{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T07:44:50Z","timestamp":1775634290621,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T00:00:00Z","timestamp":1636588800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T00:00:00Z","timestamp":1636588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11704-020-0115-9","type":"journal-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T07:04:53Z","timestamp":1636614293000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["SCENERY: a lightweight block cipher based on Feistel structure"],"prefix":"10.1007","volume":"16","author":[{"given":"Jingya","family":"Feng","sequence":"first","affiliation":[]},{"given":"Lang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,11]]},"reference":[{"key":"115_CR1","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.micpro.2018.04.009","volume":"60","author":"L Li","year":"2018","unstructured":"Li L, Liu B, Zhou Y, Zou Y. SFN: A new lightweight block cipher. Journal of Microprocessors Microsyst, 2018, 60: 138\u2013150","journal-title":"Journal of Microprocessors Microsyst"},{"issue":"12","key":"115_CR2","first-page":"89","volume":"58","author":"W Zhang","year":"2015","unstructured":"Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Ingrid V. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Journal of Science China (Information Sciences), 2015, 58(12): 89\u2013103","journal-title":"Journal of Science China (Information Sciences)"},{"key":"115_CR3","first-page":"404","volume":"2013","author":"R Beaulieu","year":"2013","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L. The Simon And Speck Families of Lightweight Block Ciphers. Journal of IACR Cryptol. Eprint Arch, 2013, 2013: 404\u2013449","journal-title":"Journal of IACR Cryptol. Eprint Arch"},{"key":"115_CR4","doi-asserted-by":"crossref","unstructured":"Banik S, Pandey S K, Peyrin T, Sasaki Y, Sim S M, Todo Y. GIFT: A small present. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 321\u2013345","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"115_CR5","doi-asserted-by":"crossref","unstructured":"Kobayashi E, Suzaki T, Minematsu K, Morioka S. TWINE: A lightweight block cipher for multiple platforms. In: Proceedings of the conference on Selected Areas in Cryptography. 2012, 339\u2013354","DOI":"10.1007\/978-3-642-35999-6_22"},{"key":"115_CR6","doi-asserted-by":"crossref","unstructured":"Wu W, Zhang L. LBlock: A lightweight block cipher. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2011, 327\u2013344","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"115_CR7","doi-asserted-by":"crossref","unstructured":"Gong Z, Nikova S, Law Y W. KLEIN: A new family of lightweight block ciphers. In: Proceedings of Workshop on RFID Security. 2011, 1\u201318","DOI":"10.1007\/978-3-642-25286-0_1"},{"key":"115_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen L R, Leander G, Paar C, Poschmann A, Robshaw M J B, Seurin Y, Vikkelsoe C. PRESENT: An ultra light-weight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2007, 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"115_CR9","doi-asserted-by":"crossref","unstructured":"Biham E. A fast new DES implementation in software. In: Proceedings of International Workshop on Fast Software Encryption. 1997, 260\u2013270","DOI":"10.1007\/BFb0052352"},{"key":"115_CR10","doi-asserted-by":"crossref","unstructured":"Saberi I, Shojaie B, Salleh M, Enhanced Key Expansion for AES-256 by using Even-Odd method. In: Proceedings of International Conference on Research and Innovation in Information Systems. 2011, 1\u20135","DOI":"10.1109\/ICRIIS.2011.6125708"},{"issue":"10","key":"115_CR11","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TC.1979.1675242","volume":"C-28","author":"J B Kam","year":"1979","unstructured":"Kam J B, Davida G I. Structured Design of Substitution-Permutation Encryption Networks. Journal of IEEE Transactions on Computers, 1979, C-28(10): 747\u2013753","journal-title":"Journal of IEEE Transactions on Computers"},{"issue":"5","key":"115_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H Feistel","year":"1973","unstructured":"Feistel H. Cryptography and Computer Privacy. Journal of Scientific American \u2014 SCI AMER, 1973, 228(5): 15\u201323","journal-title":"Journal of Scientific American \u2014 SCI AMER"},{"key":"115_CR13","doi-asserted-by":"crossref","unstructured":"Webster A F, Tavares S E, On the Design of S-Boxes. In: Proceedings of Lecture notes in computer sciences; 218 on Advances in cryptology\u2014CRYPTO 85. 