{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:08:14Z","timestamp":1763017694944},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:00:00Z","timestamp":1475884800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0622-2","type":"journal-article","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T03:06:16Z","timestamp":1475895976000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Low Power S-Box Architecture for AES Algorithm using Programmable Second Order Reversible Cellular Automata: An Application to WBAN"],"prefix":"10.1007","volume":"40","author":[{"given":"Bhoopal Rao","family":"Gangadari","sequence":"first","affiliation":[]},{"given":"Shaik Rafi","family":"Ahamed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,8]]},"reference":[{"key":"622_CR1","unstructured":"National Institute of Standards and Technology: FIPS PUB 46-3: Data Encryption Standard (DES). super-sedes FIPS 46-2 (1999)"},{"key":"622_CR2","unstructured":"Advanced Encryption Standard (AES): Federal Information Processing Standards Publication 197 Std. (2001)"},{"key":"622_CR3","unstructured":"IEEE Standard for Local and metropolitan area networks \u2212 Part 15.6: Wireless Body Area Networks, Std."},{"issue":"4","key":"622_CR4","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TC.2006.49","volume":"55","author":"A Hodjat","year":"2006","unstructured":"Hodjat, A., and Verbauwhede, I., Area-throughput trade \u2212offs for fully pipelined 30 to 70 Gbits\/s AES processors. IEEE Trans. Comput. 55(4):366\u2013372, 2006.","journal-title":"IEEE Trans. Comput."},{"key":"622_CR5","doi-asserted-by":"crossref","unstructured":"Kuo, H., and Verbauwhede, I.: Architectural optimization for a 1.82Gbits\/sec VLSI implementation of the AES rijndael algorithm. In: Cryptographic Hardware and Embedded Sys- tems CHES 2001, ser. Lecture Notes in Computer Science, Vol. 2162, pp. 51\u201364. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44709-1_6"},{"issue":"6","key":"622_CR6","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1049\/ip-cds:20050296","volume":"153","author":"H Li","year":"2006","unstructured":"Li, H., Efficient and flexible architecture for AES. IEE Proc. Circ. Devices Syst. 153(6):533\u2013538, 2006.","journal-title":"IEE Proc. Circ. Devices Syst."},{"issue":"9","key":"622_CR7","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/TVLSI.2004.832943","volume":"12","author":"X Zhang","year":"2004","unstructured":"Zhang, X., and Parhi, K., High \u2212speed VLSI architectures for the AES algorithm. IEEE Trans. Very Large Scale Integrat. (VLSI) Syst. 12(9):957\u2013967, 2004.","journal-title":"IEEE Trans. Very Large Scale Integrat. (VLSI) Syst."},{"issue":"10","key":"622_CR8","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/TCSII.2006.882217","volume":"53","author":"X Zhang","year":"2006","unstructured":"Zhang, X., and Parhi, K.K., On the optimum constructions of composite field for the AES algorithm. IEEE Trans. Circ. Syst. II: Express Briefs 53(10):1153\u20131157, 2006.","journal-title":"IEEE Trans. Circ. Syst. II: Express Briefs"},{"issue":"7","key":"622_CR9","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TVLSI.2004.830936","volume":"12","author":"S Morioka","year":"2004","unstructured":"Morioka, S., and Satoh, A., A 10 \u2212Gbps full \u2212AES crypto design with a twisted BDD S \u2212Box architecture. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 12(7):686\u2013691, 2004.","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"622_CR10","doi-asserted-by":"crossref","unstructured":"Morioka, S, and Satoh, A: An optimized S \u2212Box circuit architecture for low power AES design. In: Cryptographic Hardware and Embedded Systems \u2212 CHES 2002, ser. Lecture Notes in Computer Science, Vol. 2523, pp. 172\u2013186. Springer, Berlin (2003)","DOI":"10.1007\/3-540-36400-5_14"},{"key":"622_CR11","doi-asserted-by":"crossref","unstructured":"Shastry, P., Somani, N., Gadre, A., Vispute, B., Su- taone, M.: Rolled architecture based implementation of AES using T \u2212Box. In: IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 626-630 (2012)","DOI":"10.1109\/MWSCAS.2012.6292098"},{"issue":"6","key":"622_CR12","doi-asserted-by":"crossref","first-page":"2605","DOI":"10.1007\/s00034-013-9568-5","volume":"32","author":"H