{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:35:13Z","timestamp":1772120113512,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T00:00:00Z","timestamp":1758326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s41635-025-00168-8","type":"journal-article","created":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T08:14:03Z","timestamp":1758356043000},"page":"121-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Benchmarking Design Trade-offs in FPGA Implementations of SIMON 64\/128 Cipher"],"prefix":"10.1007","volume":"9","author":[{"given":"W. A. Susantha","family":"Wijesinghe","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,20]]},"reference":[{"key":"168_CR1","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.vlsi.2022.10.009","volume":"88","author":"KP Raja","year":"2023","unstructured":"Raja KP, Mishra Z, Singh P, Acharya B (2023) Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications. Integration 88:343\u2013352. https:\/\/doi.org\/10.1016\/j.vlsi.2022.10.009","journal-title":"Integration"},{"key":"168_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10\u201328. https:\/\/doi.org\/10.1016\/j.jnca.2017.04.002","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"168_CR3","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s13389-021-00274-7","volume":"12","author":"J Winderickx","year":"2022","unstructured":"Winderickx J, Braeken A, Singelee D, Mentens N (2022) In-depth energy analysis of security algorithms and protocols for the Internet of Things. J Cryptogr Eng 12(2):137\u2013149. https:\/\/doi.org\/10.1007\/s13389-021-00274-7","journal-title":"J Cryptogr Eng"},{"key":"168_CR4","doi-asserted-by":"publisher","unstructured":"Nguyen KD, Dang TK, Kieu-Do-Nguyen B, Le DH, Pham CK, Hoang TT (2024) Asic implementation of ascon lightweight cryptography for IoT applications. IEEE Trans Circuits Syst II: Express Briefs. https:\/\/doi.org\/10.1109\/TCSII.2024.3483214","DOI":"10.1109\/TCSII.2024.3483214"},{"issue":"5","key":"168_CR5","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1080\/09720502.2020.1766764","volume":"25","author":"Dutta S Nayancy","year":"2022","unstructured":"Nayancy Dutta S, Chakraborty S (2022) A survey on implementation of lightweight block ciphers for resource constraints devices. J Discrete Math Sci Cryptogr 25(5):1377\u20131398. https:\/\/doi.org\/10.1080\/09720502.2020.1766764","journal-title":"J Discrete Math Sci Cryptogr"},{"key":"168_CR6","doi-asserted-by":"publisher","unstructured":"Pham HL, Le VTD, Vu TH, Nakashima Y et\u00a0al. (2024) LiCryptor: high-speed and compact multi-grained reconfigurable accelerator for lightweight cryptography. IEEE Trans Circuits Syst I: Regular Papers. https:\/\/doi.org\/10.1109\/TCSI.2024.3434686","DOI":"10.1109\/TCSI.2024.3434686"},{"key":"168_CR7","doi-asserted-by":"publisher","unstructured":"Ray B, Douglas S, Jason S, Stefan TC, Bryan W, Louis W (2013) The SIMON and SPECK families of lightweight block ciphers. In: Technical report, Cryptology ePrint Archive, Report\/404. https:\/\/doi.org\/10.1145\/2744769.2747946","DOI":"10.1145\/2744769.2747946"},{"key":"168_CR8","doi-asserted-by":"publisher","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers. In: Lightweight cryptography for security and privacy: third international workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers 3. Springer, pp 3\u201320. https:\/\/doi.org\/10.1007\/978-3-319-16363-5_1","DOI":"10.1007\/978-3-319-16363-5_1"},{"key":"168_CR9","doi-asserted-by":"publisher","unstructured":"Wetzels J, Bokslag W (2016). Simple SIMON: FPGA implementations of the SIMON 64\/128 block cipher. Cryptology ePrint Archive, Paper 2016\/029. https:\/\/doi.org\/10.48550\/arXiv.1507.06368","DOI":"10.48550\/arXiv.1507.06368"},{"issue":"4","key":"168_CR10","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3390\/s19040913","volume":"19","author":"S Abed","year":"2019","unstructured":"Abed S, Jaffal R, Mohd BJ, Alshayeji M (2019) FPGA modeling and optimization of a SIMON lightweight block cipher. Sensors 19(4):913. https:\/\/doi.org\/10.3390\/s19040913","journal-title":"Sensors"},{"key":"168_CR11","doi-asserted-by":"publisher","first-page":"35966","DOI":"10.1109\/ACCESS.2018.2848586","volume":"6","author":"BJ Mohd","year":"2018","unstructured":"Mohd BJ, Hayajneh T (2018) Lightweight block