{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:56:59Z","timestamp":1774353419148,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12652-020-02782-6","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T02:03:01Z","timestamp":1609812181000},"page":"6077-6094","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Design, analysis, and implementation of a new lightweight block cipher for protecting IoT smart devices"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8926-4456","authenticated-orcid":false,"given":"Ahmed Ab. M.","family":"Ragab","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Madani","sequence":"additional","affiliation":[]},{"given":"A. M.","family":"Wahdan","sequence":"additional","affiliation":[]},{"given":"Gamal M. I.","family":"Selim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"2782_CR1","unstructured":"Ahmed Ab MR, Madani A, Wahdan A, Selim GM (2019) Hybrid Cryptosystems for Protecting IoT Smart Devices with Comparative Analysis and Evaluation. Paper presented at the Proceedings of the Future Technologies Conference"},{"issue":"2","key":"2782_CR2","first-page":"250","volume":"21","author":"A Amiruddin","year":"2019","unstructured":"Amiruddin A, Ratna AAP, Sari RF (2019) Construction and analysis of key generation algorithms based on modified fibonacci and scrambling factors for privacy preservation. IJ Netw Secur 21(2):250\u2013258","journal-title":"IJ Netw Secur"},{"key":"2782_CR3","volume-title":"A cryptanalysis of the tiny encryption algorithm","author":"VR Andem","year":"2003","unstructured":"Andem VR (2003) A cryptanalysis of the tiny encryption algorithm. University of Alabama, Alabama"},{"issue":"5","key":"2782_CR4","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1007\/s12652-018-0791-6","volume":"10","author":"MN Andreevich","year":"2019","unstructured":"Andreevich MN, Andreevich MA, Duc TN, Nam HN, Tran MC, Hieu MN (2019) Pseudo-probabilistic block ciphers and their randomization. J Ambient Intell Humaniz Comput 10(5):1977\u20131984","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"2782_CR5","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/s00145-007-9001-y","volume":"21","author":"E Barkan","year":"2008","unstructured":"Barkan E, Biham E, Keller N (2008) Instant ciphertext-only cryptanalysis of GSM encrypted communication. J Cryptol 21(3):392\u2013429","journal-title":"J Cryptol"},{"key":"2782_CR6","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Leurent G (2016) On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN. Paper presented at the Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","DOI":"10.1145\/2976749.2978423"},{"key":"2782_CR7","doi-asserted-by":"crossref","unstructured":"Bhaskar CU, Rupa C (2017) An advanced symmetric block cipher based on chaotic systems. Paper presented at the 2017 Innovations in Power and Advanced Computing Technologies (i-PACT)","DOI":"10.1109\/IPACT.2017.8244891"},{"key":"2782_CR8","volume-title":"Differential cryptanalysis of the data encryption standard","author":"E Biham","year":"2012","unstructured":"Biham E, Shamir A (2012) Differential cryptanalysis of the data encryption standard. Springer Science & Business Media, Berlin"},{"key":"2782_CR9","doi-asserted-by":"crossref","unstructured":"Biham E, Anderson R, Knudsen L (1998) Serpent: a new block cipher proposal. Paper presented at the International Workshop on Fast Software Encryption","DOI":"10.1007\/3-540-69710-1_15"},{"issue":"4","key":"2782_CR10","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00145-005-0129-3","volume":"18","author":"E Biham","year":"2005","unstructured":"Biham E, Biryukov A, Shamir A (2005a) Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials. J Cryptol 18(4):291\u2013311","journal-title":"J Cryptol"},{"key":"2782_CR11","doi-asserted-by":"crossref","unstructured":"Biham E, Dunkelman O, Keller N (2005b) A related-key rectangle attack on the full KASUMI. Paper presented at the International Conference on the Theory and Application of Cryptology and Information Security","DOI":"10.1007\/11593447_24"},{"key":"2782_CR12","doi-asserted-by":"crossref","unstructured":"Biryukov