{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:35:11Z","timestamp":1772642111707,"version":"3.50.1"},"reference-count":266,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"name":"Agenda Mobilizadora Sines Nexus","award":["7113"],"award-info":[{"award-number":["7113"]}]},{"name":"Recovery and Resilience Plan (PRR) and by the European Funds Next Generation EU","award":["02\/C05-i01\/2022"],"award-info":[{"award-number":["02\/C05-i01\/2022"]}]},{"name":"Component 5 - Capitalisation and Business Innovation - Mobilising Agendas for Business Innovation"},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia, I.P.","award":["UIDB\/00326\/2025 and UIDP\/00326\/2025"],"award-info":[{"award-number":["UIDB\/00326\/2025 and UIDP\/00326\/2025"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>The integration of Industrial Internet of Things (IIoT) devices within Industrial Control Systems (ICS) presents significant cybersecurity challenges, primarily due to the limited resources of these devices. Traditional cryptographic algorithms are often unsuitable for IIoT environments due to their high computational, memory, and energy requirements. Lightweight Cryptographic Algorithms have emerged as efficient and secure alternatives, specifically designed for resource-constrained environments. This article systematically reviews lightweight symmetric cryptographic mechanisms, specifically Block and Stream ciphers, and evaluates their critical attributes from an IIoT perspective. In addition, the security strengths and vulnerabilities of these algorithms against known cryptanalytic attacks, including Differential, Linear, Related Key, and others, are discussed. The article also discusses current standardization efforts by organizations such as the National Institute of Standards and Technology (NIST), International Organization for Standardisation (ISO)\/International Electro-technical Commission (IEC), highlighting their applicability in ICS environments. Finally, it identifies open research issues and future directions for improving lightweight cryptographic security in ICS, providing valuable insights for security practitioners and researchers seeking to robustly secure IIoT deployments.<\/jats:p>","DOI":"10.1145\/3757734","type":"journal-article","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T09:11:16Z","timestamp":1754039476000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Review on Lightweight Cryptographic Mechanisms for Industrial Internet of Things Systems"],"prefix":"10.1145","volume":"58","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3684-6417","authenticated-orcid":false,"given":"Saad","family":"Khan","sequence":"first","affiliation":[{"name":"CISUC, Department of Informatic Engineering, University of Coimbra","place":["Coimbra, Portugal"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1845-8798","authenticated-orcid":false,"given":"Pedro Afonso","family":"Ferreira Lopes martins","sequence":"additional","affiliation":[{"name":"CISUC, Department of Informatic Engineering, University of Coimbra","place":["Coimbra, Portugal"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5907-5790","authenticated-orcid":false,"given":"Bruno","family":"Sousa","sequence":"additional","affiliation":[{"name":"CISUC, Department of Informatic Engineering, University of Coimbra","place":["Coimbra, Portugal"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4225-9075","authenticated-orcid":false,"given":"Vasco","family":"Pereira","sequence":"additional","affiliation":[{"name":"CISUC, Department of Computer Science, Universidade de Coimbra","place":["Coimbra, Portugal"]}]}],"member":"320","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","unstructured":"H. Gupta S. K. Singh S. Kumar K. Sharma H. Saini B. B. Gupta V. Arya and K. T. Chui. 2024. Variance-driven security optimisation in industrial IoT sensors. IET Networks 14 1 (2024). DOI:10.1049\/ntw2.12139","DOI":"10.1049\/ntw2.12139"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","unstructured":"M. Ammar G. Russello and B. Crispo. 2018. Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 2 (2018) 8\u201327. DOI:10.1016\/j.jisa.2017.11.002","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4946"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","unstructured":"J. M. A. Bothos and V. Vlachos. 