{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:30:23Z","timestamp":1771612223657,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Independent Research Fund Denmark for Technology and Production","award":["8022-00348A"],"award-info":[{"award-number":["8022-00348A"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3036589","type":"journal-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T20:56:32Z","timestamp":1604696192000},"page":"203747-203757","source":"Crossref","is-referenced-by-count":79,"title":["SLIM: A Lightweight Block Cipher for Internet of Health Things"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5168-3313","authenticated-orcid":false,"given":"Bassam","family":"Aboushosha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0281-9381","authenticated-orcid":false,"given":"Rabie A.","family":"Ramadan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8010-6275","authenticated-orcid":false,"given":"Ashutosh Dhar","family":"Dwivedi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4437-259X","authenticated-orcid":false,"given":"Ayman","family":"El-Sayed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2609-2225","authenticated-orcid":false,"given":"Mohamed M.","family":"Dessouky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881130"},{"key":"ref38","first-page":"386","article-title":"Linear cryptanalysis method for DES cipher","author":"matsui","year":"1993","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"ref32","first-page":"529","article-title":"PRINCE&#x2014;A low-latency block cipher for pervasive computing applications (full version)","author":"borghoff","year":"2012","journal-title":"Proc IAC"},{"key":"ref31","first-page":"278","article-title":"Very compact hardware implementations of the blockcipher CLEFIA","volume":"7118","author":"akishita","year":"2011","journal-title":"Proc 18th Int Workshop DX"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2006.40"},{"key":"ref37","author":"dwivedi","year":"2020","journal-title":"Slim An Ultra-Lightweight Block Cipher Algorithm Suitable for RFID Systems"},{"key":"ref36","first-page":"15","article-title":"Finding differential paths in arx ciphers through nested monte-carlo search","volume":"64","author":"dhar","year":"2018","journal-title":"Int J Electron Telecommun"},{"key":"ref35","first-page":"84","article-title":"RECTANGLE: A bit-slice ultra-lightweight block cipher suitable for multiple platforms","author":"zhang","year":"2014","journal-title":"Proc IAC"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34931-7_21"},{"key":"ref10","first-page":"2925","article-title":"High-performance ASIC implementations of the 128-bit block cipher CLEFIA","author":"sugawara","year":"2008","journal-title":"Proc IEEE Int Symp Circuits Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4030022"},{"key":"ref11","first-page":"1","article-title":"KLEIN: A new family of lightweight block ciphers","volume":"7055","author":"gong","year":"2011","journal-title":"Proc 7th Int Workshops"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11733447_16"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74619-5_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-012-9125-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_21"},{"key":"ref17","author":"bertoni","year":"2012","journal-title":"Keccak Sponge Function Family Main Document"},{"key":"ref18","article-title":"Lightweight cryptography: Cryptographic engineering for a pervasive world","author":"poschmann","year":"2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF00630563"},{"key":"ref3","first-page":"243","article-title":"Mcrypton - A lightweight block cipher for security of low-cost RFID tags and sensors","volume":"3786","author":"lim","year":"2005","journal-title":"Proc 6th Int Workshop RTN"},{"key":"ref6","author":"daemen","year":"2002","journal-title":"The Design of Rijndael AES&#x2014 The Advanced Encryption Standard"},{"key":"ref29","first-page":"18","article-title":"Ls-designs: Bitslice encryption for efficient masked software implementations","volume":"8540","author":"grosso","year":"2014","journal-title":"Proc 21st Int Workshop"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41332-2_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"ref7","first-page":"363","article-title":"Tea, A tiny encryption algorithm","volume":"1008","author":"wheeler","year":"1994","journal-title":"Proc 2nd Int Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref9","first-page":"272","article-title":"KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers","volume":"5747","author":"canni\u00e8re","year":"2009","journal-title":"Proc 11th Int Workshop"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2010.5649627"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"ref23","first-page":"373","author":"feldhofer","year":"2008","journal-title":"Hardware Implementation of Symmetric Algorithms for RFID Security"},{"key":"ref26","author":"needham","year":"2020","journal-title":"TEA Extensions"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378273"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09250428.pdf?arnumber=9250428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:54:51Z","timestamp":1639770891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9250428\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3036589","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}