{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:16:50Z","timestamp":1765995410458,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:00:00Z","timestamp":1723075200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:00:00Z","timestamp":1723075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902156","61902156"],"award-info":[{"award-number":["61902156","61902156"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11227-024-06412-2","type":"journal-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T17:01:59Z","timestamp":1723136519000},"page":"25256-25282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes"],"prefix":"10.1007","volume":"80","author":[{"given":"Xing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chenyang","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Tianning","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Changda","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"6412_CR1","unstructured":"Daemen J, Rijmen V (1999) Aes proposal: Rijndael"},{"key":"6412_CR2","doi-asserted-by":"crossref","unstructured":"Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (blowfish). In: International workshop on fast software encryption. Springer, pp 191\u2013204","DOI":"10.1007\/3-540-58108-1_24"},{"key":"6412_CR3","unstructured":"Grabbe JO (2010) The DES algorithm illustrated"},{"key":"6412_CR4","doi-asserted-by":"crossref","unstructured":"Banik S, Bao Z, Isobe T, Kubo H, Liu F, Minematsu K, Sakamoto K, Shibata N, Shigeri M (2021) Warp: revisiting gfn for lightweight 128-bit block cipher. In: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21\u201323, 2020, Revised Selected Papers 27. Springer, pp 535\u2013564","DOI":"10.1007\/978-3-030-81652-0_21"},{"key":"6412_CR5","doi-asserted-by":"crossref","unstructured":"Gupta KC, Pandey SK, Samanta S (2022) Future: a lightweight block cipher using an optimal diffusion matrix. In: International Conference on Cryptology in Africa. Springer, pp 28\u201352","DOI":"10.1007\/978-3-031-17433-9_2"},{"key":"6412_CR6","doi-asserted-by":"crossref","unstructured":"Krishna PG, Muthuluru N (2021) Feistel network assisted dynamic keying based spn lightweight encryption for iot security. Int J Adv Comput Sci Appl 12(6)","DOI":"10.14569\/IJACSA.2021.0120642"},{"key":"6412_CR7","doi-asserted-by":"publisher","first-page":"136023","DOI":"10.1109\/ACCESS.2019.2940330","volume":"7","author":"B-T Liu","year":"2019","unstructured":"Liu B-T, Li L, Wu R-X, Xie M-M, Li QP (2019) Loong: a family of involutional lightweight block cipher based on spn structure. IEEE Access 7:136023\u2013136035","journal-title":"IEEE Access"},{"key":"6412_CR8","doi-asserted-by":"crossref","unstructured":"Sadhukhan R, Chakraborty A, Datta N, Patranabis S, Mukhopadhyay D (2022) Light but tight: lightweight composition of serialized s-boxes with diffusion layers for strong ciphers. In: International Conference on Security, Privacy, and Applied Cryptography Engineering. Springer, pp 28\u201349","DOI":"10.1007\/978-3-031-22829-2_2"},{"key":"6412_CR9","doi-asserted-by":"crossref","unstructured":"Mishra S, Sadhya D (2020). Liarx: A lightweight cipher based on the lts design strategy of arx. In: International Conference on Information Systems Security. Springer, pp 185\u2013197","DOI":"10.1007\/978-3-030-65610-2_12"},{"issue":"3","key":"6412_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3105-1","volume":"65","author":"J Liu","year":"2022","unstructured":"Liu J, Rijmen V, Hu Y, Chen J, Wang B (2022) Warx: efficient white-box block cipher based on arx primitives and random mds matrix. Sci China Inf Sci 65(3):132302","journal-title":"Sci China Inf Sci"},{"issue":"16","key":"6412_CR11","doi-asserted-by":"publisher","first-page":"13014","DOI":"10.1109\/JIOT.2021.3064203","volume":"8","author":"Y Guo","year":"2021","unstructured":"Guo Y, Li L, Liu B (2021) Shadow: a lightweight block cipher for iot nodes. IEEE Internet Things J 8(16):13014\u201313023","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"6412_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-0115-9","volume":"16","author":"J Feng","year":"2022","unstructured":"Feng J, Li L (2022) Scenery: a lightweight block cipher based on feistel structure. Front Comp Sci 16(3):163813","journal-title":"Front Comp Sci"},{"key":"6412_CR13","doi-asserted-by":"crossref","unstructured":"Chen S, Fan Y, Sun L, Fu Y, Zhou H, Li Y, Wang M, Wang W, Guo C (2022). Sand: an and-rx feistel lightweight block cipher supporting s-box-based security evaluations. Des Codes Cryptogr 1\u201344","DOI":"10.1007\/s10623-021-00970-9"},{"key":"6412_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03364-x","volume":"21","author":"L Guo","year":"2022","unstructured":"Guo L, Du H, Huang D (2022) A quantum image encryption algorithm based on the feistel structure. Quantum Inf Process 21:1\u201318","journal-title":"Quantum Inf