","journal-title":"Meas. Sens."},{"key":"1116_CR88","doi-asserted-by":"publisher","unstructured":"Rawal, B.S., Manogaran, G.: Implementation of a secure multi-cloud storage framework with next-generation cryptosystems and split-protocol. In: 2021 Int. Symp. on Networks, Comput. and Commun. (ISNCC), Dubai, UAE, pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/ISNCC52172.2021.9615811","DOI":"10.1109\/ISNCC52172.2021.9615811"},{"key":"1116_CR89","doi-asserted-by":"publisher","unstructured":"Lavin, R., Liu, X., Mohanty, H., Norman, L., Zaarour, G., Krishnamachari, B.: A survey on the applications of zero-knowledge proofs. In: 2020 Int. Conf. on Innovation and Intelligence for Informatics, Computing and Technol. (3ICT), Sakheer, Bahrain, pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/3ICT51146.2020.9312014","DOI":"10.1109\/3ICT51146.2020.9312014"},{"key":"1116_CR90","doi-asserted-by":"publisher","unstructured":"Wong, M.M., Wong, M.L.D., Zhang, C., Hijazin, I.: Compact and short critical path finite field inverter for cryptographic S-box. In: 2015 IEEE Int. Conf. on Digital Signal Processing (DSP), Singapore, pp. 775\u2013779 (2015). https:\/\/doi.org\/10.1109\/ICDSP.2015.7251981","DOI":"10.1109\/ICDSP.2015.7251981"},{"key":"1116_CR91","doi-asserted-by":"publisher","first-page":"9311","DOI":"10.35940\/ijitee.J9311.0881019","volume":"8","author":"G Nissar","year":"2019","unstructured":"Nissar, G., Kumar, D., Khan, B.: Implementation of security enhancement in AES by inducting dynamicity in AES S-Box. Int. J. Innov. Technol. Exp. Eng. 8, 9311\u20139316 (2019). https:\/\/doi.org\/10.35940\/ijitee.J9311.0881019","journal-title":"Int. J. Innov. Technol. Exp. Eng."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01116-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01116-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01116-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:39:24Z","timestamp":1760614764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01116-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":91,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1116"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01116-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"25 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: the article\u2019s web version is corrected as in the pdf version.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"216"}}