{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:51Z","timestamp":1740123591433,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11227-022-04433-3","type":"journal-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T17:03:01Z","timestamp":1648486981000},"page":"14034-14071","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DKEMA: GPU-based and dynamic key-dependent efficient message authentication algorithm"],"prefix":"10.1007","volume":"78","author":[{"given":"Hassan N.","family":"Noura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1490-9592","authenticated-orcid":false,"given":"Rapha\u00ebl","family":"Couturier","sequence":"additional","affiliation":[]},{"given":"Ola","family":"Salman","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Mazouzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,28]]},"reference":[{"key":"4433_CR1","unstructured":"Frederic\u00a0P. Miller, Agnes\u00a0F. Vandome, and John McBrewster. Advanced Encryption Standard. Alpha Press, 2009"},{"key":"4433_CR2","volume-title":"Cryptography and network security: principles and practice","author":"William Stallings","year":"2017","unstructured":"Stallings W (2017) Cryptography and network security: principles and practice. Pearson Upper Saddle River, NJ"},{"key":"4433_CR3","doi-asserted-by":"crossref","unstructured":"Qinjian Li, Chengwen Zhong, Kaiyong Zhao, Xinxin Mei, and Xiaowen Chu. (2012) Implementation and analysis of AES encryption on GPU. In High performance computing and communication & 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), IEEE, pp. 843\u2013848","DOI":"10.1109\/HPCC.2012.119"},{"key":"4433_CR4","unstructured":"Guang-liang G, Quan Q, Rui Z (2015) Different implementations of AES cryptographic algorithm. In High performance computing and communications (HPCC), IEEE 7th International Symposium on Cyberspace Safety and Security (CSS),IEEE, pp. 1848\u20131853"},{"key":"4433_CR5","doi-asserted-by":"crossref","unstructured":"Rone\u00a0K , Linda\u00a0Ruth P, \u00c7etin\u00a0Kaya K (2016). Bitsliced High-performance AES-ECB on GPUs. In The New Codebreakers, Springer, pp. 125\u2013133","DOI":"10.1007\/978-3-662-49301-4_8"},{"key":"4433_CR6","unstructured":"Rapha\u00ebl C (2013) Designing scientific applications on GPUs. Numerical Analysis Scientific Computating. Chapman & Hall\/CR"},{"key":"4433_CR7","unstructured":"Nvidia, CUDA. A C Programming guide, version 9.0. https:\/\/docs.nvidia.com\/cuda\/cuda-c-programming-guide\/index.html"},{"issue":"10","key":"4433_CR8","doi-asserted-by":"publisher","first-page":"3877","DOI":"10.1007\/s11227-015-1479-8","volume":"71","author":"J Bahi","year":"2015","unstructured":"Bahi J, Couturier R, Guyeux C, H\u00e9am P-C (2015) Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU. J Supercomput 71(10):3877\u20133903","journal-title":"J Supercomput"},{"issue":"1","key":"4433_CR9","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10586-016-0536-2","volume":"19","author":"W-K Lee","year":"2016","unstructured":"Lee WK, Cheong HS, Phan RC, Goi BM (2016) Fast implementation of block ciphers and PRNGs in maxwell GPU architecture. Cluster Comput 19(1):335\u2013347","journal-title":"Cluster Comput"},{"issue":"2","key":"4433_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s13389-017-0175-4","volume":"9","author":"B Peccerillo","year":"2017","unstructured":"Peccerillo B, Bartolini S, Ko\u00e7 \u00c7etin K (2017) Parallel Bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs. J Cryptograph Eng 9(2):159\u201371","journal-title":"J Cryptograph Eng"},{"key":"4433_CR11","unstructured":"Like C , Runtong Z (2008) A Key-dependent Cipher DSDP. In Electronic Commerce and Security, 2008 International Symposium on, IEEE, pp. 310\u2013313"},{"key":"4433_CR12","unstructured":"Runtong Z , Like C (2008) A block cipher using key-dependent S-box and P-boxes. In Industrial Electronics, 2008. ISIE 2008. IEEE International