{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:43:26Z","timestamp":1771299806282,"version":"3.50.1"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3396452","type":"journal-article","created":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:52:37Z","timestamp":1714762357000},"page":"63976-63994","source":"Crossref","is-referenced-by-count":9,"title":["Construction of Robust Lightweight S-Boxes Using Enhanced Logistic and Enhanced Sine Maps"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4534-9879","authenticated-orcid":false,"given":"Phuc-Phan","family":"Duong","sequence":"first","affiliation":[{"name":"The University of Electro-Communications (UEC), Chofu-shi, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2214-3005","authenticated-orcid":false,"given":"Hieu","family":"Minh Nguyen","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Thanh Tri, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8761-6398","authenticated-orcid":false,"given":"Ba-Anh","family":"Dao","sequence":"additional","affiliation":[{"name":"Academy of Cryptography Techniques, Hanoi, Thanh Tri, Vietnam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7240-7203","authenticated-orcid":false,"given":"Binh","family":"Kieu-Do-Nguyen","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications (UEC), Chofu-shi, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8011-5518","authenticated-orcid":false,"given":"Thai-Ha","family":"Tran","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications (UEC), Chofu-shi, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4078-0836","authenticated-orcid":false,"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications (UEC), Chofu-shi, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5255-4919","authenticated-orcid":false,"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"The University of Electro-Communications (UEC), Chofu-shi, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3262313"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3230141"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144458"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3095618"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3351794"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3337443"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/math11112585"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100421"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184012"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10456-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15241-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06260-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069965"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/e23101312"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3113338"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3069591"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266290"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07589-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3209202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3218062"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001868"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3288696"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3372388"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2020.10.009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"ref26","first-page":"115","article-title":"PHOTON-beetle authenticated encryption and hash family","volume":"1","author":"Bao","year":"2019","journal-title":"NIST Lightweight Compet. Round"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.03.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10526-w"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3227951"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-1677-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103444"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SGRE59715.2024.10428685"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_41"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/BF00203967"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348144"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3346319"},{"key":"ref38","volume-title":"Elephant v2","author":"Beyne","year":"2021"},{"key":"ref39","volume-title":"GIFT-COFB v1.1","author":"Banik","year":"2021"},{"key":"ref40","volume-title":"KNOT: Algorithm Specifications and Supporting Document","author":"Zhang","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.31-59"},{"key":"ref42","volume-title":"Saturnin: A Suite of Lightweight Symmetric Algorithms for Post-Quantum Security","author":"Canteaut","year":"2019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.iS1.295-349"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5459-7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5487-3"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2019.i1.5-45"},{"key":"ref48","volume-title":"PRIMATEs v1","author":"Andreeva","year":"2014"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_9"},{"key":"ref50","volume-title":"ICEPOLE v2","author":"Morawiecki","year":"2015"},{"key":"ref51","volume-title":"Sycon: A New Milestone in Designing ASCON-Like Permutations","author":"Mandal","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2833049"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa069"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-015-0107-0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2757921"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126008"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2285522"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_29"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2012.56"},{"key":"ref60","article-title":"Construction of side-channel attacks resistant S-boxes using genetic algorithms based on coordinate functions","author":"Khadem","year":"2021","journal-title":"ArXiv:2102.09799"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145990"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2020EAL2037"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1038\/261459a0"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3298111"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945578"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024869"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.109615"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13657-7"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2020.110344"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871557"},{"key":"ref71","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael","volume":"2","author":"Daemen","year":"2002"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48865-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48519-8_12"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_22"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2020.i1.331-362"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2018.i3.290-310"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10518043.pdf?arnumber=10518043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T05:28:54Z","timestamp":1715232534000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10518043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":76,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3396452","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}