A, Kushilevitz E (1998) Improved cryptanalysis of RC5. Paper presented at the International Conference on the Theory and Applications of Cryptographic Techniques","DOI":"10.1007\/BFb0054119"},{"key":"2782_CR13","doi-asserted-by":"crossref","unstructured":"Botta M, Simek M, Mitton N (2013) Comparison of hardware and software based encryption for secure communication in wireless sensor networks. Paper presented at the 2013 36th International Conference on Telecommunications and Signal Processing (TSP)","DOI":"10.1109\/TSP.2013.6613880"},{"issue":"11","key":"2782_CR14","doi-asserted-by":"crossref","first-page":"7002","DOI":"10.1109\/TIT.2012.2207880","volume":"58","author":"C Bouillaguet","year":"2012","unstructured":"Bouillaguet C, Derbez P, Dunkelman O, Fouque P-A, Keller N, Rijmen V (2012) Low-data complexity attacks on AES. IEEE Trans Inf Theory 58(11):7002\u20137017","journal-title":"IEEE Trans Inf Theory"},{"key":"2782_CR15","first-page":"80","volume":"268","author":"C Burwick","year":"1998","unstructured":"Burwick C, Coppersmith D, D\u2019Avignon E, Gennaro R, Halevi S, Jutla C, Safford D (1998) MARS-a candidate cipher for AES. NIST AES Propos 268:80","journal-title":"NIST AES Propos"},{"issue":"2","key":"2782_CR16","first-page":"15","volume":"31","author":"A Cairo","year":"2013","unstructured":"Cairo A (2013) Design and implementation of an encryption algorithm for use in RFID system. Delta 31(2):15","journal-title":"Delta"},{"key":"2782_CR17","doi-asserted-by":"crossref","unstructured":"Chen J, Wang M, Preneel B (2012) Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT. Paper presented at the International Conference on Cryptology in Africa","DOI":"10.1007\/978-3-642-31410-0_8"},{"issue":"5","key":"2782_CR18","first-page":"2291","volume":"7","author":"J Cui","year":"2011","unstructured":"Cui J, Huang L, Zhong H, Chang C, Yang W (2011) An improved AES S-Box and its performance analysis. Int J Innov Comput Inform Control 7(5):2291\u20132302","journal-title":"Int J Innov Comput Inform Control"},{"key":"2782_CR19","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/978-981-13-1927-3_46","volume-title":"Smart intelligent computing and applications","author":"AS Dass","year":"2019","unstructured":"Dass AS, Prabhu J (2019) Comparative analysis of a systematic coherent encryption scheme for large-scale data management using cryptographic encryption technique. Smart intelligent computing and applications. Springer, Berlin, pp 427\u2013437"},{"key":"2782_CR20","doi-asserted-by":"crossref","unstructured":"De Dormale GM, Bass J, Quisquater J-J (2007) On solving RC5 challenges with FPGAs. Paper presented at the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007)","DOI":"10.1109\/FCCM.2007.13"},{"key":"2782_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11277-019-07012-7","volume":"112","author":"SS Dhanda","year":"2020","unstructured":"Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure IoT. Wirel Person Commun 112:1\u201334","journal-title":"Wirel Person Commun"},{"key":"2782_CR22","unstructured":"Elgendy I, Zhang W, Liu C, Hsu C-H (2018) An efficient and secured framework for mobile cloud computing. IEEE Trans Cloud Comput"},{"key":"2782_CR23","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.future.2019.05.037","volume":"100","author":"IA Elgendy","year":"2019","unstructured":"Elgendy IA, Zhang W, Tian Y-C, Li K (2019) Resource allocation and computation offloading with data security for mobile edge computing. Future Gener Comput Syst 100:531\u2013541","journal-title":"Future Gener Comput Syst"},{"key":"2782_CR24","doi-asserted-by":"crossref","first-page":"2410","DOI":"10.1109\/TNSM.2020.3020249","volume":"17","author":"IA Elgendy","year":"2020","unstructured":"Elgendy IA, Zhang WZ, Zeng Y, He H, Tian YC, Yang Y (2020) Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks. IEEE Trans Netw Serv Manag 17:2410\u20132422","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2782_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10236198.2019.1619713","volume":"25","author":"C