Kapoor","year":"2013","unstructured":"Kapoor, H., Rao, G., Arshi, S., Trivedi, G., A security framework for NoC using authenticated encryption and session keys. Circ. Syst. Signal Process 32(6):2605\u20132622, 2013.","journal-title":"Circ. Syst. Signal Process"},{"issue":"5","key":"622_CR13","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1007\/s10916-011-9669-2","volume":"35","author":"G Selimis","year":"2011","unstructured":"Selimis, G., Huang, L., Massle, F., Tsekoura, I., Ashouei, M., Catthoor, F., Huisken, J., Stuyt, J., Dolmans, G., Penders, J., De Groot, H., A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design. J. Med. Syst. 35(5):1289\u20131298, 2011.","journal-title":"J. Med. Syst."},{"issue":"3","key":"622_CR14","first-page":"1065","volume":"36","author":"S Ullah","year":"2012","unstructured":"Ullah, S., Higgins, H., Braem, B., Latre, B., Blondia, C., Moerman, I., Saleem, S., Rahman, Z., Kwak, K. S., A comprehensive survey of wireless body area networks. Comprehen. Survey Wireless Body Area Netw. 36(3):1065\u20131094, 2012.","journal-title":"Comprehen. Survey Wireless Body Area Netw."},{"issue":"1","key":"622_CR15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"Al Ameen, M., Liu, J., Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1):93\u2013101, 2012.","journal-title":"J. Med. Syst."},{"issue":"9","key":"622_CR16","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"C Hu","year":"2013","unstructured":"Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X., Body area network security: A fuzzy attribute-based signcryption scheme. IEEE J. Select. Areas Commun. 31(9):37\u201346, 2013.","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"2","key":"622_CR17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1049\/iet-ifs:20070078","volume":"2","author":"B Bahrak","year":"2008","unstructured":"Bahrak, B., and Aref, M.R., Impossible differential attack on seven-round aes-128. IET Inf. Secur. 2(2): 28\u201332, 2008.","journal-title":"IET Inf. Secur."},{"key":"622_CR18","doi-asserted-by":"crossref","unstructured":"Bechtsoudis, A., and Sklavos, N.: Side channel attacks cryptanalysis against block ciphers based on FPGA devices. In: 2010 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pp. 460\u2013461 (2006)","DOI":"10.1109\/ISVLSI.2010.104"},{"issue":"5","key":"622_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0235-1","volume":"39","author":"BB Zaidan","year":"2015","unstructured":"Zaidan, B. B., Haiqi, A., Zaidan, A. A., Abdulnabi, M., Kiah, M. L. M., Muzamel, H., A security framework for nationwide health information exchange based on telehealth strategy. J. Med. Syst. 39(5):1\u201319, 2015.","journal-title":"J. Med. Syst."},{"key":"622_CR20","doi-asserted-by":"crossref","unstructured":"Szaban, M., Nowacki, J., Drabik, A., Seredynski, F., Bouvry, P.: Application of cellular automata in symmetric key cryptography. In: Advances in Information Technology, ser. Communications in Computer and Information Science, Vol. 114, pp. 154\u2013163. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-16699-0_17"},{"issue":"12","key":"622_CR21","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/12.338094","volume":"43","author":"S Nandi","year":"1994","unstructured":"Nandi, S., Kar, B., Pal Chaudhuri, P., Theory and applications of cellular automata in cryptography. IEEE Trans. Comput. 43(12):1346\u20131357, 1994.","journal-title":"IEEE Trans. Comput."},{"key":"622_CR22","unstructured":"A New Kind of Science. Champaign, Ilinois, US, United States: Wolfram Media Inc., 2002"},{"key":"622_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, S., Sharma, V., Mahapatra, K.: An improved VLSI architecture of S-box for AES encryption. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp. 753\u2013756 (2013)","DOI":"10.1109\/CSNT.2013.161"},{"issue":"3","key":"622_CR24","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/0097-3165(76)90024-8","volume":"20","author":"O Rothaus","year":"1976","unstructured":"Rothaus, O., On bent functions. J. Comb. Theory, Series A 20(3):300\u2013305, 1976.","journal-title":"J. Comb. Theory, Series A"},{"key":"622_CR25","doi-asserted-by":"crossref","unstructured":"Webster, A., and Tavares, S.: On the design of S-Boxes. In: Williams, H. (Ed.) Advances in Cryptology CRYPTO 85 Proceedings, ser. Lecture Notes in Computer Science, Vol. 218, pp. 523\u2013534. Springer, Berlin (1986)","DOI":"10.1007\/3-540-39799-X_41"},{"key":"622_CR26","doi-asserted-by":"crossref","unstructured":"Adams, C., and Tavares, S.: good S-Boxes are easy to find. In: Advances in Cryptology \u2019CRYPTO\u2019 Proceedings, ser. Lecture Notes in Computer Science, Vol. 435, pp. 612\u2013615. Springer, New York (1990)","DOI":"10.1007\/0-387-34805-0_56"},{"issue":"11","key":"622_CR27","first-page":"2389","volume":"13","author":"I Hussain","year":"2011","unstructured":"Hussain, I., Shah, T., Gondal, M. A., Khan, W. A., Construction of cryptographically strong 8x8 S-boxes 1. World Appl. Sci. J. 13(11):2389\u20132395, 2011.","journal-title":"World Appl. Sci. J."},{"issue":"3","key":"622_CR28","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/BF03037656","volume":"23","author":"JA Clark","year":"2005","unstructured":"Clark, J. A., Jacob, J. L., Stepney, S., The design of S\u2013 boxes by simulated annealing. New Gen. Comput. 23(3):219\u2013231, 2005.","journal-title":"New Gen. Comput."},{"key":"622_CR29","doi-asserted-by":"crossref","unstructured":"Millan, W.: How to improve the nonlinearity of bijective S-Boxes. In: Proceedings of the Third Australasian Conference on Information Security and Privacy, ser. ACISP \u201998, pp. 181\u2013192. Springer\u2013Verlag, London (1998)","DOI":"10.1007\/BFb0053732"},{"issue":"1","key":"622_CR30","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1504\/IJICA.2007.013404","volume":"1","author":"N Nedjah","year":"2007","unstructured":"Nedjah, N., and Mourelle, L. d. M., Designing substitution boxes for secure ciphers. Int. J. Innov. Comput. Appl. 1(1):86\u201391, 2007.","journal-title":"Int. J. Innov. Comput. Appl."},{"key":"622_CR31","doi-asserted-by":"crossref","unstructured":"Kim, M., Ryou, J., Choi, Y., Jun, S.: Low power AES hardware architecture for radio frequency identification. In: Advances in Information and Computer Security, ser. Lecture Notes in Computer Science, Vol. 4266, pp. 353\u2013363. Springer, Berlin (2006)","DOI":"10.1007\/11908739_25"},{"issue":"1","key":"622_CR32","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TVLSI.2005.863188","volume":"44","author":"Y Eslami","year":"2006","unstructured":"Eslami, Y., Sheikholeslami, A., Gulak, P., Masui, S., Mukaida, K., An area\u2013efficient universal cryptography processor for smart cards. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 44(1):43\u201356, 2006.","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst."},{"key":"622_CR33","doi-asserted-by":"crossref","unstructured":"Sharma, T., and Thilagavathy, R.: Performance analysis of advanced encryption standard for low power and area applications. In: 2013 IEEE Conference on Information Communication Technologies (ICT),, pp. 967\u2013972 (2013)","DOI":"10.1109\/CICT.2013.6558236"},{"key":"622_CR34","doi-asserted-by":"crossref","unstructured":"Kaps, J.\u2013P., and Sunar, B.: Energy comparison of AES and SHA\u20131 for ubiquitous computing. In: Emerging Directions in Embedded and Ubiquitous Computing, ser. Lecture Notes in Computer Science, Vol. 4097, pp. 372\u2013381. Springer , Berlin (2006)","DOI":"10.1007\/11807964_38"},{"key":"622_CR35","doi-asserted-by":"crossref","unstructured":"Satoh, A., Morioka, S., Takano, K., Munetoh, S.: A compact Rijndael hardware architecture with S\u2013Box optimization. In: Advances in Cryptology ASIACRYPT 2001, Vol. 2248, pp. 239\u2013254","DOI":"10.1007\/3-540-45682-1_15"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0622-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0622-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0622-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T07:14:04Z","timestamp":1568445244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0622-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,8]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["622"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0622-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,8]]},"article-number":"257"}}