{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T03:43:07Z","timestamp":1773373387431,"version":"3.50.1"},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Integration"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.vlsi.2026.102715","type":"journal-article","created":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:45:30Z","timestamp":1773272730000},"page":"102715","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["ExpanderGraph-128: A novel graph-theoretic block cipher with formal security analysis and hardware implementation"],"prefix":"10.1016","volume":"109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8485-5369","authenticated-orcid":false,"given":"W.A. Susantha","family":"Wijesinghe","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.vlsi.2026.102715_b1","doi-asserted-by":"crossref","first-page":"4132","DOI":"10.1109\/JIOT.2020.3026493","article-title":"Lightweight cryptographic protocols for IoT-constrained devices: A survey","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.vlsi.2026.102715_b2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/jsan7030028","article-title":"Security vulnerabilities in bluetooth technology as used in IoT","volume":"7","author":"Lonzetta","year":"2018","journal-title":"J. Sens. Actuator Netw."},{"key":"10.1016\/j.vlsi.2026.102715_b3","series-title":"International Workshop on Data Privacy Management","first-page":"333","article-title":"Lightweight cryptography for embedded systems\u2013a comparative analysis","author":"Manifavas","year":"2013"},{"issue":"1","key":"10.1016\/j.vlsi.2026.102715_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41635-020-00102-0","article-title":"ASSURE: A hardware-based security protocol for resource-constrained IoT systems","volume":"5","author":"Yilmaz","year":"2021","journal-title":"J. Hardw. Syst. Secur."},{"issue":"2","key":"10.1016\/j.vlsi.2026.102715_b5","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s10845-012-0671-4","article-title":"Analyzing and comparing the AES architectures for their power consumption","volume":"25","author":"Dogan","year":"2014","journal-title":"J. Intell. Manuf."},{"key":"10.1016\/j.vlsi.2026.102715_b6","series-title":"International Workshop on Cryptographic Hardware and Embedded Systems","first-page":"450","article-title":"PRESENT: An ultra-lightweight block cipher","author":"Bogdanov","year":"2007"},{"key":"10.1016\/j.vlsi.2026.102715_b7","series-title":"Annual Cryptology Conference","first-page":"161","article-title":"Observations on the SIMON block cipher family","author":"K\u00f6lbl","year":"2015"},{"key":"10.1016\/j.vlsi.2026.102715_b8","doi-asserted-by":"crossref","unstructured":"Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers, The SIMON and SPECK lightweight block ciphers, in: Proceedings of the 52nd Annual Design Automation Conference, 2015, pp. 1\u20136.","DOI":"10.1145\/2744769.2747946"},{"key":"10.1016\/j.vlsi.2026.102715_b9","doi-asserted-by":"crossref","first-page":"175769","DOI":"10.1109\/ACCESS.2019.2957581","article-title":"Related-key differential cryptanalysis of the reduced-round block cipher GIFT","volume":"7","author":"Cao","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.vlsi.2026.102715_b10","series-title":"International Conference on Cryptographic Hardware and Embedded Systems","first-page":"321","article-title":"GIFT: A small present: Towards reaching the limit of lightweight encryption","author":"Banik","year":"2017"},{"key":"10.1016\/j.vlsi.2026.102715_b11","series-title":"Annual International Cryptology Conference","first-page":"123","article-title":"The SKINNY family of block ciphers and its low-latency variant MANTIS","author":"Beierle","year":"2016"},{"key":"10.1016\/j.vlsi.2026.102715_b12","series-title":"Cryptographers\u2019 Track at the RSA Conference","first-page":"302","article-title":"Linear cryptanalysis of reduced-round PRESENT","author":"Cho","year":"2010"},{"key":"10.1016\/j.vlsi.2026.102715_b13","series-title":"International Workshop on Fast Software Encryption","first-page":"546","article-title":"Differential analysis of block ciphers SIMON and SPECK","author":"Biryukov","year":"2014"},{"issue":"7909","key":"10.1016\/j.vlsi.2026.102715_b14","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"issue":"3","key":"10.1016\/j.vlsi.2026.102715_b15","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3390\/cryptography7030040","article-title":"A survey of post-quantum cryptography: Start of a new race","volume":"7","author":"Dam","year":"2023","journal-title":"Cryptography"},{"key":"10.1016\/j.vlsi.2026.102715_b16","series-title":"CHES 2005","first-page":"441","article-title":"A very compact S-box for AES","volume":"vol. 3659","author":"Canright","year":"2005"},{"key":"10.1016\/j.vlsi.2026.102715_b17","series-title":"ASIACRYPT 2001","first-page":"239","article-title":"A