{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T07:04:47Z","timestamp":1744873487797},"reference-count":25,"publisher":"Informa UK Limited","issue":"4-6","funder":[{"name":"the General Secretariat of Research and Technology of Greece (GSRT)","award":["AFORMI \u2013 Allowing for Reconfigurable Hardware to Efficiently Implement Algorithms of Multidisciplinary Importance, Education and Lifelong Learning, 2427"],"award-info":[{"award-number":["AFORMI \u2013 Allowing for Reconfigurable Hardware to Efficiently Implement Algorithms of Multidisciplinary Importance, Education and Lifelong Learning, 2427"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1080\/19393555.2016.1209259","type":"journal-article","created":{"date-parts":[[2016,8,9]],"date-time":"2016-08-09T23:43:18Z","timestamp":1470786198000},"page":"151-161","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight authenticated encryption for embedded on-chip systems"],"prefix":"10.1080","volume":"25","author":[{"given":"George","family":"Hatzivasilis","sequence":"first","affiliation":[]},{"given":"George","family":"Floros","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Papaefstathiou","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,8,9]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Abdelraheem, M. A. (2013). Estimating the probabilities of low-weight differential and linear approximations on PRESENT-like ciphers. In T. Kwon, M.K. Lee, & D. Kown (Eds.),Information security and cryptology - ICISC 2012: 15th International Conference, Seoul, Korea, November 28\u201330, 2012, revised selected papers(Vol. 7839, pp. 368\u2013382). Berlin Heidelberg: Springer.","DOI":"10.1007\/978-3-642-37682-5_26"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2011.044106"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34416-9_8"},{"key":"CIT0004","volume-title":"Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In T. Kwon, M.-K. Lee, & D. Kown (Eds.), Advances in Cryptology\u2013ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3\u20137, 2000 Proceedings (Vol. 7839, pp. 531\u2013545). Berlin Heidelberg: Springer","author":"Bellare M.","year":"2000"},{"key":"CIT0005","volume-title":"Fides: Lightweight authenticated cipher with side-channel resistance for constrained hardware. In G. Bertoni & J.-S. Coron (Eds.), Cryptographic Hardware and Embedded Systems - CHES 2013: 15th International Workshop, Santa Barbara, CA, USA, August 20\u201323, 2013. Proceedings (Vol. 8086, pp. 142\u2013158). Berlin Heidelberg: Springer","author":"Bilgin B.","year":"2013"},{"key":"CIT0006","volume-title":"SPONGENT: A lightweight hash function. In B. Preneel & T. Takagi (Eds.), Cryptographic hardware and embedded systems - CHES 2011: 13th International Workshop, Nara, Japan, September 28\u2013October 1, 2011. Proceedings (Vol. 6917, pp. 312\u2013325). Berlin Heidelberg: Springer","author":"Bogdanov A.","year":"2011"},{"key":"CIT0007","volume-title":"PRESENT: An ultra-lightweight block cipher. In P. Paillier & I. Verbauwhede (Eds.), Cryptographic hardware and embedded systems - CHES 2007: 9th International Workshop, Vienna, Austria, September 10\u201313, 2007. Proceedings (Vol. 4727, pp. 450\u2013466). Berlin Heidelberg: Springer","author":"Bogdanov A.","year":"2007"},{"key":"CIT0008","volume-title":"Hash functions and RFID tags: Mind the gap. In E. Oswald & P. Rohatgi (Eds.), Cryptographic hardware and embedded systems\u2013CHES 2008: 10th International Workshop, Washington, D.C., USA, August 10\u201313, 2008. Proceedings (Vol. 5154, pp. 283\u2013299). Berlin Heidelberg: Springer","author":"Bogdanov A.","year":"2008"},{"key":"CIT0009","volume-title":"ALE: AES-based lightweight authenticated encryption. In S. Moriai (Ed.), Fast software encryption: 20th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised selected papers (Vol. 8424, pp. 447\u2013466). Berlin Heidelberg: Springer","author":"Bogdanov A.","year":"2014"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2013.774448"},{"key":"CIT0012","volume-title":"Recommendation