Process"},{"issue":"4","key":"6412_CR15","doi-asserted-by":"publisher","first-page":"900","DOI":"10.3390\/sym15040900","volume":"15","author":"IN Mohammad Shah","year":"2023","unstructured":"Mohammad Shah IN, Ismail ES, Samat F, Nek Abd Rahman N (2023) Modified generalized feistel network block cipher for the internet of things. Symmetry 15(4):900","journal-title":"Symmetry"},{"key":"6412_CR16","doi-asserted-by":"publisher","first-page":"203747","DOI":"10.1109\/ACCESS.2020.3036589","volume":"8","author":"B Aboushosha","year":"2020","unstructured":"Aboushosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) Slim: a lightweight block cipher for internet of health things. IEEE Access 8:203747\u2013203757","journal-title":"IEEE Access"},{"key":"6412_CR17","doi-asserted-by":"crossref","unstructured":"Chen S, Fan Y, Sun L, Fu Y, Zhou H, Li Y, Wang M, Wang W, Guo C (2022) Sand: an and-rx feistel lightweight block cipher supporting s-box-based security evaluations. Des Codes Cryptogr 1\u201344","DOI":"10.1007\/s10623-021-00970-9"},{"key":"6412_CR18","doi-asserted-by":"crossref","unstructured":"Yeoh W-Z, Teh JS, Sazali MISBM (2020) $$\\mu $$ 2: a lightweight block cipher. In: Computational science and technology: 6th ICCST 2019, Kota Kinabalu, Malaysia, 29\u201330 August 2019. Springer, pp 281\u2013290","DOI":"10.1007\/978-981-15-0058-9_27"},{"key":"6412_CR19","doi-asserted-by":"crossref","unstructured":"Patil J, Bansod G, Kant KS (2017) Lici: a new ultra-lightweight block cipher. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI). IEEE, pp 40\u201345","DOI":"10.1109\/ETIICT.2017.7977007"},{"issue":"3","key":"6412_CR20","doi-asserted-by":"publisher","first-page":"2000","DOI":"10.1109\/TIT.2022.3223139","volume":"69","author":"J Liu","year":"2022","unstructured":"Liu J, Sun B, Liu G, Dong X, Liu L, Zhang H, Li C (2022) New wine old bottles: feistel structure revised. IEEE Trans Inf Theory 69(3):2000\u20132008","journal-title":"IEEE Trans Inf Theory"},{"key":"6412_CR21","doi-asserted-by":"crossref","unstructured":"Suzaki T, Minematsu K, Morioka S, Kobayashi E (2012) Twine: a lightweight block cipher for multiple platforms. Springer, pp 339\u2013354","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"6412_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.micpro.2016.03.011","volume":"45","author":"L Li","year":"2016","unstructured":"Li L, Liu B, Wang H (2016) Qtl: a new ultra-lightweight block cipher. Microprocess Microsyst 45:45\u201355","journal-title":"Microprocess Microsyst"},{"issue":"3","key":"6412_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-1677-5","volume":"17","author":"L Yan","year":"2023","unstructured":"Yan L, Li L, Guo Y (2023) Dbst: a lightweight block cipher based on dynamic s-box. Front Comput Sci 17(3):173805","journal-title":"Front Comput Sci"},{"issue":"1","key":"6412_CR24","volume":"36","author":"J Kuang","year":"2024","unstructured":"Kuang J, Cao X, Li S, Li L (2024) Drcipher: a pseudo-random dynamic round lightweight block cipher. J King Saud Univ Comput Inf Sci 36(1):101928","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"13","key":"6412_CR25","doi-asserted-by":"publisher","first-page":"11408","DOI":"10.1109\/JIOT.2021.3126317","volume":"9","author":"J Cheng","year":"2021","unstructured":"Cheng J, Guo S, He J (2021) An extended type-1 generalized feistel networks: lightweight block cipher for iot. IEEE Internet Things J 9(13):11408\u201311421","journal-title":"IEEE Internet Things J"},{"issue":"16","key":"6412_CR26","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1049\/ell2.12544","volume":"58","author":"T Cui","year":"2022","unstructured":"Cui T, Zhang J, Jin C, Chen S, Yang Y (2022) Practical distinguishing attack against the iot-friendly block cipher allpc. Electron Lett 58(16):612\u2013613","journal-title":"Electron Lett"},{"key":"6412_CR27","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen L.R, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher. In: Cryptographic hardware and embedded systems-CHES 2007: 9th international workshop, Vienna, Austria, September 10\u201313, 2007. Proceedings 9. Springer, pp 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"6412_CR28","doi-asserted-by":"crossref","unstructured":"Beierle C, Leander G, Moradi A, Rasoolzadeh S (2019) Craft: lightweight tweakable block cipher with efficient protection against dfa attacks. IACR Trans Symm Cryptol 2019(1)","DOI":"10.46586\/tosc.v2019.i1.5-45"},{"issue":"2","key":"6412_CR29","doi-asserted-by":"publisher","first-page":"405","DOI":"10.3390\/electronics12020405","volume":"12","author":"X Zhang","year":"2023","unstructured":"Zhang X, Tang S, Li T, Li X, Wang C (2023) Gfrx: a new lightweight block cipher for resource-constrained iot nodes. Electronics 12(2):405","journal-title":"Electronics"},{"key":"6412_CR30","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang L (2011) Lblock: a