Symposium on, IEEE, pp. 1463\u20131468"},{"issue":"14","key":"4433_CR13","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H N, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383\u2013413","journal-title":"Multimed Tools Appl"},{"key":"4433_CR14","first-page":"585","volume":"2015","author":"R Beaulieu","year":"2015","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) Simon and speck: block ciphers for the internet of things. IACR Cryptol ePrint Archive 2015:585","journal-title":"IACR Cryptol ePrint Archive"},{"issue":"11","key":"4433_CR15","doi-asserted-by":"publisher","first-page":"14837","DOI":"10.1007\/s11042-018-6845-0","volume":"78","author":"HN Noura","year":"2018","unstructured":"Noura H N, Noura M, Chehab A, Mansour MM, Couturier R (2018) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837\u201366","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"4433_CR16","doi-asserted-by":"publisher","first-page":"16527","DOI":"10.1007\/s11042-018-7000-7","volume":"78","author":"H N Noura","year":"2018","unstructured":"Noura H N, Chehab A, Noura M, Couturier R, Mansour MM (2018) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl 78(12):16527\u201316561","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"4433_CR17","doi-asserted-by":"publisher","first-page":"15457","DOI":"10.1007\/s11042-017-5124-9","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H N, Sleem L, Noura M, Mansour MM, Chehab A, Couturier R (2018) A new efficient lightweight and secure image cipher scheme. Multimed Tools Appl 77(12):15457\u201315484","journal-title":"Multimed Tools Appl"},{"key":"4433_CR18","first-page":"90","volume":"42","author":"Z Fawaz","year":"2016","unstructured":"Fawaz Z, Noura H N, Mostefaoui A (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process: Image Commun 42:90\u2013108","journal-title":"Signal Process: Image Commun"},{"key":"4433_CR19","unstructured":"Joan D and Vincent R. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013"},{"key":"4433_CR20","unstructured":"Andrew L and Summed-Area Variance\u00a0Shadow Maps. Chapter 36. aes encryption and decryption on the gpu | nvidia developer. https:\/\/developer.nvidia.com\/gpugems\/gpugems3\/part-vi-gpu-computing\/chapter-36-aes-encryption-and-decryption-gpu, 2007"},{"issue":"3","key":"4433_CR21","first-page":"526","volume":"15","author":"AA Abdelrahman","year":"2017","unstructured":"Abdelrahman AA, Fouad MM, Dahshan H (2017) Analysis on the aes implementation with various granularities on different gpu architectures. Adv Electr Electron Eng 15(3):526\u2013535","journal-title":"Adv Electr Electron Eng"},{"key":"4433_CR22","unstructured":"Ahmed\u00a0A A, Mohamed\u00a0MF, Hisham D, and Ahmed\u00a0M M (2017) High performance cuda aes implementation: a quantitative performance analysis approach. In 2017 Computing Conference, IEEE, pp. 1077\u20131085"},{"key":"4433_CR23","unstructured":"Ahmed\u00a0A A, Hisham D, and Gouda\u00a0I S (2018)Enhancing the actual throughput of the aes algorithm on the pascal gpu architecture. In 2018 3rd International Conference on System Reliability and Safety (ICSRS), IEEE, pp. 97\u2013103"},{"key":"4433_CR24","doi-asserted-by":"crossref","unstructured":"Noura H N, Salman O, Couturier R, and Chehab A (2021) Lorca: Lightweight round block and stream cipher algorithms for IoV systems. Vehicular Communications, pp. 100416","DOI":"10.1016\/j.vehcom.2021.100416"},{"issue":"1","key":"4433_CR25","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s12652-021-02913-7","volume":"13","author":"HN Noura","year":"2021","unstructured":"Noura H N, Salman O, Couturier R, Chehab A (2021) Novel one round message authentication scheme for constrained IoT devices. J Ambient Intell Humanized Comput 13(1):483\u201399","journal-title":"J Ambient Intell Humanized Comput"},{"key":"4433_CR26","first-page":"448","volume":"78","author":"HN Noura","year":"2019","unstructured":"Noura H