{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:56:43Z","timestamp":1774353403096,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-018-6801-z","type":"journal-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T20:56:56Z","timestamp":1541451416000},"page":"32633-32657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":113,"title":["Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications"],"prefix":"10.1007","volume":"78","author":[{"given":"Norah","family":"Alassaf","sequence":"first","affiliation":[]},{"given":"Adnan","family":"Gutub","sequence":"additional","affiliation":[]},{"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]},{"given":"Manal","family":"Al Ghamdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"issue":"2","key":"6801_CR1","doi-asserted-by":"crossref","first-page":"50","DOI":"10.46565\/jreas.2017.v02i02.002","volume":"2","author":"N AlAssaf","year":"2017","unstructured":"AlAssaf N, AlKazemi B, Gutub A (2017) Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems. Journal of Research in Engineering and Applied Sciences (JREAS) 2(2):50\u201358","journal-title":"Journal of Research in Engineering and Applied Sciences (JREAS)"},{"issue":"1","key":"6801_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.20448\/808.2.1.9.18","volume":"2","author":"N Alharthi","year":"2017","unstructured":"Alharthi N, Gutub A (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research 2(1):9\u201318. https:\/\/doi.org\/10.20448\/808.2.1.9.18","journal-title":"Scientific Modelling and Research"},{"key":"6801_CR3","doi-asserted-by":"crossref","unstructured":"Alizadeh J, AlKhzaimi H, Aref MR, Bagheri N, Gauravaram P, Kumar A, Lauridsen M, Sanadhya S (2014) Cryptanalysis of SIMON Variants with Connections. International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec), Lecture Notes in Computer Science Vol. 8651, pp. 90\u2013107, Springer","DOI":"10.1007\/978-3-319-13066-8_6"},{"key":"6801_CR4","doi-asserted-by":"crossref","unstructured":"Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University - Computer and Information Sciences, Published by Elsevier","DOI":"10.1016\/j.jksuci.2018.02.006"},{"key":"6801_CR5","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1016\/j.procs.2014.05.545","volume":"32","author":"S Aly","year":"2014","unstructured":"Aly S, AlGhamdi T, Salim M, Amin H, Gutub A (2014) Information Gathering Schemes for Collaborative Sensor Devices. Procedia Computer Science, Elsevier 32:1141\u20131146","journal-title":"Procedia Computer Science"},{"key":"6801_CR6","doi-asserted-by":"crossref","unstructured":"Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2015) The SIMON and SPECK lightweight block ciphers. Proceedings of the 52nd Annual Design Automation Conference (DAC '15). ACM, New York","DOI":"10.1145\/2744769.2747946"},{"key":"6801_CR7","unstructured":"Beaulieu R, Shors D, Smith J, Clark ST, Weeks B, Wingers L (2017) Notes on the design and analysis of SIMON and SPECK. IACR Cryptology ePrint Archive 560"},{"key":"6801_CR8","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) S and S: Block Ciphers for the Internet of Things. IACR Cryptography ePrint Archive"},{"key":"6801_CR9","doi-asserted-by":"crossref","unstructured":"Ciabattoni L, Freddi A, Longhi S, Monteri\u00f9 A, Pepa L, Prist M (2016) An open and modular hardware node for wireless sensor and body area networks. Journal of Sensors","DOI":"10.1155\/2016\/2978073"},{"key":"6801_CR10","unstructured":"Daemen J, Rijmen V (1999) AES proposal: Rijndael"},{"key":"6801_CR11","unstructured":"Dandekar AK, Pradhan S, Ghormade S (2016) Design of AES-512 algorithm for communication network. IRJET-International Research Journal of Engineering and Technology 3(5)"},{"key":"6801_CR12","unstructured":"Dinu D, Corre YL, Khovratovich D, Perrin L, Gro\u00dfsch\u00e4dl J, Biryukov A (2015) Triathlon of Lightweight Block Ciphers for the Internet of Things. IACR Cryptology ePrint Archive, 209"},{"issue":"3","key":"6801_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jksuci.2015.11.001","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Elminir H, Riad A, Yuan X (2016) A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences 28(3):262\u2013275","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"6801_CR14","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Gonz\u00e1lez GR, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596\u201320608","journal-title":"IEEE Access"},{"key":"6801_CR15","doi-asserted-by":"crossref","unstructured":"Elhoseny M, Hosny A, Hassanien AE, Muhammad K, Sangaiah AK (2017) Secure automated forensic investigation for sustainable critical infrastructures compliant with green computing requirements. IEEE Transactions on Sustainable Computing","DOI":"10.1109\/TSUSC.2017.2782737"},{"issue":"13","key":"6801_CR16","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1002\/sec.1459","volume":"9","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny M, Yuan X, El-Minir HK, Riad AM (2016) An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks 9(13):2024\u20132031","journal-title":"Security and Communication Networks"},{"issue":"2","key":"6801_CR17","doi-asserted-by":"publisher","first-page":"130306","DOI":"10.1007\/s11467-017-0717-3","volume":"13","author":"A Farouk","year":"2018","unstructured":"Farouk A, Batle J, Elhoseny M, Naseri M, Lone M, Fedorov A, Alkhambashi M, Ahmed SH, Abdel-Aty M (2018) Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states. Front Phys 13(2):130306","journal-title":"Front Phys"},{"key":"6801_CR18","unstructured":"Ghouti L, Ibrahim MK, Gutub AA (2013) Method of Performing Elliptic Polynomial Cryptography with Elliptic Polynomial Hopping. USPTO: United States Patents & Trademark Office, Patent number: US_8385541, Filing date: Feb 18, 2010, Patent Issue date: Feb 26"},{"key":"6801_CR19","doi-asserted-by":"crossref","unstructured":"Gulcan E, Aysu A, Schaumont P (2014) A Flexible and Compact Hardware Architecture for The SIMON Block Cipher. Third International Workshop on Lightweight Cryptography for Security and Privacy: LightSec 2014, PP. 34\u201350. Istanbul","DOI":"10.1007\/978-3-319-16363-5_3"},{"key":"6801_CR20","unstructured":"Gutub A (2003) High Speed Low Power GF(2k) Elliptic Curve Cryptography Processor Architecture. IEEE 10th Annual Technical Exchange Meeting, KFUPM, Dhahran"},{"issue":"3A","key":"6801_CR21","first-page":"44","volume":"6","author":"A Gutub","year":"2006","unstructured":"Gutub A (2006) Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture. International Journal of Computer Science and Network Security (IJCSNS) 6(3A):44\u201352","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"6801_CR22","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-22170-5_9","volume-title":"Software Engineering and Computer Systems","author":"Adnan Abdul-Aziz Gutub","year":"2011","unstructured":"Gutub A (2011) Subthreshold SRAM Designs for Cryptography Security Computations. In: ICSECS 2011 - 2nd International Conference on Software Engineering and Computer Systems, Universiti Malaysia Pahang, Kuantan"},{"key":"6801_CR23","unstructured":"Gutub A (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh"},{"key":"6801_CR24","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications: An International Journal. Springer . https:\/\/doi.org\/10.1007\/s11042-017-5293-6 ISSN 1380-7501","DOI":"10.1007\/s11042-017-5293-6"},{"issue":"2","key":"6801_CR25","first-page":"474","volume":"1","author":"A Gutub","year":"2011","unstructured":"Gutub A, Khan E (2011) Using Subthreshold SRAM to Design Low-Power Crypto Hardware. International Journal of New Computer Architectures and their Applications (IJNCAA) 1(2):474\u2013483","journal-title":"International Journal of New Computer Architectures and their Applications (IJNCAA)"},{"key":"6801_CR26","doi-asserted-by":"crossref","unstructured":"Gutub A, Khan F (2012) Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. In: International Conference on Advanced Computer Science Applications and Technologies \u2013 ACSAT2012, Palace of the Golden Horses, Kuala Lumpur","DOI":"10.1109\/ACSAT.2012.44"},{"key":"6801_CR27","unstructured":"Gutub A, Tabakh AA, Al-Qahtani A, Amin A (2013) Serial vs. Parallel Elliptic Curve Crypto Processor Designs. In: IADIS International Conference: Applied Computing 2013, pp. 67\u201374, Fort Worth"},{"key":"6801_CR28","unstructured":"Gutub A, Tahhan H (2008) Efficient Adders to Speedup Modular Multiplication For Cryptography. WoSPA 2008 \u2013 5th IEEE International Workshop on Signal Processing and its Applications, University of Sharjah, UAE"},{"key":"6801_CR29","doi-asserted-by":"crossref","unstructured":"Hossain M, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. IEEE World Congress on Services (SERVICES), PP. 21\u201328","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"4","key":"6801_CR30","first-page":"31","volume":"5","author":"J Hosseinzadeh","year":"2016","unstructured":"Hosseinzadeh J, Hosseinzadeh M (2016) A comprehensive survey on evaluation of lightweight symmetric ciphers: hardware and software implementation. International Journal of Advances in Computer Science 5(4):31\u201341","journal-title":"International Journal of Advances in Computer Science"},{"key":"6801_CR31","doi-asserted-by":"crossref","unstructured":"K\u00f6lbl S, Leander G, Tiessen T (2015) Observations on the SIMON block cipher family. Annual Cryptology Conference, pp. 161\u2013185, Springer","DOI":"10.1007\/978-3-662-47989-6_8"},{"key":"6801_CR32","doi-asserted-by":"crossref","unstructured":"Kugler P, Nordhus P, Eskofier B (2013) Shimmer, Cooja and Contiki: A new toolset for the simulation of on-node signal processing algorithms. In Body Sensor Networks (BSN), IEEE International Conference on (pp. 1\u20136). IEEE","DOI":"10.1109\/BSN.2013.6575497"},{"key":"6801_CR33","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"10","key":"6801_CR34","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.3390\/s17102302","volume":"17","author":"H Mora","year":"2017","unstructured":"Mora H, Gil D, Terol RM, Azor\u00edn J, Szymanski J (2017) An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments. Sensors 17(10):2302","journal-title":"Sensors"},{"issue":"5","key":"6801_CR35","first-page":"1938","volume":"9","author":"K Muhammad","year":"2015","unstructured":"Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption. TIIS 9(5):1938\u20131962","journal-title":"TIIS"},{"key":"6801_CR36","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.protcy.2016.08.111","volume":"25","author":"R Nithya","year":"2016","unstructured":"Nithya R, Kumar DS (2016) Where AES is for Internet, SIMON could be for IoT. Procedia Technology Journal 25:302\u2013309","journal-title":"Procedia Technology Journal"},{"key":"6801_CR37","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"S Parah","year":"2017","unstructured":"Parah S, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"key":"6801_CR38","doi-asserted-by":"crossref","unstructured":"Parah S, Akhoon J, Sheikh J, Loan NA, Bhat GM (2015) A high capacity data hiding scheme based on edge detection and even-odd plane separation. Annual IEEE India Conference (INDICON), pp. 1\u20135","DOI":"10.1109\/INDICON.2015.7443595"},{"key":"6801_CR39","doi-asserted-by":"crossref","unstructured":"Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat GM (2018) Nonlinear Dynamics, A new secure and robust watermarking technique based on logistic map and modification of DC coefficient , In press","DOI":"10.1007\/s11071-018-4299-6"},{"key":"6801_CR40","unstructured":"Parah SA, Sheikh JA, Ahad F, Bhat GM (2018) High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems , Internet of Things and Big Data Analytics Toward Next-Generation Intelligence, Edited book, pp. 409\u2013437"},{"issue":"8","key":"6801_CR41","doi-asserted-by":"publisher","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"S Parah","year":"2017","unstructured":"Parah S, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E healthcare. Multimedia Tools and Applications 76(8):10599\u201310633 Springer","journal-title":"Multimedia Tools and Applications"},{"key":"6801_CR42","doi-asserted-by":"publisher","unstructured":"Parah SA, Sheikh JA, Bhat GM (2018) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2018.02.023","DOI":"10.1016\/j.future.2018.02.023"},{"key":"6801_CR43","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"6801_CR44","first-page":"820","volume-title":"Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017","author":"Abdulaziz Shehab","year":"2017","unstructured":"Shehab A, Ismail A, Osman L, Elhoseny M, El-Henawy IM (2017) Quantified Self Using IoT Wearable Devices. In International Conference on Advanced Intelligent Systems and Informatics. (pp. 820\u2013831). Springer, Cham"},{"key":"6801_CR45","doi-asserted-by":"crossref","unstructured":"Trad A, Bahattab A, Othman S (2014) Performance Trade-offs of Encryption Algorithms for Wireless Sensor Networks. IEEE World Congress on Computer Applications and Information Systems (WCCAIS), PP. 1\u20136","DOI":"10.1109\/WCCAIS.2014.6916625"},{"key":"6801_CR46","first-page":"484","volume":"5","author":"M Wu","year":"2010","unstructured":"Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the Architecture of Internet of Things. IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) 5:484\u2013487","journal-title":"IEEE 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE)"},{"key":"6801_CR47","doi-asserted-by":"crossref","unstructured":"Yang G, Zhu B, Suder V, Aagaard MD, Gong G (2015) The Simeck Family of Lightweight Block Ciphers. CHES: International Workshop on Cryptographic Hardware and Embedded Systems, PP. 307\u2013329, Springer","DOI":"10.1007\/978-3-662-48324-4_16"},{"issue":"1","key":"6801_CR48","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10623-016-0256-x","volume":"82","author":"P Zajac","year":"2017","unstructured":"Zajac P (2017) Upper bounds on the complexity of algebraic crypt- analysis of ciphers with a low multiplicative complexity. Des Codes Crypt 82(1):43\u201356","journal-title":"Des Codes Crypt"},{"issue":"5","key":"6801_CR49","doi-asserted-by":"publisher","first-page":"644","DOI":"10.15837\/ijccc.2014.5.661","volume":"9","author":"W Zhang","year":"2014","unstructured":"Zhang W, Thurow K, Stoll R (2014) A knowledge-based telemonitoring platform for application in remote healthcare. International Journal of Computers Communications & Control 9(5):644\u2013654","journal-title":"International Journal of Computers Communications & Control"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6801-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6801-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6801-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T20:35:12Z","timestamp":1694032512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6801-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":49,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["6801"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6801-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"11 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}