compact rijndael hardware architecture with S-box optimization","volume":"vol. 2248","author":"Satoh","year":"2001"},{"key":"10.1016\/j.vlsi.2026.102715_b18","series-title":"Boolean Models and Methods in Mathematics, Computer Science, and Engineering","first-page":"257","article-title":"Boolean functions for cryptography and error correcting codes","author":"Carlet","year":"2010"},{"key":"10.1016\/j.vlsi.2026.102715_b19","series-title":"Advances in Cryptology \u2013 Eurocrypt \u201993","first-page":"55","article-title":"Differentially uniform mappings for cryptography","author":"Nyberg","year":"1994"},{"key":"10.1016\/j.vlsi.2026.102715_b20","first-page":"439","article-title":"Expander graphs and their applications","volume":"vol. 43, no. 4","author":"Hoory","year":"2006"},{"issue":"2","key":"10.1016\/j.vlsi.2026.102715_b21","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/BF02579166","article-title":"Eigenvalues and expanders","volume":"6","author":"Alon","year":"1986","journal-title":"Combinatorica"},{"issue":"3","key":"10.1016\/j.vlsi.2026.102715_b22","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/BF02126799","article-title":"Ramanujan graphs","volume":"8","author":"Lubotzky","year":"1988","journal-title":"Combinatorica"},{"key":"10.1016\/j.vlsi.2026.102715_b23","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1017\/S0963548300000390","article-title":"Improved bounds for mixing rates of Markov chains and multicommodity flow","volume":"1","author":"Sinclair","year":"1992","journal-title":"Combin. Probab. Comput."},{"key":"10.1016\/j.vlsi.2026.102715_b24","series-title":"Expander graphs \u2013 both local and global","author":"Chapman","year":"2019"},{"issue":"1\u20133","key":"10.1016\/j.vlsi.2026.102715_b25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/0400000010","article-title":"Pseudorandomness","volume":"7","author":"Vadhan","year":"2012","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"10.1016\/j.vlsi.2026.102715_b26","doi-asserted-by":"crossref","first-page":"1710","DOI":"10.1109\/18.556667","article-title":"Expander codes","volume":"42","author":"Spielman","year":"1996","journal-title":"IEEE Tkans. Inf. Theory"},{"key":"10.1016\/j.vlsi.2026.102715_b27","series-title":"Candidate One-Way Functions Based on Expander Graphs","author":"Goldreich","year":"2000"},{"key":"10.1016\/j.vlsi.2026.102715_b28","series-title":"Theory of Cryptography Conference","first-page":"27","article-title":"Fast pseudorandom functions based on expander graphs","author":"Applebaum","year":"2016"},{"issue":"1","key":"10.1016\/j.vlsi.2026.102715_b29","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s12095-017-0215-z","article-title":"Efficient robust secret sharing from expander graphs","volume":"10","author":"Hemenway","year":"2018","journal-title":"Cryptogr. Commun."},{"issue":"6","key":"10.1016\/j.vlsi.2026.102715_b30","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1016\/j.jnt.2008.11.006","article-title":"Expander graphs based on GRH with an application to elliptic curve cryptography","volume":"129","author":"Jao","year":"2009","journal-title":"J. Number Theory"},{"key":"10.1016\/j.vlsi.2026.102715_b31","first-page":"1","article-title":"Lower bounds for non-constant depth circuits for boolean functions","author":"Nisan","year":"1989","journal-title":"Full Version Manuscr."},{"issue":"2","key":"10.1016\/j.vlsi.2026.102715_b32","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/BF00196773","article-title":"Perfect local randomness in pseudo-random sequences","volume":"4","author":"Maurer","year":"1991","journal-title":"J. Cryptology"},{"key":"10.1016\/j.vlsi.2026.102715_b33","series-title":"Conference on the Theory and Application of Cryptographic Techniques","first-page":"523","article-title":"On the design of S-boxes","author":"Webster","year":"1985"},{"key":"10.1016\/j.vlsi.2026.102715_b34","volume":"vol. 2","author":"Daemen","year":"2002"}],"container-title":["Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167926026000702?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167926026000702?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T17:32:20Z","timestamp":1773336740000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167926026000702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":34,"alternative-id":["S0167926026000702"],"URL":"https:\/\/doi.org\/10.1016\/j.vlsi.2026.102715","relation":{},"ISSN":["0167-9260"],"issn-type":[{"value":"0167-9260","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ExpanderGraph-128: A novel graph-theoretic block cipher with formal security analysis and hardware implementation","name":"articletitle","label":"Article Title"},{"value":"Integration","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.vlsi.2026.102715","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102715"}}