1986, 523\u2013534","DOI":"10.1007\/3-540-39799-X_41"},{"key":"115_CR14","doi-asserted-by":"crossref","unstructured":"Motara Y M, Irwin B. SHA-1 and the Strict Avalanche Criterion. In: Proceedings of Information Security for South Africa Conference. 2016, 35\u201340","DOI":"10.1109\/ISSA.2016.7802926"},{"key":"115_CR15","doi-asserted-by":"crossref","unstructured":"Knudsen L R. Practically secure Feistel ciphers. In: Proceedings of International Workshop on Fast Software Encryption. 1993, 211\u2013221","DOI":"10.1007\/3-540-58108-1_26"},{"key":"115_CR16","doi-asserted-by":"crossref","unstructured":"Mouha N, Wang Q, Gu D, Preneel B. Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. In: Proceedings of International Conference on Information Security and Cryptology. 2011, 57\u201376","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"115_CR17","doi-asserted-by":"crossref","unstructured":"Sun S, Hu L, Wang P, Qiao K, Ma X, Song L. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bitoriented Block Ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2014, 158\u2013178","DOI":"10.1007\/978-3-662-45611-8_9"},{"key":"115_CR18","doi-asserted-by":"publisher","first-page":"136023","DOI":"10.1109\/ACCESS.2019.2940330","volume":"7","author":"B T Liu","year":"2019","unstructured":"Liu B T, Li L, Wu R X, Xie M M, Li Q P. Loong: A family of Involutional lightweight Block Cipher Based on SPN Structure. Journal of IEEE Access, 2019, 7: 136023\u2013136035","journal-title":"Journal of IEEE Access"},{"key":"115_CR19","doi-asserted-by":"crossref","unstructured":"Sasaki Y, Todo Y. New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Technique. 2017, 185\u2013215","DOI":"10.1007\/978-3-319-56617-7_7"},{"issue":"4","key":"115_CR20","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/BF00203965","volume":"7","author":"E Biham","year":"1994","unstructured":"Biham E. New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, 1994, 7(4): 229\u2013246","journal-title":"Journal of Cryptology"},{"key":"115_CR21","doi-asserted-by":"crossref","unstructured":"Biryukov A, Wagner D. Slide Attacks. In: Proceedings of International Workshop on Fast Software Encryption. 1999, 245\u2013259","DOI":"10.1007\/3-540-48519-8_18"},{"key":"115_CR22","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M. The LED block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2011, 326\u2013341","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"115_CR23","first-page":"585","volume":"2015","author":"R Beaulieu","year":"2015","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L. SIMON and SPECK: Block Ciphers for the Internet of Things. Journal of IACR Cryptology ePrint Archive. 2015, 2015: 585\u2013599","journal-title":"Journal of IACR Cryptology ePrint Archive"},{"key":"115_CR24","doi-asserted-by":"crossref","unstructured":"Beierle C, Jean J, K\u00f6lbl S, Leander G, Moradi A, Peyrin, T, Sasaki Y, Sasdrich P, Sim S M. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. In: Proceedings of Annual International Cryptology Conference. 2016, 123\u2013153","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"115_CR25","unstructured":"Dinu D, Biryukov A, Gro\u00dfsch\u00e4dl J, Khovratovich D, Corre Y L, Perrin L P. FELICS-Fair Evaluation of Lightweight Cryptographic Systems. In: Proceedings of NIST Workshop on Lightweight Cryptography, 2015"},{"issue":"3","key":"115_CR26","first-page":"36","volume":"2","author":"P Luo","year":"2017","unstructured":"Luo P, Zhang W, Bao Z. The Implementation and Optimization of Lightweight Block Cipher RECTANGLE based on FELICS. Journal of Cyber Security, 2017, 2(3): 36\u201347","journal-title":"Journal of Cyber Security"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0115-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-020-0115-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-020-0115-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T22:48:47Z","timestamp":1726094927000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-020-0115-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,11]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["115"],"URL":"https:\/\/doi.org\/10.1007\/s11704-020-0115-9","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,11]]},"assertion":[{"value":"21 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"163813"}}