{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:09Z","timestamp":1740148869238,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T00:00:00Z","timestamp":1554940800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"crossref","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12083-019-00734-2","type":"journal-article","created":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T06:02:40Z","timestamp":1554962560000},"page":"489-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes"],"prefix":"10.1007","volume":"13","author":[{"given":"Hangi","family":"Kim","sequence":"first","affiliation":[]},{"given":"Myungseo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jaehyung","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Jihun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jongsung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,11]]},"reference":[{"unstructured":"CryptoLUX Lightweight block ciphers. www.cryptolux.org\/index.php\/LightweightBlockCiphers . Accessed: 2017-12-15","key":"734_CR1"},{"unstructured":"(2012) Zigbee specification document 053474r20","key":"734_CR2"},{"unstructured":"(2015) Hash-functions using the lightweight block cipher LEA. IoTFS-0078","key":"734_CR3"},{"doi-asserted-by":"crossref","unstructured":"Albrecht MR, Driessen B, Kavun EB, Leander G, Paar C, Yal\u00e7in T (2014) Block ciphers - focus on the linear layer (feat. PRIDE). In: CRYPTO 2014, Lecture notes in computer science, vol 8616. Springer, pp 57\u201376","key":"734_CR4","DOI":"10.1007\/978-3-662-44371-2_4"},{"key":"734_CR5","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-662-48800-3_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"Subhadeep Banik","year":"2015","unstructured":"Banik S, Bogdanov A, Isobe T, Shibutani K, Hiwatari H, Akishita T, Regazzoni F (2015) Midori: a block cipher for low energy. In: ASIACRYPT 2015, Lecture notes in computer science, vol 9453, pp 411\u2013436"},{"doi-asserted-by":"crossref","unstructured":"Banik S, Pandey SK, Peyrin T, Sasaki Y, Sim SM, Todo Y (2017) GIFT: a small present - towards reaching the limit of lightweight encryption. In: CHES 2017, Lecture notes in computer science, vol 10529. Springer, pp 321\u2013345","key":"734_CR6","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"734_CR7","first-page":"241","volume":"2009","author":"A Biryukov","year":"2009","unstructured":"Biryukov A, Khovratovich D, Nikolic I (2009) Distinguisher and related-key attack on the full AES-256 (extended version). IACR Cryptology ePrint Archive 2009:241","journal-title":"IACR Cryptology ePrint Archive"},{"unstructured":"Biryukov A, Nikolic I (2013) Complementing feistel ciphers. In: FSE 2013, Lecture notes in computer science, vol 8424. Springer, pp 3\u201318","key":"734_CR8"},{"doi-asserted-by":"crossref","unstructured":"Black J, Rogaway P, Shrimpton T (2002) Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: CRYPTO 2002, Lecture notes in computer science, vol 2442. Springer, pp 320\u2013335","key":"734_CR9","DOI":"10.1007\/3-540-45708-9_21"},{"doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJB, Seurin Y, Vikkelsoe C (2007) PRESENT: an ultra-lightweight block cipher. In: CHES 2007, Lecture notes in computer science, vol 4727. Springer, pp 450\u2013466","key":"734_CR10","DOI":"10.1007\/978-3-540-74735-2_31"},{"unstructured":"Brachtl BO, Coppersmith D, Hyden MM, Matyas SM Jr, Meyer CH, Oseas J, Pilpel S, Schilling M (1990) Data authentication using modification detection codes based on a public one way encryption function. US Patent 4,908,861","key":"734_CR11"},{"doi-asserted-by":"crossref","unstructured":"Dolmatov V (2010) Gost 28147-89: encryption, decryption, and message authentication code (mac) algorithms. Tech rep","key":"734_CR12","DOI":"10.17487\/rfc5830"},{"key":"734_CR13","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-49890-4_16","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2016","author":"David G\u00e9rault","year":"2016","unstructured":"G\u00e9rault D, Lafourcade P (2016) Related-key cryptanalysis of midori. In: INDOCRYPT 2016, Lecture notes in computer science, vol 10095, pp 287\u2013304"},{"unstructured":"Grosso V, Leurent G, Standaert F, Varici K (2014) Ls-designs: Bitslice encryption for efficient masked software implementations. In: FSE 2014, Lecture notes in computer science, vol 8540. Springer, pp 18\u201337","key":"734_CR14"},{"key":"734_CR15","first-page":"1189","volume":"2015","author":"J Guo","year":"2015","unstructured":"Guo J, Jean J, Nikolic I, Qiao K, Sasaki Y, Sim SM (2015) Invariant subspace attack against full midori64. IACR Cryptology ePrint Archive 2015:1189","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw MJB (2011) The LED block cipher. In: CHES 2011, Lecture notes in computer science, vol 6917. Springer, pp 326\u2013341","key":"734_CR16","DOI":"10.1007\/978-3-642-23951-9_22"},{"doi-asserted-by":"crossref","unstructured":"Hirose S (2006) Some plausible constructions of double-block-length hash functions. In: FSE 2006, Lecture notes in computer science, vol 4047. Springer, pp 210\u2013225","key":"734_CR17","DOI":"10.1007\/11799313_14"},{"issue":"22","key":"734_CR18","doi-asserted-by":"publisher","first-page":"14,525","DOI":"10.1007\/s11042-015-2769-0","volume":"75","author":"D Hong","year":"2016","unstructured":"Hong D, Kim D, Kwon D, Kim J (2016) Improved preimage attacks on hash modes of 8-round AES-256. Multimed Tools Appl 75(22):14,525\u201314,539","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Hong D, Sung J, Hong S, Lim J, Lee S, Koo B, Lee C, Chang D, Lee J, Jeong K, Kim H, Kim J, Chee S (2006) HIGHT: a new block cipher suitable for low-resource device. In: CHES 2006, Lecture notes in computer science, vol 4249. Springer, pp 46\u201359","key":"734_CR19","DOI":"10.1007\/11894063_4"},{"doi-asserted-by":"crossref","unstructured":"Khovratovich D, Biryukov A, Nikolic I (2009) Speeding up collision search for byte-oriented hash functions. In: CT-RSA 2009, Lecture notes in computer science, vol 5473. Springer, pp 164\u2013181","key":"734_CR20","DOI":"10.1007\/978-3-642-00862-7_11"},{"doi-asserted-by":"crossref","unstructured":"Kim H, Kim D, Yi O, Kim J (2018) Cryptanalysis of hash functions based on blockciphers suitable for iot service platform security. Accepted at Multimedia Tools Applications","key":"734_CR21","DOI":"10.1007\/s11042-018-5630-4"},{"doi-asserted-by":"crossref","unstructured":"Knudsen LR, Leander G, Poschmann A, Robshaw MJB (2010) Printcipher: a block cipher for ic-printing. In: CHES 2010, Lecture notes in computer science, vol 6225. Springer, pp 16\u201332","key":"734_CR22","DOI":"10.1007\/978-3-642-15031-9_2"},{"doi-asserted-by":"crossref","unstructured":"Knudsen LR, Mendel F, Rechberger C, Thomsen SS (2009) Cryptanalysis of MDC-2. In: EUROCRYPT 2009, Lecture notes in computer science, vol 5479. Springer, pp 106\u2013120","key":"734_CR23","DOI":"10.1007\/978-3-642-01001-9_6"},{"doi-asserted-by":"crossref","unstructured":"Ko Y, Hong S, Lee W, Lee S, Kang J (2004) Related key differential attacks on 27 rounds of XTEA and full-round GOST. In: FSE 2004, Lecture notes in computer science, vol 3017. Springer, pp 299\u2013316","key":"734_CR24","DOI":"10.1007\/978-3-540-25937-4_19"},{"doi-asserted-by":"crossref","unstructured":"Leander G, Abdelraheem MA, AlKhzaimi H, Zenner E (2011) A cryptanalysis of printcipher: The invariant subspace attack. In: CRYPTO 2011, Lecture notes in computer science, vol 6841. Springer, pp 206\u2013221","key":"734_CR25","DOI":"10.1007\/978-3-642-22792-9_12"},{"issue":"1","key":"734_CR26","doi-asserted-by":"publisher","first-page":"389476","DOI":"10.1155\/2014\/389476","volume":"10","author":"Yuseop Lee","year":"2014","unstructured":"Lee Y, Jeong K, Lee C, Sung J, Hong S (2014) Related-key cryptanalysis on the full printcipher suitable for ic-printing IJDSN 10","journal-title":"International Journal of Distributed Sensor Networks"},{"doi-asserted-by":"crossref","unstructured":"McKay KA, Bassham L, Turan MS, Mouha N (2016) Report on lightweight cryptography. NIST","key":"734_CR27","DOI":"10.6028\/NIST.IR.8114"},{"unstructured":"Preneel B, Govaerts R, Vandewalle J (1993) Hash functions based on block ciphers: a synthetic approach. In: CRYPTO 1993, Lecture notes in computer science, vol 773. Springer, pp 368\u2013378","key":"734_CR28"},{"doi-asserted-by":"crossref","unstructured":"Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: CHES 2011, Lecture notes in computer science, vol 6917. Springer, pp 342\u2013357","key":"734_CR29","DOI":"10.1007\/978-3-642-23951-9_23"},{"doi-asserted-by":"crossref","unstructured":"Stevens M, Bursztein E, Karpman P, Albertini A, Markov Y (2017) The first collision for full SHA-1. In: CRYPTO 2017, Lecture notes in computer science, vol 10401. Springer, pp 570\u2013596","key":"734_CR30","DOI":"10.1007\/978-3-319-63688-7_19"},{"doi-asserted-by":"crossref","unstructured":"Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHA-1. In: CRYPTO 2005, Lecture notes in computer science, vol 3621. Springer, pp 17\u201336","key":"734_CR31","DOI":"10.1007\/11535218_2"},{"doi-asserted-by":"crossref","unstructured":"Wang X, Yu H (2005) How to break MD5 and other hash functions. In: EUROCRYPT 2005, Lecture notes in computer science, vol 3494. Springer, pp 19\u201335","key":"734_CR32","DOI":"10.1007\/11426639_2"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00734-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00734-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00734-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,6]],"date-time":"2020-12-06T01:34:27Z","timestamp":1607218467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00734-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,11]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["734"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00734-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2019,4,11]]},"assertion":[{"value":"16 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}