2023. Cybersecurity vulnerability and risk of industrial control systems. In Hybrid Threats Cyberterrorism and Cyberwarfare M. A. Ferrag I. Kantzavelou L. Maglaras and H. Janicke (Eds.). Boca Raton: CRC Press 148\u2013165. DOI:10.1201\/9781003314721-8","DOI":"10.1201\/9781003314721-8"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.3390\/app7101072"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732296"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","unstructured":"M. M. Aslam A. Tufail R. A. A. H. M. Apong L. C. De Silva and M. T. Raza. 2024. Scrutinizing security in industrial control systems: An architectural vulnerabilities and communication network perspective. IEEE Access 12 (2024) 67537\u201367573. DOI:10.1109\/ACCESS.2024.3394848","DOI":"10.1109\/ACCESS.2024.3394848"},{"key":"e_1_3_2_9_2","unstructured":"arm.com. 2024. Cortex-M0. Retrieved March 28 2025 from https:\/\/www.arm.com\/products\/silicon-ip-cpu\/cortex-m\/cortex-m33. (2024)."},{"key":"e_1_3_2_10_2","unstructured":"microchip.com. 2024. PIC32A Family of Microcontrollers (MCUs). Retrieved March 28 2025 from https:\/\/www.microchip.com\/en-us\/products\/microcontrollers-and-microprocessors\/32-bit-mcus\/pic32a. (2024)."},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23229172"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.14.6.463-469"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","unstructured":"M. Devi and A. Majumder. 2021. Side-channel attack in Internet of Things: A survey. In Applications of Internet of Things J. K. Mandal S. Mukhopadhyay and A. Roy (Eds.). Lecture Notes in Networks and Systems Vol. 137. Springer 213\u2013222. DOI:10.1007\/978-981-15-6198-6_20","DOI":"10.1007\/978-981-15-6198-6_20"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70016"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.047084"},{"key":"e_1_3_2_16_2","unstructured":"NIST. 2024. Lightweight Cryptography. (Feb2024). Retrieved March 29 2025 from https:\/\/csrc.nist.gov\/projects\/lightweight-cryptography"},{"key":"e_1_3_2_17_2","unstructured":"ISO\/IEC. 2012. 29192-1:2012 Information technology \u2014 Security techniques \u2014 Lightweight cryptography. Retrieved February 13 2025 from https:\/\/www.iso.org\/standard\/56425.html. (Feb2012)."},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","unstructured":"V. A. Thakor M. A. Razzaque and M. R. A. Khandaker. 2021. Lightweight cryptography algorithms for resource-constrained IoT devices: A review comparison and research opportunities. IEEE Access 9 (2021) 28177\u201328193. DOI:10.1109\/ACCESS.2021.3052867","DOI":"10.1109\/ACCESS.2021.3052867"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","unstructured":"M. Rana Q. Mamun and R. Islam. 2022. Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems 129 (2022) 77\u201389. DOI:10.1016\/j.future.2021.11.011","DOI":"10.1016\/j.future.2021.11.011"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"M. Agrawal J. Zhou and D. Chang. 2019. A survey on lightweight authenticated encryption and challenges for securing industrial IoT. In Security and Privacy Trends in the Industrial Internet of Things C. Alcaraz (Ed.). Springer International Publishing 71\u201394.","DOI":"10.1007\/978-3-030-12330-7_4"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","unstructured":"J. H. Kong L.-M. Ang and K. P. Seng. 2015. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments. Journal of Network and Computer Applications 49 (2015) 15\u201350. DOI:10.1016\/j.jnca.2014.09.006","DOI":"10.1016\/j.jnca.2014.09.006"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","unstructured":"C. P. Ekwueme I. H. Adam A. Dwivedi et\u00a0al. 2024. Lightweight cryptography for Internet of Things: A review. EAI Endorsed Transactions on Internet of Things 10 1 (2024) 1\u20139.","DOI":"10.4108\/eetiot.5565"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02535-5"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02672-x"},{"issue":"1","key":"e_1_3_2_25_2","first-page":"3825","article-title":"A systematic review of ultra-lightweight encryption algorithms","volume":"13","author":"Naser Noor Maher","year":"2022","unstructured":"Noor Maher Naser and Jolan Rokan Naif. 2022. A systematic review of ultra-lightweight encryption algorithms. International Journal of Nonlinear Analysis and Applications 13, 1 (2022), 3825\u20133851.","journal-title":"International Journal of Nonlinear Analysis and Applications"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-151-4-200908180-00135"},{"key":"e_1_3_2_27_2","article-title":"NIST special publication NIST SP 800-82r3 guide to operational technology (OT) security","author":"Stouffer K.","year":"2023","unstructured":"K. Stouffer, M. Pease, C. Tang, T. Zimmerman, V. Pillitteri, S. Lightman, A. Hahn, S. Saravia, A. Sherule, and M. Thompson. 