Flaut","year":"2019","unstructured":"Flaut C (2019) Some application of difference equations in cryptography and coding theory. J Diff Equ Appl 25:1\u201316","journal-title":"J Diff Equ Appl"},{"issue":"4","key":"2782_CR26","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2017","unstructured":"Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J 5(4):2483\u20132495","journal-title":"IEEE Internet Things J"},{"key":"2782_CR27","unstructured":"Guide P (2011) Intel\u00ae 64 and ia-32 architectures software developer\u2019s manual. Volume 3B: System programming Guide, Part, 2"},{"issue":"8","key":"2782_CR28","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/0167-4048(94)90051-5","volume":"13","author":"H Gustafson","year":"1994","unstructured":"Gustafson H, Dawson E, Nielsen L, Caelli W (1994) A computer package for measuring the strength of encryption algorithms. Comput Secur 13(8):687\u2013697","journal-title":"Comput Secur"},{"key":"2782_CR29","doi-asserted-by":"crossref","unstructured":"Hong D, Sung J, Hong S, Lim J, Lee S, Koo B-S, Jeong K (2006) HIGHT: a new block cipher suitable for low-resource device. Paper presented at the International Workshop on Cryptographic Hardware and Embedded Systems","DOI":"10.1007\/11894063_4"},{"key":"2782_CR30","doi-asserted-by":"crossref","unstructured":"Hong D, Lee J-K, Kim D-C, Kwon D, Ryu KH, Lee D-G (2013) LEA: a 128-bit block cipher for fast encryption on common processors. Paper presented at the International Workshop on Information Security Applications","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"2782_CR31","unstructured":"Hu G, Chen R (2019) Improving the performance of multi-mode SM4 block cipher. Int J Perform Eng (10)"},{"key":"2782_CR32","doi-asserted-by":"crossref","unstructured":"Jap D, Breier J (2015) Differential fault attack on LEA. Paper presented at the Information and Communication Technology-EurAsia Conference","DOI":"10.1007\/978-3-319-24315-3_27"},{"issue":"94720\u20131776","key":"2782_CR33","first-page":"11","volume":"754","author":"W Kahan","year":"1996","unstructured":"Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lect Notes Status IEEE 754(94720\u20131776):11","journal-title":"Lect Notes Status IEEE"},{"issue":"6","key":"2782_CR34","first-page":"1039","volume":"13","author":"B Karthikeyan","year":"2019","unstructured":"Karthikeyan B, Sasikala T, Priya SB (2019) Key exchange techniques based on secured energy efficiency in mobile cloud computing. Appl Math 13(6):1039\u20131045","journal-title":"Appl Math"},{"key":"2782_CR35","unstructured":"Kelsey J, Schneier B (2000) MARS attacks! preliminary cryptanalysis of reduced-round MARS variants. Paper presented at the AES Candidate Conference"},{"key":"2782_CR36","doi-asserted-by":"crossref","unstructured":"Khovratovich D, Leurent G, Rechberger C (2012) Narrow-bicliques: cryptanalysis of full IDEA. Paper presented at the Annual International Conference on the Theory and Applications of Cryptographic Techniques","DOI":"10.1007\/978-3-642-29011-4_24"},{"key":"2782_CR37","volume-title":"The art of computer programming (Vol 3)","author":"DE Knuth","year":"1997","unstructured":"Knuth DE (1997) The art of computer programming (Vol 3). Pearson Education, London"},{"key":"2782_CR38","doi-asserted-by":"crossref","unstructured":"Koo WK, Lee H, Kim YH, Lee DH (2008) Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. Paper presented at the 2008 International Conference on Information Security and Assurance (isa 2008)","DOI":"10.1109\/ISA.2008.53"},{"key":"2782_CR39","doi-asserted-by":"crossref","unstructured":"K\u00fchn U (2001) Cryptanalysis of reduced-round MISTY. Paper presented at the International Conference on the Theory and Applications of Cryptographic Techniques","DOI":"10.1007\/3-540-44987-6_20"},{"issue":"10","key":"2782_CR40","first-page":"266","volume":"92","author":"G Lentka","year":"2016","unstructured":"Lentka G, Tyborczyk S (2016) Distributed measurement system with data transmission secured using XXTEA algorithm. Przegl\u0105d Elektrotechniczny 92(10):266\u2013269","journal-title":"Przegl\u0105d Elektrotechniczny"},{"key":"2782_CR41","unstructured":"Li T, Wu H, Wang X, Bao F (2005) SenSec Design Technical Report-TR v1. 