for block cipher modes of operation: Galois\/counter mode (GCM) and GMAC (NIST Special Publication 800-38D)","author":"Dworkin, M.","year":"2007"},{"key":"CIT0013","volume-title":"The hummingbird-2 lightweight authenticated encryption algorithm. In A. Juels & C. Paar (Eds.), RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26\u201328, 2011, revised selected papers (Vol. 7055, pp. 19\u201331). Berlin Heidelberg: Springer","author":"Engels D.","year":"2011"},{"key":"CIT0015","volume-title":"The PHOTON family of lightweight hash functions. In P. Rogaway (Ed.), Advances in cryptology - CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2011. Proceedings (Vol. 6841, pp. 222\u2013239). Berlin Heidelberg: Springer","author":"Guo J.","year":"2011"},{"key":"CIT0016","unstructured":"Information & Communication Technology (ICT). (2008).W-GREEN. Lapland, Finland. Retrieved from http:\/\/www.cwc.oulu.fi\/workshops\/W-Green2008.pdf"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2014.7032493"},{"key":"CIT0019","volume-title":"Lightweight cryptography for embedded systems - a comparative analysis. In J. Garcia-Alfaro, G. Lioudakis, N. Cuppens-Boulahia, S. Foley, & W. M. Fitzgerald (Eds.), Data privacy management and autonomous spontaneous security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12\u201313, 2013, revised selected papers (Vol. 8247, pp. 333\u2013349). Berlin Heidelberg: Springer","author":"Manifavas C.","year":"2014"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2011.599098"},{"key":"CIT0022","volume-title":"Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In C. Boyd & J. Gonz\u00e1lez Nieto (Eds.), Information security and privacy: 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1\u20133, 2009 Proceedings (Vol. 5594, pp. 90\u2013107). Berlin Heidelberg: Springer","author":"Ozen O.","year":"2009"},{"key":"CIT0023","volume-title":"Lightweight cryptography \u2013 cryptographic engineering for a pervasive world (Doctoral Thesis). IT-SECURITY series, No. 8","author":"Poschmann A.","year":"2009"},{"key":"CIT0024","volume-title":"In S. Moriai (Ed.), Fast software encryption: 20th International Workshop, FSE 2013, Singapore, March 11\u201313, 2013. Revised selected papers (Vol. 8424, pp. 467\u2013482). Berlin Heidelberg: Springer","author":"Saarinen M.-J. O.","year":"2013"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.660678"},{"key":"CIT0026","volume-title":"The 128-bit blockcipher CLEFIA (extended abstract). In A. Biryukov (Ed.), Fast software encryption: 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26\u201328, 2007, revised selected papers (Vol. 4593, pp. 181\u2013195). Berlin Heidelberg: Springer","author":"Shirai T.","year":"2007"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1080\/19393551003649016"},{"key":"CIT0029","volume-title":"Leaked-state-forgery attack against the authenticated encryption algorithm ALE. In K. Sako & P. Sarkar (Ed.), Advances in cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1\u20135, 2013, proceedings, part I (Vol. 8269, pp. 377\u2013404). Berlin Heidelberg: Springer","author":"Wu S.","year":"2013"},{"key":"CIT0030","volume-title":"Side channel cube attack on PRESENT. In J. A. Garay, A. Miyaji, & A. Otsuka (Eds.), Cryptology and network security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12\u201314, 2009. Proceedings (Vol. 5888, pp. 379\u2013391). Berlin Heidelberg: Springer","author":"Yang L.","year":"2009"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2016.1209259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:19:52Z","timestamp":1498335592000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2016.1209259"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,9]]},"references-count":25,"journal-issue":{"issue":"4-6","published-online":{"date-parts":[[2016,8,11]]},"published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1080\/19393555.2016.1209259"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2016.1209259","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}