2023. NIST special publication NIST SP 800-82r3 guide to operational technology (OT) security. NIST, Gaithersburg, MD, USA.","journal-title":"NIST, Gaithersburg, MD, USA"},{"issue":"82","key":"e_1_3_2_28_2","first-page":"16","article-title":"Guide to industrial control systems (ICS) security","volume":"800","author":"Stouffer Keith","year":"2011","unstructured":"Keith Stouffer, Joe Falco, Karen Scarfone, et\u00a0al. 2011. Guide to industrial control systems (ICS) security. NIST Special Publication 800, 82 (2011), 16\u201316.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581971.3581986"},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","unstructured":"M. K. Hasan M. Shafiq S. Islam B. Pandey Y. A. Baker El-Ebiary N. S. Nafi R. Rodriguez and D. Vargas. 2021. Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications. Complexity 2021 1 (2021) 13 pages.","DOI":"10.1155\/2021\/5540296"},{"key":"e_1_3_2_31_2","article-title":"IEC 62443","year":"2019","unstructured":"IEC. 2019. IEC 62443. Online. (Feb.2019). Retrieved August 14, 2025 from https:\/\/www.isa.org\/standards-and-publications\/isa-standards\/isa-iec-62443-series-of-standards","journal-title":"Online"},{"key":"e_1_3_2_32_2","unstructured":"Ryan Dsouza. 2023. Guidance on using ISA\/IEC 62443 for IIoT projects. Retrieved August 14 2025 from https:\/\/aws.amazon.com\/blogs\/iot\/guidance-on-using-isa-iec-62443-for-iiot-projects\/. (Mar.2023)."},{"key":"e_1_3_2_33_2","unstructured":"IEC 62351-3:2023. 2023. Power systems management and associated information exchange - Data and communications security - Part 3: Communication network and system security - Profiles including TCP\/IP. International Electrotechnical Commission. 2023."},{"key":"e_1_3_2_34_2","unstructured":"ISO\/SAE 21434:2021. 2021. Road vehicles \u2013 Cybersecurity engineering. International Organization for Standardization and SAE International."},{"key":"e_1_3_2_35_2","unstructured":"IEEE Standard 2030.5-2023. 2023. IEEE standard for smart energy profile application protocol. Institute of Electrical and Electronics Engineers."},{"key":"e_1_3_2_36_2","article-title":"MSC-FAL.1-Circ.3","year":"2021","unstructured":"IMO. 2021. MSC-FAL.1-Circ.3. Online. (FEB2021). Retrieved August 14, 2025 from https:\/\/www.cdn.imo.org\/localresources\/en\/OurWork\/Facilitation\/Facilitation\/MSC-FAL.1-Circ.3-Rev.1%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf","journal-title":"Online"},{"key":"e_1_3_2_37_2","unstructured":"ENISA. 2020. Guidelines for securing the internet of things. European Union Agency for Cybersecurity. https:\/\/www.enisa.europa.eu\/publications\/guidelines-for-securing-the-internet-of-things. Accessed: August 14 2025."},{"key":"e_1_3_2_38_2","volume-title":"Report on Lightweight Cryptography","author":"McKay Kerry","year":"2016","unstructured":"Kerry McKay, Lawrence Bassham, Meltem S\u00f6nmez Turan, and Nicky Mouha. 2016. Report on Lightweight Cryptography. Technical Report. National Institute of Standards and Technology."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1121-6"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64378-2_16"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45187-7_23"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"e_1_3_2_43_2","volume-title":"Analysis of Lightweight Cryptographic Primitives","author":"George Kiernan Brent","year":"2021","unstructured":"Kiernan Brent George. 2021. Analysis of Lightweight Cryptographic Primitives. Ph.D. Dissertation. Virginia Tech."},{"key":"e_1_3_2_44_2","volume-title":"Security of Lightweight Cryptographic Primitives","author":"Vennos Amy Demetra Geae","year":"2021","unstructured":"Amy Demetra Geae Vennos. 2021. Security of Lightweight Cryptographic Primitives. Ph.D. Dissertation. Virginia Tech."},{"issue":"1","key":"e_1_3_2_45_2","first-page":"3","article-title":"Announcing the advanced encryption standard (AES)","volume":"197","author":"Standard NIST-FIPS","year":"2001","unstructured":"NIST-FIPS Standard. 