{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:18:14Z","timestamp":1774628294801,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11276-022-03046-1","type":"journal-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:02:25Z","timestamp":1658448145000},"page":"3453-3476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Benchmarking of lightweight cryptographic algorithms for wireless IoT networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Soline","family":"Blanc","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3882-1560","authenticated-orcid":false,"given":"Abdelkader","family":"Lahmadi","sequence":"additional","affiliation":[]},{"given":"K\u00e9vin","family":"Le Gouguec","sequence":"additional","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"Lama","family":"Sleem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,22]]},"reference":[{"key":"3046_CR1","unstructured":"Adomnicai, A., Berger, T.\u00a0P., Clavier, C., Francq, J., Huynh, P., Lallemand, V., Le\u00a0Gouguec, K. , Minier, M., Reynaud, L., & Thomas, G. (2019). Lilliput-ae: a new lightweight tweakable block cipher for authenticated encryption with associated data. Submitted to NIST Lightweight Project."},{"key":"3046_CR2","unstructured":"Andreeva, E., Lallemand, V., Purnal, A., Reyhanitabar, R., Roy, A., & Viz\u00e1r, D. (2019). Forkae v. Submission to NIST Lightweight Cryptography Project."},{"key":"3046_CR3","doi-asserted-by":"crossref","unstructured":"Banik, S., Bogdanov, A., Peyrin, T., Sasaki, Y., Sim, S.\u00a0M., Tischhauser, E., & Todo, Y. (2019). Sundae-gift. Submission to Round, 1.","DOI":"10.46586\/tosc.v2018.i3.1-35"},{"key":"3046_CR4","unstructured":"Banik, S., Chakraborti, A., Iwata, T., Minematsu, K., Nandi, M., Peyrin, T., Sasaki, Y., Sim, S.\u00a0M., & Todo, Y. (2019). Gift-cofb. Submission to Round, 1."},{"key":"3046_CR5","unstructured":"Bao, Z., Chakraborti, A., Datta, N., Guo, J., Nandi, M., Peyrin, T., & Yasuda, K. (2019). Photon-beetle. Submission to the NIST Lightweight Cryptography Standardization Effort."},{"key":"3046_CR6","doi-asserted-by":"crossref","unstructured":"Beierle, C., Biryukov, A., dos Santos, L.\u00a0C., Gro\u00dfsch\u00e4dl, J., Perrin, L., Udovenko, A., Velichkov, V., Wang, Q., & Biryukov, A. (2019). Schwaemm and esch: lightweight authenticated encryption and hashing using the sparkle permutation family. NIST round, 2.","DOI":"10.46586\/tosc.v2020.iS1.208-261"},{"key":"3046_CR7","doi-asserted-by":"crossref","unstructured":"Beierle, C., Jean, J., K\u00f6lbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., & Sim, S.\u00a0M. (2020). Skinny-aead and skinny-hash. IACR Transactions on Symmetric Cryptology, pages 88\u2013131.","DOI":"10.46586\/tosc.v2020.iS1.88-131"},{"key":"3046_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P. (2000). Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. In International Conference on the Theory and Application of Cryptology and Information Security, pages 317\u2013330. Springer.","DOI":"10.1007\/3-540-44448-3_24"},{"key":"3046_CR9","unstructured":"Bernstein, D. J., & Lange, T. (2019). ebacs: Ecrypt benchmarking of cryptographic systems. http:\/\/bench.cr.yp.to, Access on line in December 2019."},{"key":"3046_CR10","unstructured":"Beyne, T., Chen, Y.\u00a0L., Dobraunig, C., & Mennink, B. (2020). Status update on elephant. NIST lightweight competition (2020)."},{"issue":"S1","key":"3046_CR11","doi-asserted-by":"publisher","first-page":"160","DOI":"10.46586\/tosc.v2020.iS1.160-207","volume":"2020","author":"A Canteaut","year":"2020","unstructured":"Canteaut, A., Duval, S., Leurent, G., Naya-Plasencia, M., Perrin, L., Pornin, T., & Schrottenloher, A. (2020). Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. Transactions on Symmetric Cryptology, 2020(S1), 160\u2013207.","journal-title":"Transactions on Symmetric Cryptology"},{"key":"3046_CR12","unstructured":"Cazorla, M., Gourgeon, S., Marquet, K., & Minier, M. (2015). Implementations of lightweight block ciphers on a wsn430 sensor."