{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:42:31Z","timestamp":1778344951499,"version":"3.51.4"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/cits.2017.8035317","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:48:10Z","timestamp":1505422090000},"page":"292-296","source":"Crossref","is-referenced-by-count":13,"title":["A survey of the current state of lightweight cryptography for the Internet of things"],"prefix":"10.1109","author":[{"given":"Wanican","family":"Julian Okello","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qingling","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faizan","family":"Ali Siddiqui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chaozhu","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","author":"biham","year":"2009","journal-title":"Differential Cryptanalysis of the Data Encryption Standard"},{"key":"ref11","article-title":"Algebraic methods in analyzing lightweight cryptographic symmetric primitives","author":"walter","year":"2012","journal-title":"P Darmstadt University of Technology"},{"key":"ref12","author":"knezevic","year":"2015","journal-title":"Lightweight Cryptography from Smallest to Fastest Trade-offs in HW Performance"},{"key":"ref13","author":"yalla","year":"2006","journal-title":"Lightweight Cryntogranhv for FPGAs"},{"key":"ref14","author":"dinu","year":"0","journal-title":"FELICS-Fair Evaluation of Lightweight Cryptographic Systems"},{"key":"ref15","first-page":"1","author":"wenzel-benner","year":"0","journal-title":"XBX eXternal Benchmarking eXtension for the SUPERCOP crypto benchmarking framework"},{"key":"ref16","author":"gaj","year":"0","journal-title":"ATHENa-Automated Tool for Hardware EvaluatioN Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs"},{"key":"ref17","author":"micka\u00ebl","year":"2013","journal-title":"B Project"},{"key":"ref18","author":"rukhin","year":"2010","journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"},{"key":"ref19","year":"0","journal-title":"Cryptol"},{"key":"ref4","first-page":"1689","article-title":"Understanding Cryptography","volume":"53","author":"fallis","year":"2013","journal-title":"J Chem Inf Model"},{"key":"ref27","article-title":"Intel IoT Platform","year":"0","journal-title":"Intel"},{"key":"ref3","author":"poschmann","year":"2007","journal-title":"Lightweight Cryptography"},{"key":"ref6","year":"0","journal-title":"The ntru project"},{"key":"ref5","year":"2015","journal-title":"Lightweight Cryptography Lounge"},{"key":"ref8","first-page":"198","author":"borghoff","year":"2010","journal-title":"Cryptanalysis of Lightweight Ciphers"},{"key":"ref7","article-title":"ELLIPTIC CURVE CRYPTOGRAPHY","author":"kumar","year":"2006","journal-title":"Ruhr-University Bochum"},{"key":"ref2","author":"mansouri","year":"2014","journal-title":"Design and Implementation of Efficient and Secure Lightweight Cryptosystems"},{"key":"ref9","author":"matsui","year":"1998","journal-title":"Linear Cryptanalysis Method for DES Cipher"},{"key":"ref1","article-title":"A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)","volume":"2012","author":"saarinen","year":"2012","journal-title":"IA CR Cryptology ePrint Archive"},{"key":"ref20","article-title":"Network of Excellence in Cryptology","year":"0","journal-title":"eCryptfs"},{"key":"ref22","year":"0","journal-title":"Washington Homeland Security Roundtable"},{"key":"ref21","author":"beaulieu","year":"2015","journal-title":"SIMON and SPECK Block Ciphers for the Internet of Things"},{"key":"ref24","volume":"2","author":"ishaq","year":"2013","journal-title":"IETF Standardization in the Field of the Internet of Things (IoT) A Survey"},{"key":"ref23","author":"turan","year":"0","journal-title":"NIST &#x2018; s Lightweight Crypto Project"},{"key":"ref26","author":"shirai","year":"0","journal-title":"The 128-bit Blockcipher Clefia"},{"key":"ref25","article-title":"Brillo","year":"0","journal-title":"Google"}],"event":{"name":"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)","location":"Dalian, China","start":{"date-parts":[[2017,7,21]]},"end":{"date-parts":[[2017,7,23]]}},"container-title":["2017 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8027230\/8035266\/08035317.pdf?arnumber=8035317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T04:05:40Z","timestamp":1507003540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8035317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cits.2017.8035317","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}