2001. Announcing the advanced encryption standard (AES). FIPS Publication 197, 1-51 (2001), 3\u20133.","journal-title":"FIPS Publication"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICORT52730.2021.9581374"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_10"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym15040900"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11062548"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3577530.3577582"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2018.091785"},{"key":"e_1_3_2_52_2","article-title":"White-box block cipher implementation based on LS-design","author":"G\u00fcner Hatice K\u00fcbra","year":"2023","unstructured":"Hatice K\u00fcbra G\u00fcner, Ceyda Mang\u0131r, and O\u011fuz Yayla. 2023. White-box block cipher implementation based on LS-design. Cryptology ePrint Archive (2023).","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10591-4_2"},{"key":"e_1_3_2_54_2","volume-title":"Transitioning the use of Cryptographic Algorithms and Key Lengths","author":"Barker Elaine","year":"2018","unstructured":"Elaine Barker and Allen Roginsky. 2018. Transitioning the use of Cryptographic Algorithms and Key Lengths. Technical Report. National Institute of Standards and Technology."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","unstructured":"G. Hatzivasilis K. Fysarakis I. Papaefstathiou and C. Manifavas. 2018. A review of lightweight block ciphers. Journal of Cryptographic Engineering 8 2 (2018) 141\u2013184. DOI:10.1007\/s13389-017-0160-y","DOI":"10.1007\/s13389-017-0160-y"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","unstructured":"J. H. Kong L.-M. Ang and K. P. Seng. 2015. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments. Journal of Network and Computer Applications 49 (2015) 15\u201350. DOI:10.1016\/j.jnca.2014.09.006","DOI":"10.1016\/j.jnca.2014.09.006"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Y. Harbi Z. Aliouat A. Refoufi and S. Harous. 2021. Recent security trends in Internet of Things: A comprehensive survey. IEEE Access 9 (2021) 113292\u2013113314. DOI:10.1109\/ACCESS.2021.3103725","DOI":"10.1109\/ACCESS.2021.3103725"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805172"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN.2019.8899376"},{"key":"e_1_3_2_60_2","unstructured":"L. Diedrich L. Murati and A. Wiesmaier. 2015. Stream ciphers in the IoT: Grain and Trivium. First Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (SPIC\u201915)."},{"issue":"12","key":"e_1_3_2_61_2","first-page":"133","article-title":"Security analysis of a robust lightweight algorithm for securing data in Internet of Things Networks","volume":"12","author":"Al-Ahdal Abdulrazzaq HA","year":"2021","unstructured":"Abdulrazzaq HA Al-Ahdal et\u00a0al. 2021. Security analysis of a robust lightweight algorithm for securing data in Internet of Things Networks. Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, 12 (2021), 133\u2013143.","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_28"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","unstructured":"D. Stiawan M. Y. Idris R. F. Malik S. Nurmaini N. Alsharif R. Budiarto et\u00a0al. 2019. Investigating brute force attack patterns in IoT network. Journal of Electrical and Computer Engineering 2019 (2019) 1\u201313. DOI:10.1155\/2019\/4568368","DOI":"10.1155\/2019\/4568368"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.30880\/ijie.2018.10.06.026"},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","unstructured":"L. Y. Zhang Y. Liu C. Wang J. Zhou Y. Zhang and G. Chen. 2018. Improved known-plaintext attack to permutation-only multimedia ciphers. Information Sciences 430 (2018) 228\u2013239.","DOI":"10.1016\/j.ins.2017.11.021"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_11"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020015"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS49979.2021.9432667"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_10"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","unstructured":"S. L. Yeo D.