},{"key":"3046_CR13","unstructured":"Cazorla, M., Marquet, K., & Minier, M. (2013). Survey and benchmark of lightweight block ciphers for wireless sensor networks. In 2013 international conference on security and cryptography (SECRYPT), pages 1\u20136. IEEE."},{"key":"3046_CR14","unstructured":"Chakraborti, A., Datta, N., Jha, A., & Nandi, M. (2019). Hyena. Submission to Round, 1."},{"key":"3046_CR15","unstructured":"Chakraborti, A., Datta, N., Jha, A. L., Cuauhtemoc, M., Nandi, M., & Sasaki, Y. (2019). Lotus-aead and locus-aead. Submission to Round, 1."},{"key":"3046_CR16","doi-asserted-by":"crossref","unstructured":"Daemen, J., Massolino, P. M.\u00a0C., Mehrdad, A., & Rotella, Y. (2020). The subterranean 2.0 cipher suite. IACR Transactions on Symmetric Cryptology, pages 262\u2013294.","DOI":"10.46586\/tosc.v2020.iS1.262-294"},{"issue":"S1","key":"3046_CR17","doi-asserted-by":"publisher","first-page":"60","DOI":"10.46586\/tosc.v2020.iS1.60-87","volume":"2020","author":"J Daemen","year":"2020","unstructured":"Daemen, J., Hoffert, S., Peeters, M., Van Assche, G., & Van Keer, R. (2020). Xoodyak, a lightweight cryptographic scheme. Transactions on Symmetric Cryptology, 2020(S1), 60\u201387.","journal-title":"Transactions on Symmetric Cryptology"},{"issue":"3","key":"3046_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","volume":"9","author":"D Dinu","year":"2019","unstructured":"Dinu, D., Le Corre, Y., Khovratovich, D., Perrin, L., Gro\u00dfsch\u00e4dl, J., & Biryukov, A. (2019). Triathlon of lightweight block ciphers for the internet of things. Journal of Cryptographic Engineering, 9(3), 283\u2013302.","journal-title":"Journal of Cryptographic Engineering"},{"key":"3046_CR19","doi-asserted-by":"crossref","unstructured":"Dobraunig, C.E., Eichlseder, M., Mangard, S., Mendel, F., Mennink, B., Primas, R., & Unterluggauer, T. (2020). Isap v2. 0.","DOI":"10.46586\/tosc.v2020.iS1.390-416"},{"key":"3046_CR20","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F., & Schl\u00e4ffer, M. (2014). Ascon. Submission to the NIST LWC competition: http:\/\/ascon. iaik. tugraz. at."},{"key":"3046_CR21","doi-asserted-by":"crossref","unstructured":"Dos\u00a0Santos, L.\u00a0C., Gro\u00dfsch\u00e4dl, J., & Biryukov, A. (2019). Felics-aead: benchmarking of lightweight authenticated encryption algorithms. In International Conference on Smart Card Research and Advanced Applications, pages 216\u2013233. Springer.","DOI":"10.1007\/978-3-030-42068-0_13"},{"issue":"6","key":"3046_CR22","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T Eisenbarth","year":"2007","unstructured":"Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., & Uhsadel, L. (2007). A survey of lightweight-cryptography implementations. IEEE Design and Test of Computers, 24(6), 522\u2013533.","journal-title":"IEEE Design and Test of Computers"},{"key":"3046_CR23","doi-asserted-by":"crossref","unstructured":"Goudarzi, D., Jean, J., K\u00f6lbl, S., Peyrin, T., Rivain, M., Sasaki, Y., & Sim, S.\u00a0M. (2020). Pyjamask: Block cipher and authenticated encryption with highly efficient masked implementation. IACR Transactions on Symmetric Cryptology, pages 31\u201359.","DOI":"10.46586\/tosc.v2020.iS1.31-59"},{"key":"3046_CR24","unstructured":"Hell, M., Johansson, T., Meier, W., S\u00f6nnerup, J., Yoshida, H. (2019). Grain-128aead-a lightweight aead stream cipher. NIST Lightweight Cryptography, Round, 1."},{"key":"3046_CR25","unstructured":"Iot-lab api documentation. https:\/\/github.com\/iot-lab\/iot-lab-client\/blob\/master\/iotlabclient\/client_README.md."},{"key":"3046_CR26","unstructured":"Iot-lab cli tools documentation. https:\/\/github.com\/iot-lab\/iot-lab\/wiki\/CLI-Tools."},{"key":"3046_CR27","unstructured":"Iot-lab cli tools. https:\/\/pypi.org\/project\/iotlabcli\/."},{"key":"3046_CR28","unstructured":"Iot-lab client github. https:\/\/github.com\/iot-lab\/iot-lab-client."