ciphers for IoT: energy optimization and survivability techniques. IEEE Access 6:35966\u201335978. https:\/\/doi.org\/10.1109\/ACCESS.2018.2848586","journal-title":"IEEE Access"},{"key":"168_CR12","doi-asserted-by":"publisher","first-page":"28177","DOI":"10.1109\/ACCESS.2021.3052867","volume":"9","author":"VA Thakor","year":"2021","unstructured":"Thakor VA, Razzaque MA, Khandaker MR (2021) Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities. IEEE Access 9:28177\u201328193","journal-title":"IEEE Access"},{"issue":"8","key":"168_CR13","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1002\/cta.2645","volume":"47","author":"B Rashidi","year":"2019","unstructured":"Rashidi B (2019) High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. Int J Circuit Theory Appl 47(8):1254\u20131268. https:\/\/doi.org\/10.1002\/cta.2645","journal-title":"Int J Circuit Theory Appl"},{"key":"168_CR14","doi-asserted-by":"publisher","first-page":"203747","DOI":"10.1109\/ACCESS.2020.3036589","volume":"8","author":"B Aboushosha","year":"2020","unstructured":"Aboushosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) SLIM: a lightweight block cipher for Internet of Health Things. IEEE Access 8:203747\u2013203757. https:\/\/doi.org\/10.1109\/ACCESS.2020.3036589","journal-title":"IEEE Access"},{"issue":"3","key":"168_CR15","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1049\/iet-cds.2019.0363","volume":"14","author":"B Rashidi","year":"2020","unstructured":"Rashidi B (2020) Flexible structures of lightweight block ciphers present, SIMON and LED. IET Circuits Devices Syst 14(3):369\u2013380. https:\/\/doi.org\/10.1049\/iet-cds.2019.0363","journal-title":"IET Circuits Devices Syst"},{"issue":"2","key":"168_CR16","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/LES.2014.2314961","volume":"6","author":"A Aysu","year":"2014","unstructured":"Aysu A, Gulcan E, Schaumont P (2014) SIMON says: break area records of block ciphers on FPGAs. IEEE Embed Syst Lett 6(2):37\u201340. https:\/\/doi.org\/10.1109\/LES.2014.2314961","journal-title":"IEEE Embed Syst Lett"},{"key":"168_CR17","doi-asserted-by":"publisher","unstructured":"Gulcan E, Aysu A, Schaumont P (2014) A flexible and compact hardware architecture for the SIMON block cipher. In: International workshop on lightweight cryptography for security and privacy. Springer, pp 34\u201350. https:\/\/doi.org\/10.1007\/978-3-319-16363-5_3","DOI":"10.1007\/978-3-319-16363-5_3"},{"key":"168_CR18","doi-asserted-by":"publisher","unstructured":"Feizi S, Ahmadi A, Nemati A (2014) A hardware implementation of SIMON cryptography algorithm. In: 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, pp 245\u2013250. https:\/\/doi.org\/10.1109\/ICCKE.2014.6993386","DOI":"10.1109\/ICCKE.2014.6993386"},{"key":"168_CR19","doi-asserted-by":"publisher","unstructured":"Hadj Youssef W, Abdelli A, Dridi F, Machhout M (2020) Hardware implementation of secure lightweight cryptographic designs for IoT applications. Secur Commun Netw 2020(1):8860598. https:\/\/doi.org\/10.1155\/2020\/8860598","DOI":"10.1155\/2020\/8860598"},{"key":"168_CR20","doi-asserted-by":"publisher","unstructured":"Wan T, Salman E (2018) Ultra low power SIMON core for lightweight encryption. In: 2018 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/ISCAS.2018.8351163","DOI":"10.1109\/ISCAS.2018.8351163"},{"key":"168_CR21","doi-asserted-by":"publisher","first-page":"221720","DOI":"10.1109\/ACCESS.2020.3043750","volume":"8","author":"A Alkamil","year":"2020","unstructured":"Alkamil A, Perera DG (2020) Towards dynamic and partial reconfigurable hardware architectures for cryptographic algorithms on embedded devices. IEEE Access 8:221720\u2013221742. https:\/\/doi.org\/10.1109\/ACCESS.2020.3043750","journal-title":"IEEE Access"},{"key":"168_CR22","doi-asserted-by":"publisher","unstructured":"Shahverdi A, Taha M, Eisenbarth T (2015) Silent SIMON: a threshold implementation under 100 slices. In: 2015 IEEE International Symposium On Hardware Oriented Security And Trust (HOST). IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/HST.2015.7140227","DOI":"10.1109\/HST.2015.7140227"},{"issue":"16","key":"168_CR23","doi-asserted-by":"publisher","first-page":"23659","DOI":"10.1007\/s11042-019-7587-3","volume":"78","author":"V Dahiphale","year":"2019","unstructured":"Dahiphale V, Raut