-P. Le and K. Khoo. 2021. Improved algebraic attacks on lightweight block ciphers. Journal of Cryptographic Engineering 11 3\u20134 (2021) 1\u201319 DOI:10.1007\/s13389-020-00237-4","DOI":"10.1007\/s13389-020-00237-4"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1912651"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIBA50161.2020.9276932"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2019.8666557"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","unstructured":"D. A. F. Saraiva V. R. Q. Leithardt D. de Paula A. S. Mendes G. V. Gonz\u00e1lez and P. Crocker. 2019. PRISEC: Comparison of symmetric key algorithms for IoT devices. Sensors 19 19 (2019). DOI:10.3390\/s19194312","DOI":"10.3390\/s19194312"},{"key":"e_1_3_2_75_2","doi-asserted-by":"crossref","unstructured":"R. K. Muhammed R. R. Aziz A. A. Hassan A. M. Aladdin S. J. Saydah T. A. Rashid and B. A. Hassan. 2024. Comparative analysis of AES Blowfish Twofish Salsa20 and ChaCha20 for image encryption. arXiv preprint arXiv:2407.16274. https:\/\/arxiv.org\/abs\/2407.16274. Accessed: August 14 2025.","DOI":"10.36227\/techrxiv.172971943.34625654\/v2"},{"key":"e_1_3_2_76_2","unstructured":"A. Biryukov. 2004. Block ciphers and stream ciphers: The state of the art. Cryptology ePrint Archive. Paper 2004\/006."},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_34"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12120"},{"key":"e_1_3_2_79_2","unstructured":"M. Dworkin E. Barker J. Nechvatal J. Foti L. Bassham E. Roback and J. Dray. 2001. Advanced Encryption Standard (AES) Federal Inf. Process. Stds.(NIST FIPS) National Institute of Standards and Technology Gaithersburg MD. (2001)."},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2018.8650352"},{"key":"e_1_3_2_82_2","unstructured":"Packetizer. 2023. AES Crypt Downloads. Retrieved March 15 2025 from https:\/\/www.aescrypt.com\/download\/. (2023)."},{"key":"e_1_3_2_83_2","unstructured":"Rhys Weatherley. 2023. Arduino Cryptography Library 2023a. Retrieved March 16 2025 from https:\/\/rweather.github.io\/arduinolibs\/crypto.html. (2023)."},{"key":"e_1_3_2_84_2","unstructured":"Matej Sychra. 2023. AES Lab 2023. Retrieved January 16 2024 from https:\/\/docs.arduino.cc\/libraries\/aeslib\/. (2023)."},{"key":"e_1_3_2_85_2","unstructured":"NIST. 2001. Advanced Encryption Standard (AES). Retrieved February 13 2025 from https:\/\/nvlpubs.nist.gov\/nistpubs\/fips\/nist.fips.197.pdf. (2001)."},{"issue":"6","key":"e_1_3_2_86_2","first-page":"7","article-title":"Ascon v1. 2","volume":"5","author":"Dobraunig Christoph","year":"2016","unstructured":"Christoph Dobraunig, Maria Eichlseder, Florian Mendel, and Martin Schl\u00e4ffer. 2016. Ascon v1. 2. Submission to the CAESAR Competition 5, 6 (2016), 7.","journal-title":"Submission to the CAESAR Competition"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_20"},{"key":"e_1_3_2_88_2","unstructured":"ASCON. 2023. Ascon-C. Retrieved March 16 2025 from https:\/\/github.com\/rweather\/ascon-suite. (2023)."},{"key":"e_1_3_2_89_2","unstructured":"Rhys Weatherley. 2024. Ascon-Suite 2023b. Retrieved March 16 2025 from https:\/\/github.com\/ascon\/ascon-c. (2024)."},{"key":"e_1_3_2_90_2","unstructured":"Mathieu Degr\u00e9 Patrick Derbez Lucie Lahaye and Andr\u00e9 Schrottenloher. 2024. New models for the cryptanalysis of ASCON. Cryptology ePrint Archive Paper 2024\/298. (2024). Retrieved from https:\/\/eprint.iacr.org\/2024\/298. Accessed: August 14 2025."},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","unstructured":"C. Jnana Ramakrishna D. B. K. Reddy B. K. Priya P. P. Amritha and K. V. Lakshmy. 2024. Analysis of lightweight cryptographic algorithms for IoT gateways. Procedia Computer Science 233 (2024) 235\u2013242. DOI:10.1016\/j.procs.2024.03.213","DOI":"10.1016\/j.procs.2024.03.213"},{"key":"e_1_3_2_92_2","doi-asserted-by":"crossref","unstructured":"K. Aoki T. Ichikawa M. Kanda M. Matsui S. Moriai J. Nakajima and T. Tokita. 2000. Camellia: A 128-bit block cipher suitable for multiple platforms. Submission Documents to NESSIE Project. http:\/\/info.isl.ntt.co.jp\/camellia. Accessed: August 14 2025.","DOI":"10.1007\/3-540-44983-3_4"},{"key":"e_1_3_2_93_2","unstructured":"NTT and Mitsubishi Electric. 2000. Joint development of next-generation encryption algorithm \u201cCamellia\u201d by NTT and mitsubishi electric-symmetric block cipher achieves high security and world\u2019 highest efficiency. (2000). DOI:en\/newsrelease\/pdf\/news\/news00e\/0003\/000310.pdf. Accessed: August 14 2025."},{"key":"e_1_3_2_94_2","doi-asserted-by":"crossref","unstructured":"M. Matsui J. Nakajima and S. Moriai. 