{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T12:45:42Z","timestamp":1743684342601},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T00:00:00Z","timestamp":1717718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"\u7269\u8054\u7f51\u4e2d\u8f7b\u91cf\u7ea7\u53ef\u53d8\u5206\u7ec4\u52a0\u5bc6\u65b9\u6848\u7684\u7814\u7a76","award":["61902156"],"award-info":[{"award-number":["61902156"]}]},{"name":"\u5e7f\u4e49\u7f51\u7edc\u6e29\u5ea6\u53ca\u5176\u7528\u4e8e\u7f51\u7edc\u5f02\u5e38\u9884\u8b66\u4e0e\u9884\u9632\u65b9\u6cd5\u7684\u7814\u7a76","award":["62072217"],"award-info":[{"award-number":["62072217"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01741-8","type":"journal-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T15:01:48Z","timestamp":1717772508000},"page":"2906-2920","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RAB: A lightweight block cipher algorithm with variable key length"],"prefix":"10.1007","volume":"17","author":[{"given":"Xing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Min","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tianning","family":"Li","sequence":"additional","affiliation":[]},{"given":"Changda","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"1741_CR1","doi-asserted-by":"publisher","first-page":"10559","DOI":"10.1109\/ACCESS.2018.2889790","volume":"7","author":"L Dalmasso","year":"2019","unstructured":"Dalmasso L, Bruguier F, Benoit P, Torres L (2019) Evaluation of spn-based lightweight crypto-ciphers. IEEE Access 7:10559\u201310567","journal-title":"IEEE Access"},{"key":"1741_CR2","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: An ultra-lightweight block cipher. In: Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007. Proceedings 9, pp 450\u2013466. Springer","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"1741_CR3","doi-asserted-by":"crossref","unstructured":"Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2014) Rectangle: a bit-slice lightweight block cipher suitable for multiple platforms. Cryptology ePrint Archive","DOI":"10.1007\/s11432-015-5459-7"},{"key":"1741_CR4","doi-asserted-by":"crossref","unstructured":"Banik S, Bogdanov A, Isobe T, Shibutani K, Hiwatari H, Akishita T, Regazzoni F (2015) Midori: A block cipher for low energy. In: Advances in Cryptology\u2013ASIACRYPT 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29\u2013December 3, 2015, Proceedings, Part II 21, pp 411\u2013436. Springer","DOI":"10.1007\/978-3-662-48800-3_17"},{"key":"1741_CR5","doi-asserted-by":"crossref","unstructured":"Guo J, Peyrin T, Poschmann A, Robshaw M (2011) The led block cipher. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2011: 13th International Workshop, Nara, Japan, September 28\u2013October 1, 2011. Proceedings 13, pp 326\u2013341. Springer","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"1741_CR6","doi-asserted-by":"publisher","first-page":"136023","DOI":"10.1109\/ACCESS.2019.2940330","volume":"7","author":"B-T Liu","year":"2019","unstructured":"Liu B-T, Li L, Wu R-X, Xie M-M, Li QP (2019) Loong: A family of involutional lightweight block cipher based on spn structure. IEEE Access 7:136023\u2013136035","journal-title":"IEEE Access"},{"key":"1741_CR7","doi-asserted-by":"crossref","unstructured":"Gupta KC, Pandey SK, Samanta S (2022) Future: a lightweight block cipher using an optimal diffusion matrix. In: International Conference on Cryptology in Africa, pp 28\u201352. Springer","DOI":"10.1007\/978-3-031-17433-9_2"},{"key":"1741_CR8","doi-asserted-by":"crossref","unstructured":"Zhao G, Chen H, Wang J (2023) A lightweight block encryption algorithm for narrowband internet of things. Peer Peer Netw Appl, pp 1\u201319","DOI":"10.21203\/rs.3.rs-2033728\/v1"},{"key":"1741_CR9","doi-asserted-by":"crossref","unstructured":"Huang X, Li L, Yang J (2022) Ivlbc: An involutive lightweight block cipher for internet of things. IEEE Syst J","DOI":"10.1109\/JSYST.2022.3227951"},{"key":"1741_CR10","doi-asserted-by":"crossref","unstructured":"Shibutani K, Isobe T, Hiwatari H, Mitsuda A, Akishita T, Shirai T (2011) Piccolo: an ultra-lightweight blockcipher. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2011: 13th International Workshop, Nara, Japan, September 28\u2013October 1, 2011. Proceedings 13, pp 342\u2013357. Springer","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"1741_CR11","doi-asserted-by":"publisher","first-page":"203747","DOI":"10.1109\/ACCESS.2020.3036589","volume":"8","author":"B Aboushosha","year":"2020","unstructured":"Aboushosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) Slim: A lightweight block cipher for internet of health things. IEEE Access 8:203747\u2013203757","journal-title":"IEEE Access"},{"issue":"3","key":"1741_CR12","doi-asserted-by":"publisher","first-page":"163813","DOI":"10.1007\/s11704-020-0115-9","volume":"16","author":"J Feng","year":"2022","unstructured":"Feng J, Li L (2022) Scenery: a lightweight block cipher based on feistel structure. Front Comp Sci 16(3):163813","journal-title":"Front Comp Sci"},{"issue":"16","key":"1741_CR13","doi-asserted-by":"publisher","first-page":"13014","DOI":"10.1109\/JIOT.2021.3064203","volume":"8","author":"Y Guo","year":"2021","unstructured":"Guo Y, Li L, Liu B (2021) Shadow: A lightweight block cipher for iot nodes. IEEE Internet Things J 8(16):13014\u201313023","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"1741_CR14","doi-asserted-by":"publisher","first-page":"173805","DOI":"10.1007\/s11704-022-1677-5","volume":"17","author":"L Yan","year":"2023","unstructured":"Yan L, Li L, Guo Y (2023) Dbst: a lightweight block cipher based on dynamic s-box. Front Comp Sci 17(3):173805","journal-title":"Front Comp Sci"},{"key":"1741_CR15","doi-asserted-by":"crossref","unstructured":"Hong D, Sung J, Hong S, Lim J, Lee S, Koo B-S, Lee C, Chang D, Lee J, Jeong K et al (2006) Hight: A new block cipher suitable for low-resource device. In: Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006. Proceedings 8, pp 46\u201359. Springer","DOI":"10.1007\/11894063_4"},{"key":"1741_CR16","doi-asserted-by":"crossref","unstructured":"Hong D, Lee J-K, Kim D-C, Kwon D, Ryu KH, Lee D-G (2014) Lea: A 128-bit block cipher for fast encryption on common processors. In: Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers 14, pp 3\u201327. Springer","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"1741_CR17","doi-asserted-by":"crossref","unstructured":"Chen S, Fan Y, Sun L, Fu Y, Zhou H, Li Y, Wang M, Wang W, Guo C (2022) Sand: an and-rx feistel lightweight block cipher supporting s-box-based security evaluations. Designs, Codes and Cryptography, pp 1\u201344","DOI":"10.1007\/s10623-021-00970-9"},{"key":"1741_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The Design of Rijndael, vol 2. Springer, Berlin"},{"issue":"1","key":"1741_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.gltp.2021.01.013","volume":"2","author":"F Thabit","year":"2021","unstructured":"Thabit F, Alhomdy S, Al-Ahdal AH, Jagtap S (2021) A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Transit Proceed 2(1):91\u201399","journal-title":"Global Transit Proceed"},{"issue":"13","key":"1741_CR20","doi-asserted-by":"publisher","first-page":"11408","DOI":"10.1109\/JIOT.2021.3126317","volume":"9","author":"J Cheng","year":"2021","unstructured":"Cheng J, Guo S, He J (2021) An extended type-1 generalized feistel networks: lightweight block cipher for iot. IEEE Internet Things J 9(13):11408\u201311421","journal-title":"IEEE Internet Things J"},{"issue":"16","key":"1741_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1049\/ell2.12544","volume":"58","author":"T Cui","year":"2022","unstructured":"Cui T, Zhang J, Jin C, Chen S, Yang Y (2022) Practical distinguishing attack against the iot-friendly block cipher allpc. Electron Lett 58(16):612\u2013613","journal-title":"Electron Lett"},{"key":"1741_CR22","volume-title":"Security of Block Ciphers: from Algorithm Design to Hardware Implementation","author":"K Sakiyama","year":"2016","unstructured":"Sakiyama K, Sasaki Y, Li Y (2016) Security of Block Ciphers: from Algorithm Design to Hardware Implementation. John Wiley & Sons, Singapore"},{"issue":"6","key":"1741_CR23","first-page":"680","volume":"5","author":"WL Zhang ShiYi","year":"2018","unstructured":"Zhang ShiYi WL, Wang YJ, Tao W (2018) Construction and application of\u00a0$$4\\times4$$\u00a0formalized mds matrices. J Cryptologic Res 5(6):680\u2013694","journal-title":"J Cryptologic Res"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01741-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01741-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01741-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:11:48Z","timestamp":1727971908000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01741-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1741"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01741-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,6,7]]},"assertion":[{"value":"27 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"I would like to declare on behalf of myco-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part. And we confirm informed consent of study participants was obtained to publish the information\/image(s) in an online open access publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate\/publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}