N, Chehab A, Couturier R (2019) Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Processing: Image Commun 78:448\u2013464","journal-title":"Signal Processing: Image Commun"},{"key":"4433_CR27","unstructured":"Noura H N (2012) Conception et simulation des g\u00e9n\u00e9rateurs, crypto-syst\u00e8mes et fonctions de hachage bas\u00e9s chaos performants. PhD thesis, universit\u00e9 de Nantes"},{"key":"4433_CR28","unstructured":"Pseudo-random numbers\/splitmix64 - rosetta code. https:\/\/rosettacode.org\/wiki\/Pseudo-random_numbers\/Splitmix64"},{"key":"4433_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2","volume-title":"How to break md5 and other hash functions","author":"X Wang","year":"2005","unstructured":"Wang X, Hongbo Y (2005) How to break md5 and other hash functions. Springer-Verlag, In In EUROCRYPT"},{"key":"4433_CR30","doi-asserted-by":"crossref","unstructured":"Guy\u00a0L Steele\u00a0J and Sebastiano V. Lxm: better splittable pseudorandom number generators (and almost as fast). Proceedings of the ACM on Programming Languages, 5(OOPSLA):1\u201331, 2021","DOI":"10.1145\/3485525"},{"key":"4433_CR31","doi-asserted-by":"crossref","unstructured":"Parisot A, Bento LM, Machado RC (2021) Testing and selecting lightweight pseudo-random number generators for iot devices. In 2021 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4. 0&IoT), IEEE, pp. 715\u2013720","DOI":"10.1109\/MetroInd4.0IoT51437.2021.9488454"},{"issue":"1","key":"4433_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2013-126","volume":"2013","author":"A Akhavan","year":"2013","unstructured":"Akhavan A, Samsudin A, Akhshani A (2013) A novel parallel hash function based on 3d chaotic map. EURASIP J Adv Signal Process 2013(1):1\u201312","journal-title":"EURASIP J Adv Signal Process"},{"key":"4433_CR33","first-page":"1","volume":"2009","author":"B Yang","year":"2009","unstructured":"Yang B, Li Z, Zheng S, Yang Y (2009) Hash function construction based on coupled map lattice for communication security. In Global Mobile Congress 2009:1\u20137","journal-title":"In Global Mobile Congress"},{"key":"4433_CR34","volume-title":"Handbook of applied cryptography","author":"Alfred J Menezes","year":"1996","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography, 1st edn. CRC Press Inc, Boca Raton, FL, USA","edition":"1"},{"key":"4433_CR35","unstructured":"Ivan D (1990) A design principle for hash functions. In Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO \u201989, Springer-Verlag, London, UK, UK, pp. 416\u2013427"},{"issue":"2","key":"4433_CR36","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.chaos.2009.02.001","volume":"42","author":"M Amin","year":"2009","unstructured":"Amin M, Faragallah OS, Abd El-Latif AA (2009) Chaos-based hash function (cbhf) for cryptographic applications. Chaos, Solitons Fractals 42(2):767\u2013772","journal-title":"Chaos, Solitons Fractals"},{"issue":"1\u20132","key":"4433_CR37","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) A structure-based chaotic hashing scheme. Nonlinear Dyn 81(1\u20132):27\u201340","journal-title":"Nonlinear Dyn"},{"key":"4433_CR38","unstructured":"John Vi, Messier M and Pravir C. (2002) Cryptography for secure communications. O\u2019Reilly Media Inc, Network security with openssl"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04433-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04433-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04433-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T16:35:49Z","timestamp":1658162149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04433-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":38,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["4433"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04433-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,3,28]]},"assertion":[{"value":"6 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}