lightweight block cipher. In: Applied Cryptography and Network Security: 9th International Conference, ACNS 2011, Nerja, Spain, June 7\u201310, 2011. Proceedings 9. Springer, pp 327\u2013344","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"6412_CR31","doi-asserted-by":"crossref","unstructured":"El Hajji S, Mesnager S, Souidi EM (eds) (2023) Codes, Cryptology and Information Security: 4th International Conference, C2SI 2023, Rabat, Morocco, May 29\u201331, 2023, Proceedings, vol 13874. Springer, Morocco","DOI":"10.1007\/978-3-031-33017-9"},{"key":"6412_CR32","doi-asserted-by":"crossref","unstructured":"Chan YY, Khor C-Y, Teh JS, Teng WJ, Jamil N (2022) Differential cryptanalysis of lightweight block ciphers slim and lcb. In: International symposium on emerging information security and applications. Springer, pp 55\u201367","DOI":"10.1007\/978-3-031-23098-1_4"},{"key":"6412_CR33","doi-asserted-by":"publisher","first-page":"4482","DOI":"10.1109\/TIFS.2021.3108435","volume":"16","author":"J Zhang","year":"2021","unstructured":"Zhang J, Cui T, Jin C (2021) Ict: a cryptanalysis toolbox for block cipher structure with secret components. IEEE Trans Inf Forensics Secur 16:4482\u20134493","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"6412_CR34","volume-title":"Security of block ciphers: from algorithm design to hardware implementation","author":"K Sakiyama","year":"2016","unstructured":"Sakiyama K, Sasaki Y, Li Y (2016) Security of block ciphers: from algorithm design to hardware implementation. Wiley, New York"},{"key":"6412_CR35","doi-asserted-by":"crossref","unstructured":"Hadipour H, Eichlseder M (2022). Integral cryptanalysis of warp based on monomial prediction. In: IACR transactions on symmetric cryptology, pp 92\u2013112","DOI":"10.46586\/tosc.v2022.i2.92-112"},{"key":"6412_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102447","volume":"110","author":"Y Liu","year":"2021","unstructured":"Liu Y, Zhao J, Zhang G, Xing C (2021) Netobfu: a lightweight and efficient network topology obfuscation defense scheme. Comput Secur 110:102447","journal-title":"Comput Secur"},{"key":"6412_CR37","doi-asserted-by":"crossref","unstructured":"Derbez P, Euler M, Fouque P-A, Nguyen PH (2022) Revisiting related-key boomerang attacks on aes using computer-aided tool. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 68\u201388","DOI":"10.1007\/978-3-031-22969-5_3"},{"issue":"3","key":"6412_CR38","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/s00145-017-9266-8","volume":"31","author":"A Bar-On","year":"2018","unstructured":"Bar-On A, Biham E, Dunkelman O, Keller N (2018) Efficient slide attacks. J Cryptol 31(3):641\u2013670","journal-title":"J Cryptol"},{"issue":"6","key":"6412_CR39","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1007\/s12083-023-01559-w","volume":"16","author":"G Zhao","year":"2023","unstructured":"Zhao G, Chen H, Wang J (2023) A lightweight block encryption algorithm for narrowband internet of things. Peer-to-Peer Netw Appl 16(6):2775\u20132793","journal-title":"Peer-to-Peer Netw Appl"},{"key":"6412_CR40","doi-asserted-by":"crossref","unstructured":"Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 342\u2013357","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"6412_CR41","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","volume":"9","author":"D Dinu","year":"2019","unstructured":"Dinu D, Corre YL, Khovratovich D, Perrin L, Gro\u00dfsch\u00e4dl J, Biryukov A (2019) Triathlon of lightweight block ciphers for the internet of things. J Cryptogr Eng 9:283\u2013302","journal-title":"J Cryptogr Eng"},{"issue":"2","key":"6412_CR42","doi-asserted-by":"publisher","first-page":"3192","DOI":"10.1109\/JSYST.2022.3227951","volume":"17","author":"X Huang","year":"2022","unstructured":"Huang X, Li L, Yang J (2022) Ivlbc: an involutive lightweight block cipher for internet of things. IEEE Syst J 17(2):3192\u20133203","journal-title":"IEEE Syst J"},{"key":"6412_CR43","doi-asserted-by":"crossref","unstructured":"Biswas A, Majumdar A, Nath S, Dutta A, Baishnab KL (2023) Lrbc: a lightweight block cipher design for resource constrained iot devices. J Amb Intell Human Comput 1\u201315","DOI":"10.1007\/s12652-020-01694-9"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06412-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06412-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06412-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:33:42Z","timestamp":1725550422000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06412-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,8]]},"references-count":43,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["6412"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06412-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2024,8,8]]},"assertion":[{"value":"30 July 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}