1; InfoComm Security Department. Institute for InfoComm Research: Singapore"},{"key":"2782_CR42","unstructured":"Liang C, Ye N, Malekian R, Wang R (2016) The hybrid encryption algorithm of lightweight data in cloud storage. Paper presented at the 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR)"},{"key":"2782_CR43","unstructured":"Marsaglia G (1995) DIEHARD, a battery of tests for random number generators. CD-ROM, Department of Statistics and Supercomputer Computations Research Institute, Florida State University. Available at http:\/\/stat.fsu.edu\/\u00c4geo"},{"key":"2782_CR44","doi-asserted-by":"crossref","unstructured":"Mazumdar B, Mukhopadhyay D, Sengupta I (2012). Design for security of block cipher S-Boxes to resist differential power attacks. Paper presented at the 2012 25th International Conference on VLSI Design","DOI":"10.1109\/VLSID.2012.56"},{"issue":"7","key":"2782_CR45","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1145\/358699.358718","volume":"24","author":"RC Merkle","year":"1981","unstructured":"Merkle RC, Hellman ME (1981) On the security of multiple encryption. Commun ACM 24(7):465\u2013467","journal-title":"Commun ACM"},{"issue":"7","key":"2782_CR46","first-page":"91","volume":"8","author":"AA Milad","year":"2012","unstructured":"Milad AA, Muda Z, Noh ZABM, Algaet MA (2012) Comparative study of performance in cryptography algorithms (Blowfish and Skipjack). J Comput Sci 8(7):91","journal-title":"J Comput Sci"},{"key":"2782_CR47","doi-asserted-by":"crossref","unstructured":"Mohamed K, Pauzi MNM, Ali FHHM, Ariffin S, Zulkipli NHN (2014) Study of S-box properties in block cipher. Paper presented at the 2014 International Conference on Computer, Communications, and Control Technology (I4CT)","DOI":"10.1109\/I4CT.2014.6914206"},{"issue":"6","key":"2782_CR48","first-page":"1206","volume":"20","author":"K Mohamed","year":"2018","unstructured":"Mohamed K, Ali FHHM, Ariffin S, Zakaria NH, Pauzi MNM (2018) An improved AES S-box based on fibonacci numbers and prime factor. IJ Netw Secur 20(6):1206\u20131214","journal-title":"IJ Netw Secur"},{"key":"2782_CR49","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2015.09.001","volume":"58","author":"BJ Mohd","year":"2015","unstructured":"Mohd BJ, Hayajneh T, Vasilakos AV (2015) A survey on lightweight block ciphers for low-resource devices: comparative study and open issues. J Netw Comput Appl 58:73\u201393","journal-title":"J Netw Comput Appl"},{"key":"2782_CR50","doi-asserted-by":"crossref","unstructured":"Niu X (2020) A secure and reliable transmission scheme for low loss high performance wireless communication system based on IoT. J Ambient Intell Humaniz Comput","DOI":"10.1007\/s12652-020-01982-4"},{"key":"2782_CR51","doi-asserted-by":"crossref","unstructured":"Novelan M, Husein A, Harahap M, Aisyah S (2018) SMS Security System on Mobile Devices Using Tiny Encryption Algorithm. Paper presented at the Journal of Physics: Conference Series","DOI":"10.1088\/1742-6596\/1007\/1\/012037"},{"issue":"4","key":"2782_CR52","first-page":"58","volume":"23","author":"A Overmars","year":"2018","unstructured":"Overmars A, Venkatraman S (2018) An efficient golden ratio method for secure cryptographic applications. Math Comput Appl 23(4):58","journal-title":"Math Comput Appl"},{"key":"2782_CR53","unstructured":"Pavlin M (2006) Encription using low cost microcontrollers. Paper presented at the 42nd International Conference on Microelectronics, Devices and Materials and the Workshop on MEMS and NEMS, Society for Microelectronics Electronic"},{"key":"2782_CR54","doi-asserted-by":"crossref","unstructured":"Ragab A, Selim G, Wahdan A, Madani A (2019) Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices. Paper presented at the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","DOI":"10.1007\/978-3-030-24900-7_1"},{"issue":"2","key":"2782_CR55","doi-asserted-by":"crossref","first-page":"293","DOI":"10.3390\/sym11020293","volume":"11","author":"S