},{"key":"3046_CR29","unstructured":"Iot-lab github. https:\/\/github.com\/iot-lab."},{"key":"3046_CR30","unstructured":"Iot-lab website. https:\/\/www.iot-lab.info."},{"key":"3046_CR31","doi-asserted-by":"crossref","unstructured":"Kerckhof, S., Durvaux, F., Hocquet, C., Bol, D., & Standaert, F.-X. (2012). Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 390\u2013407. Springer.","DOI":"10.1007\/978-3-642-33027-8_23"},{"key":"3046_CR32","doi-asserted-by":"crossref","unstructured":"Kne\u017eevi\u0107, M., Nikov, V., & Rombouts, P. (2012). Low-latency encryption\u2013is \u201clightweight= light+ wait\u201d? In International Workshop on Cryptographic Hardware and Embedded Systems, pages 426\u2013446. Springer.","DOI":"10.1007\/978-3-642-33027-8_25"},{"issue":"1","key":"3046_CR33","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138127.1138130","volume":"2","author":"YW Law","year":"2006","unstructured":"Law, Y. W., Doumen, J., & Hartel, P. (2006). Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(1), 65\u201393.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"key":"3046_CR34","unstructured":"Le\u00a0Gouguec, K., & Huynh, P. (2019). Felics-ae: a framework to benchmark lightweight autheticated block ciphers. In Proceedings of the 2019 NIST Lightweight Cryptography Workshop."},{"key":"3046_CR35","doi-asserted-by":"crossref","unstructured":"Matsui, M., & Murakami, Y. (2013). Minimalism of software implementation. In International Workshop on Fast Software Encryption, pages 393\u2013409. Springer,.","DOI":"10.1007\/978-3-662-43933-3_20"},{"key":"3046_CR36","unstructured":"National\u00a0Institute of\u00a0Standards and Technology (NIST). sha-3-project. [Online; 2007]."},{"key":"3046_CR37","unstructured":"NIST Fips Pub. (2001). 197: Advanced encryption standard (aes). Federal information processing standards publication,197(441), 0311."},{"key":"3046_CR38","unstructured":"Onelab website. https:\/\/onelab.eu."},{"key":"3046_CR39","unstructured":"RIOT. The friendly operating system for the internet of things."},{"key":"3046_CR40","unstructured":"Texas Instruments. Msp430f1611 datasheet. https:\/\/www.ti.com\/lit\/ds\/symlink\/msp430f1611.pdf."},{"key":"3046_CR41","doi-asserted-by":"crossref","unstructured":"Wenzel-Benner, C., & Gr\u00e4f, J. (2010). Xbx: external benchmarking extension for the supercop crypto benchmarking framework. In International Workshop on Cryptographic Hardware and Embedded Systems, pages 294\u2013305. Springer.","DOI":"10.1007\/978-3-642-15031-9_20"},{"key":"3046_CR42","unstructured":"Wenzel-Benner, C., Gr\u00e4f, J., Pham, J., & Kaps, J.-P. (2012). Xbx benchmarking results january 2012. In Third SHA-3 Candidate Conference (2012), http:\/\/xbx.das-labor.org\/trac\/wiki."},{"key":"3046_CR43","first-page":"1","volume":"6550","author":"T Winter","year":"2012","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J. W., Kelsey, R., Levis, P., et al. (2012). Rpl: Ipv6 routing protocol for low-power and lossy networks. RFC, 6550, 1\u2013157.","journal-title":"RFC"},{"key":"3046_CR44","unstructured":"Wu, H., & Huang, T. (2019). Tinyjambu: A family of lightweight authenticated encryption algorithms. Submission to the NIST Lightweight Cryptography Competition, https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Lightweight-Cryptography\/documents\/round-1\/spec-doc\/TinyJAMBU-spec. pdf."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03046-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03046-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03046-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T15:21:22Z","timestamp":1666711282000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03046-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":44,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["3046"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03046-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,22]]},"assertion":[{"value":"8 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}