{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:30:15Z","timestamp":1771612215443,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014538","name":"Lembaga Pengelola Dana Pendidikan (LPDP), Ministry of Finance of the Republic of Indonesia","doi-asserted-by":"publisher","award":["20194210114181"],"award-info":[{"award-number":["20194210114181"]}],"id":[{"id":"10.13039\/501100014538","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3301128","type":"journal-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T17:46:49Z","timestamp":1690998409000},"page":"84074-84090","source":"Crossref","is-referenced-by-count":12,"title":["Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1234-9870","authenticated-orcid":false,"given":"Susila","family":"Windarta","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Suryadi","family":"Suryadi","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Indonesia, Depok, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-4465","authenticated-orcid":false,"given":"Kalamullah","family":"Ramli","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia"}]},{"given":"Andriani Adi","family":"Lestari","sequence":"additional","affiliation":[{"name":"Cryptography Department, Politeknik Siber dan Sandi Negara, Cryptographic Hardware Engineering Study Program, Ciseeng, Bogor, Indonesia"}]},{"given":"Wildan","family":"Wildan","sequence":"additional","affiliation":[{"name":"Cybersecurity and Cryptography Technology Research and Development Center, National Cyber and Crypto Agency, Depok, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2992-697X","authenticated-orcid":false,"given":"Bernardi","family":"Pranggono","sequence":"additional","affiliation":[{"name":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K"}]},{"given":"Rini Wisnu","family":"Wardhani","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Pusan National University, Busan, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"ref57","first-page":"1","article-title":"Cryptographic analysis of all 4 &#x00D7; 4&#x2014;Bit S-boxes","volume":"2011","author":"saarinen","year":"2011","journal-title":"Cryptology-eprint-archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6344-y"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48116-5_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5113-0_68"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_7"},{"key":"ref53","first-page":"1","article-title":"Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials","volume":"2021","author":"dong","year":"2021","journal-title":"Cryptology-eprint-archive"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150281"},{"key":"ref55","author":"bertoni","year":"2007","journal-title":"Sponge Functions"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200397"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3195572"},{"key":"ref16","first-page":"1","article-title":"State of the art in lightweight symmetric cryptography","volume":"2017","author":"biryukov","year":"2017","journal-title":"Cryptology-eprint-archive"},{"key":"ref19","first-page":"43656","year":"2018","journal-title":"Announcing Request for Nominations for Lightweight Cryptographic Algorithms"},{"key":"ref18","article-title":"NISTIR 8114 report on lightweight cryptography","author":"mckay","year":"2017"},{"key":"ref51","first-page":"1","article-title":"Quantum multi-collision distinguishers","volume":"2021","author":"bao","year":"2021","journal-title":"Cryptology-eprint-archive"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.218-241"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.208-261"},{"key":"ref45","year":"2015","journal-title":"DRAFT FIPS PUB 202 SHA-3 Standard Permutation-Based Hash and Extendable-Output Functions"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.160-207"},{"key":"ref47","author":"bernstein","year":"2019","journal-title":"CAESAR Competition for Authenticated Encryption Security Applicability and Robustness"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.218-241"},{"key":"ref41","author":"daemen","year":"2021","journal-title":"Xoodyak a Lightweight Cryptographic Scheme"},{"key":"ref44","first-page":"1","article-title":"Xoodoo cookbook","volume":"2018","author":"daemen","year":"2018","journal-title":"Cryptology-eprint-archive"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i4.1-38"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102483"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2985719"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978100"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100129"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924045"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926578"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3301306"},{"key":"ref40","year":"2016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_18"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101089"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.196"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_21"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_19"},{"key":"ref30","author":"bertoni","year":"2011","journal-title":"The KECCAK Reference"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_3"},{"key":"ref32","article-title":"Permutation-based encryption, authentication and authenticated encryption","author":"bertoni","year":"2012","journal-title":"Directions in Authenticated Ciphers (DIAC 2012)"},{"key":"ref2","year":"2022","journal-title":"GSMA |Safety Privacy and Security Across the Mobile Ecosystem |Public Policy"},{"key":"ref1","year":"2022","journal-title":"IoT connected devices worldwide 2019&#x2013;2030"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24209-0_10"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_13"},{"key":"ref70","year":"2003","journal-title":"NIST\/Sematech Engineering Statistics Handbook"},{"key":"ref24","author":"beierle","year":"2021","journal-title":"Schwaemm and Esch Lightweight Authenticated Encryption and Hashing using the Sparkle Permutation Family"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36159-6_29"},{"key":"ref23","author":"bao","year":"2021","journal-title":"PHOTON-Beetle Authenticated Encryption and Hash Family"},{"key":"ref67","first-page":"1","article-title":"Cryptographic 1102 randomness testing of block ciphers and hash functions","volume":"2010","author":"doganaksoy","year":"2010","journal-title":"Cryptology-eprint-archive"},{"key":"ref26","author":"banik","year":"2021","journal-title":"GIFT-COFB v1 1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.262-294"},{"key":"ref69","first-page":"81","article-title":"A new statistical randomness test: Saturation point test","volume":"2","author":"sulak","year":"2013","journal-title":"Int J Inf Secur Sci"},{"key":"ref20","author":"dobraunig","year":"2021","journal-title":"Ascon V1 2 Submission to NIST"},{"key":"ref64","author":"weatherley","year":"2021","journal-title":"Lightweight Cryptography Primitives Performance on AVR"},{"key":"ref63","author":"rukhin","year":"2010","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"ref22","author":"dobraunig","year":"2021","journal-title":"ISAP v 2 0"},{"key":"ref66","year":"2013","journal-title":"The Z1 Mote &#x00B7; Zolertia\/Resources Wiki &#x00B7; Github"},{"key":"ref21","author":"beyne","year":"2021","journal-title":"Elephant v2"},{"key":"ref65","author":"alliance","year":"2023","journal-title":"RP002-1 0 3 LoRaWAN Regional Parameters"},{"key":"ref28","author":"guo","year":"2021","journal-title":"Romulus v1 3"},{"key":"ref27","author":"wu","year":"2021","journal-title":"TinyJAMBU A Family of Lightweight Authenticated Encryption Algorithms (Version 2)"},{"key":"ref29","author":"hell","year":"2021","journal-title":"Grain-128AEAD&#x2014;A Lightweight AEAD Stream Cipher"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38898-4_9"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2988228","article-title":"Algorithm 970: Optimizing the NIST statistical test suite and the Berlekamp&#x2013;Massey algorithm","volume":"43","author":"s\u00fds","year":"2016","journal-title":"ACM Trans Math Softw"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69710-1_15"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10201838.pdf?arnumber=10201838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T18:23:29Z","timestamp":1693851809000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10201838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3301128","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}