Rajesh","year":"2019","unstructured":"Rajesh S, Paul V, Menon VG, Khosravi MR (2019) A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices. Symmetry 11(2):293","journal-title":"Symmetry"},{"key":"2782_CR56","unstructured":"Rijmen V (1997) Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, October 1997, KU Leuven"},{"key":"2782_CR57","doi-asserted-by":"crossref","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Retrieved from","DOI":"10.6028\/NIST.SP.800-22"},{"key":"2782_CR58","unstructured":"Russell MD (2004) Tinyness: an overview of tea and related ciphers. Draft v0 3(3)"},{"issue":"13","key":"2782_CR59","first-page":"50","volume":"18","author":"B Schneier","year":"1993","unstructured":"Schneier B (1993) The idea encryption algorithm-the international data encryption algorithm (idea) may be one of the most secure block algorithms available to the public today. Bruce examines its 128-bit-long key. Dr Dobb\u2019s J Softw Tools Prof Program 18(13):50\u201357","journal-title":"Dr Dobb's J Softw Tools Prof Program"},{"key":"2782_CR60","doi-asserted-by":"crossref","unstructured":"Seo H, Liu Z, Choi J, Park T, Kim H (2015) Compact implementations of LEA block cipher for low-end microprocessors. Paper presented at the International Workshop on Information Security Applications","DOI":"10.1007\/978-3-319-31875-2_3"},{"key":"2782_CR61","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-981-13-2414-7_27","volume-title":"Smart innovations in communication and computational sciences","author":"A Shah","year":"2019","unstructured":"Shah A, Engineer M (2019) A survey of lightweight cryptographic algorithms for iot-based applications. Smart innovations in communication and computational sciences. Springer, New York, pp 283\u2013293"},{"issue":"4","key":"2782_CR62","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656\u2013715","journal-title":"Bell Syst Tech J"},{"key":"2782_CR150","doi-asserted-by":"crossref","unstructured":"Singh S, Padhye S (2017) Cryptanalysis of NTRU with n public keys. In: 2017 ISEA Asia security and privacy (ISEASP). IEEE","DOI":"10.1109\/ISEASP.2017.7976980"},{"key":"2782_CR63","doi-asserted-by":"crossref","unstructured":"Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput 1\u201318.","DOI":"10.1007\/s12652-017-0494-4"},{"key":"2782_CR64","unstructured":"Soto J (1999) Statistical testing of random number generators. Paper presented at the Proceedings of the 22nd national information systems security conference"},{"key":"2782_CR65","volume-title":"Computer security: principles and practice","author":"W Stallings","year":"2017","unstructured":"Stallings W, Brown L (2017) Computer security: principles and practice, Global. Pearson, London","edition":"Global"},{"key":"2782_CR66","doi-asserted-by":"crossref","unstructured":"Standaert F-X, Piret G, Gershenfeld N, Quisquater J-J (2006) SEA: a scalable encryption algorithm for small embedded applications. Paper presented at the International Conference on Smart Card Research and Advanced Applications","DOI":"10.1007\/11733447_16"},{"issue":"11","key":"2782_CR151","doi-asserted-by":"crossref","first-page":"3868","DOI":"10.3390\/s18113868","volume":"18","author":"M Su\u00e1rez-Albela","year":"2018","unstructured":"Su\u00e1rez-Albela M et al (2018) A practical evaluation of RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors 18(11):3868","journal-title":"Sensors"},{"key":"2782_CR67","doi-asserted-by":"crossref","unstructured":"Ternovoy E, Popov MG, Kaleev DV, Savchenko YV, Pereverzev AL (2020) Comparative Analysis of Floating-Point Accuracy of IEEE 754 and Posit Standards. Paper presented at the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","DOI":"10.1109\/EIConRus49466.2020.9039521"},{"key":"2782_CR68","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/978-981-13-2622-6_42","volume-title":"Computational science and technology","author":"AA Thinn","year":"2019","unstructured":"Thinn AA, Thwin MMS (2019) Modification of AES algorithm by using second key and modified subbytes operation for text encryption. Computational science and technology. Springer, New York, pp 435\u2013444"},{"issue":"2","key":"2782_CR69","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1007\/s11280-019-00715-8","volume":"23","author":"Y Tian","year":"2020","unstructured":"Tian Y, Li Q, Hu J, Lin H (2020) Secure limitation analysis of public-key cryptography for smart card settings. World Wide Web 23(2):1423\u20131440","journal-title":"World Wide Web"},{"key":"2782_CR70","unstructured":"U\u00e7Ar S, Ta\u015f N, \u00d6zg\u00fcr NY (2017) A new cryptography model via Fibonacci and Lucas numbers. arXiv preprint arXiv170910355."