2004. RFC 3713: A description of the Camellia encryption algorithm. Internet Engineering Task Force (IETF). https:\/\/datatracker.ietf.org\/doc\/html\/rfc3713. Accessed: August 14 2025.","DOI":"10.17487\/rfc3713"},{"key":"e_1_3_2_95_2","doi-asserted-by":"crossref","unstructured":"A. Kato S. Moriai and M. Kanda. 2005. RFC 4312: The Camellia cipher algorithm and its use with IPsec. Internet Engineering Task Force (IETF). https:\/\/datatracker.ietf.org\/doc\/html\/rfc4312. Accessed: August 14 2025.","DOI":"10.17487\/rfc4312"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9056-0"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29101-2_6"},{"key":"e_1_3_2_98_2","unstructured":"aead. 2016. Camellia. Retrieved March 23 2025 from https:\/\/github.com\/aead\/camellia. (2016)."},{"key":"e_1_3_2_99_2","unstructured":"mirkoflchtt. 2017. CamelliaLib. Retrieved March 23 2025 from https:\/\/github.com\/mirkoflchtt\/CamelliaLib. (2017)."},{"key":"e_1_3_2_100_2","first-page":"181","volume-title":"Proceedings of the 14th International Workshop on Fast Software Encryption, FSE, Revised Selected Papers 14","author":"Shirai Taizo","year":"2007","unstructured":"Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata. 2007. The 128-bit blockcipher CLEFIA. In Proceedings of the 14th International Workshop on Fast Software Encryption, FSE, Revised Selected Papers 14. Springer, 181\u2013195."},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28496-0_17"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44706-7_1"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2365734"},{"key":"e_1_3_2_104_2","unstructured":"Federico Scarpa. 2016. Clefia 2016 . Retrieved February 10 2025 from https:\/\/github.com\/fedescarpa\/clefia. (2016)."},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.180"},{"key":"e_1_3_2_107_2","unstructured":"Lilian Bossuet. 2016. Lightweight block cipher implementations 2016. Retrieved March 13 2025 from https:\/\/perso.univ-st-etienne.fr\/bl16388h\/salware\/lightweight_block_cipher.htm. (2016)."},{"key":"e_1_3_2_108_2","unstructured":"Jeffrey Walton. 2023. Cryptopp 2023. Retrieved March 11 2025 from https:\/\/github.com\/weidai11\/cryptopp\/tree\/master. (2023)."},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2008.4542069"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.4018\/IJTHI.2016040105"},{"key":"e_1_3_2_111_2","unstructured":"Pass2774. 2023. ESP32IoT-Iceberg. Retrieved March 23 2025 from https:\/\/github.com\/pass2774\/ESP32IoT-Iceberg. (2023)."},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31410-0_11"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22497-3_31"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_19"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044958"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1007\/b103174"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/11604938_19"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_19"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","unstructured":"F. Zhang Y. Zhang H. Jiang X. Zhu S. Bhasin X. Zhao Z. Liu D. Gu and K. Ren. 2020. Persistent fault attack in practice. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 2 (2020) 172\u2013195. DOI:10.13154\/tches.v2020.i2.172-195","DOI":"10.13154\/tches.v2020.i2.172-195"},{"key":"e_1_3_2_121_2","doi-asserted-by":"crossref","unstructured":"S. Bhasin J. Breier X. Hou D. Jap R. Poussier and S. M. Sim. 2020. SITM: See-in-the-middle side-channel assisted middle round differential cryptanalysis on SPN block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 3 (2020) 95\u2013122.","DOI":"10.46586\/tches.v2020.i1.95-122"},{"key":"e_1_3_2_122_2","doi-asserted-by":"crossref","unstructured":"K. Keerthi I. Roy C. Rebeiro S. Hazra and S. Bhunia. 2020. FEDS: Comprehensive fault attack exploitability detection for software implementations of block ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems 2020 4 (2020) 272\u2013299.","DOI":"10.46586\/tches.v2020.i2.272-299"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","unstructured":"G. Hatzivasilis K. Fysarakis I. Papaefstathiou and C. Manifavas. 2018. A review of lightweight block ciphers. Journal of Cryptographic Engineering 8 2 (2018) 141\u2013184. DOI:10.1007\/s13389-017-0160-y","DOI":"10.1007\/s13389-017-0160-y"},{"issue":"3","key":"e_1_3_2_124_2","first-page":"172","article-title":"Analysis of ascon, drygascon, and shamash permutations","volume":"9","author":"Tezcan Cihangir","year":"2020","unstructured":"Cihangir Tezcan. 