H, Bansod G (2019) Design and Implementation of novel datapath designs of lightweight cipher RECTANGLE for resource constrained environment. Multimed Tools Appl 78(16):23659\u201323688. https:\/\/doi.org\/10.1007\/s11042-019-7587-3","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"168_CR24","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1631\/FITEE.1800681","volume":"21","author":"V Dahiphale","year":"2020","unstructured":"Dahiphale V, Bansod G, Zambare A, Pisharoty N (2020) Design and implementation of various datapath architectures for the ANU lightweight cipher on an FPGA. Front Inf Technol Electron Eng 21(4):615\u2013628. https:\/\/doi.org\/10.1631\/FITEE.1800681","journal-title":"Front Inf Technol Electron Eng"},{"key":"168_CR25","doi-asserted-by":"publisher","first-page":"100055","DOI":"10.1016\/j.csa.2024.100055","volume":"3","author":"V Dahiphale","year":"2025","unstructured":"Dahiphale V, Raut H, Bansod G, Dahiphale D (2025) Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers. Cyber Secur Appl 3:100055. https:\/\/doi.org\/10.1016\/j.csa.2024.100055","journal-title":"Cyber Secur Appl"},{"issue":"5","key":"168_CR26","doi-asserted-by":"publisher","first-page":"5462","DOI":"10.11591\/ijece.v13i5.pp5462-5471","volume":"13","author":"B Ramachandra","year":"2023","unstructured":"Ramachandra B, Peter SE (2023) Secured authentication of radio-frequency identification system using PRESENT block cipher. Int J Electr Comput Eng (IJECE) 13(5):5462. https:\/\/doi.org\/10.11591\/ijece.v13i5.pp5462-5471","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"168_CR27","doi-asserted-by":"publisher","unstructured":"Lara-Nino CA, Diaz-Perez A, Morales-Sandoval M (2018) FPGA-based assessment of midori and gift lightweight block ciphers. In: Naccache D, Xu S, Qing S, Samarati P, Blanc G, Lu R, Zhang Z, Meddahi A (eds) Information and communications security, vol. 11149. Springer International Publishing, Cham, pp 745\u2013755. https:\/\/doi.org\/10.1007\/978-3-030-01950-1_45","DOI":"10.1007\/978-3-030-01950-1_45"},{"key":"168_CR28","doi-asserted-by":"publisher","first-page":"149076","DOI":"10.1109\/ACCESS.2024.3471694","volume":"12","author":"AR Alharbi","year":"2024","unstructured":"Alharbi AR, Aljaedi A, Aljuhni A, Alghuson MK, Aldawood H, Jamal SS (2024) Evaluating Ascon hardware on 7-series FPGA devices. IEEE Access 12:149076\u2013149089. https:\/\/doi.org\/10.1109\/ACCESS.2024.3471694","journal-title":"IEEE Access"},{"issue":"7","key":"168_CR29","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1049\/iet-cds.2018.5273","volume":"13","author":"JG Pandey","year":"2019","unstructured":"Pandey JG, Goel T, Karmakar A (2019) Hardware architectures for PRESENT block cipher and their FPGA implementations. IET Circuits Devices Syst 13(7):958\u2013969. https:\/\/doi.org\/10.1049\/iet-cds.2018.5273","journal-title":"IET Circuits Devices Syst"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-025-00168-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-025-00168-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-025-00168-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:31:21Z","timestamp":1764239481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-025-00168-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,20]]},"references-count":29,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["168"],"URL":"https:\/\/doi.org\/10.1007\/s41635-025-00168-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-7111899\/v1","asserted-by":"object"}]},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"value":"2509-3428","type":"print"},{"value":"2509-3436","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,20]]},"assertion":[{"value":"13 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Statements and Declarations"}},{"value":"The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"As the sole author, I conceptualized the study, designed the FPGA-based architectures for the SIMON 64\/128 block cipher, conducted all experiments, analyzed the results, and wrote the manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Author Contributions"}},{"value":"Supporting data, including FPGA synthesis results, are available upon reasonable request due to the proprietary nature of certain outputs.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}}]}}