},{"key":"2782_CR71","doi-asserted-by":"crossref","unstructured":"Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv170408688","DOI":"10.14569\/IJACSA.2017.080151"},{"key":"2782_CR72","doi-asserted-by":"crossref","unstructured":"Van Oorschot PC, Wiener MJ (1990) A known-plaintext attack on two-key triple encryption. Paper presented at the Workshop on the Theory and Application of of Cryptographic Techniques","DOI":"10.1007\/3-540-46877-3_29"},{"key":"2782_CR73","doi-asserted-by":"crossref","first-page":"132628","DOI":"10.1109\/ACCESS.2019.2921375","volume":"7","author":"P Vinoj","year":"2019","unstructured":"Vinoj P, Jacob S, Menon VG, Rajesh S, Khosravi MR (2019) Brain-controlled adaptive lower limb exoskeleton for rehabilitation of post-stroke paralyzed. IEEE Access 7:132628\u2013132648","journal-title":"IEEE Access"},{"issue":"6","key":"2782_CR74","doi-asserted-by":"crossref","first-page":"1460","DOI":"10.1109\/TIFS.2018.2790916","volume":"13","author":"B Wang","year":"2018","unstructured":"Wang B, Zhan Y, Zhang Z (2018) Cryptanalysis of a symmetric fully homomorphic encryption scheme. IEEE Trans Inf Forensics Secur 13(6):1460\u20131467","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2782_CR75","first-page":"254","volume":"2010","author":"E Yarrkov","year":"2010","unstructured":"Yarrkov E (2010) Cryptanalysis of XXTEA. IACR Cryptol ePrint Arch 2010:254","journal-title":"IACR Cryptol ePrint Arch"},{"issue":"2","key":"2782_CR76","doi-asserted-by":"crossref","first-page":"246","DOI":"10.3390\/electronics9020246","volume":"9","author":"H Yu","year":"2020","unstructured":"Yu H, Kim Y (2020) New RSA encryption mechanism using one-time encryption keys and unpredictable bio-signal for wireless communication devices. Electronics 9(2):246","journal-title":"Electronics"},{"key":"2782_CR77","doi-asserted-by":"crossref","first-page":"63840","DOI":"10.1109\/ACCESS.2020.2982669","volume":"8","author":"MIA Zahed","year":"2020","unstructured":"Zahed MIA, Ahmad I, Habibi D, Phung QV (2020) Green and secure computation offloading for cache-enabled IoT networks. IEEE Access 8:63840\u201363855","journal-title":"IEEE Access"},{"issue":"S1","key":"2782_CR78","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/S1007-0214(07)70102-5","volume":"12","author":"X Zhang","year":"2007","unstructured":"Zhang X, Fan J (2007) Extended logistic chaotic sequence and its performance analysis. Tsinghua Sci Technol 12(S1):156\u2013161","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"2782_CR79","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1007\/s11071-013-0750-x","volume":"72","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Xiao D (2013) Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack. Nonlinear Dyn 72(4):751\u2013756","journal-title":"Nonlinear Dyn"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02782-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-020-02782-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02782-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T12:34:28Z","timestamp":1684845268000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-020-02782-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":81,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["2782"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02782-6","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"10 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors claim that this paper does not has a conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}