2020. Analysis of ascon, drygascon, and shamash permutations. International Journal of Information Security Science 9, 3 (2020), 172\u2013187.","journal-title":"International Journal of Information Security Science"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19208-1_32"},{"key":"e_1_3_2_126_2","doi-asserted-by":"crossref","unstructured":"R. Rohit K. Hu S. Sarkar and S. Sun. 2021. Misuse-free key-recovery and distinguishing attacks on 7-round ASCON. Cryptology ePrint Archive Paper 2021\/1629.","DOI":"10.46586\/tosc.v2021.i1.130-155"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15982-4_24"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.12.019"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38553-7_12"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12037"},{"key":"e_1_3_2_131_2","unstructured":"Leibo Li and Keting Jia. 2014. Improved meet-in-the-middle attacks on reduced-round camellia-192\/256. Cryptology ePrint Archive Paper 2014\/292. (2014). Retrieved from https:\/\/eprint.iacr.org\/2014\/292. Accessed: August 14 2025."},{"key":"e_1_3_2_132_2","first-page":"90","volume-title":"Proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009","author":"\u00d6zen Onur","year":"2009","unstructured":"Onur \u00d6zen, Kerem Var\u0131c\u0131, Cihangir Tezcan, and \u00c7elebi Kocair. 2009. Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009. Springer, 90\u2013107."},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24209-0_4"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.767445"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.01.007"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31410-0_10"},{"key":"e_1_3_2_137_2","first-page":"213","volume-title":"Proceedings of the 18th International Workshop on Selected Areas in Cryptography, SAC 2011, Revised Selected Papers 18","author":"\u00c5gren Martin","year":"2012","unstructured":"Martin \u00c5gren. 2012. Some instant-and practical-time related-key attacks on KTANTAN32\/48\/64. In Proceedings of the 18th International Workshop on Selected Areas in Cryptography, SAC 2011, Revised Selected Papers 18. Springer, 213\u2013229."},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-151"},{"key":"e_1_3_2_139_2","first-page":"493","volume-title":"Proceedings of the 2014 International Symposium on Information Theory and Its Applications","author":"Yoshikawa Hideki","year":"2014","unstructured":"Hideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda, and Toshinori Suzuki. 2014. Secret key reconstruction method using round addition DFA on lightweight block cipher LBlock. In Proceedings of the 2014 International Symposium on Information Theory and Its Applications. IEEE, 493\u2013496."},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_1"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2013.0549"},{"key":"e_1_3_2_142_2","unstructured":"Y. Kim and H. Yoon. 2014. First experimental result of power analysis attacks on a FPGA implementation of LEA. IACR Cryptology ePrint Archive. Report 2014\/999. https:\/\/eprint.iacr.org\/2014\/999. Accessed: August 14 2025."},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","unstructured":"E. Biham. 1994. New types of cryptanalytic attacks using related keys. Journal of Cryptology 7 4 (1994) 229\u2013246. DOI:10.1007\/BF00203965","DOI":"10.1007\/BF00203965"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/842675"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.5555\/1605262.1605265"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994028"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2012.760732"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_10"},{"key":"e_1_3_2_149_2","unstructured":"Y. Kim and H. Yoon. 2014. First experimental result of power analysis attacks on a FPGA implementation of LEA. IACR Cryptology ePrint Archive. Report 2014\/999. https:\/\/eprint.iacr.org\/2014\/999. Accessed: August 14 2025."},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEA49143.2020.9132950"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1213"},{"key":"e_1_3_2_152_2","unstructured":"J. Borghoff A. Canteaut T. G\u00fcneysu E. B. Kavun M. Kne\u017eevi\u0107 L. R. Knudsen G. Leander V. Nikov C. Paar C. Rechberger et\u00a0al. 2012. PRINCE - A low-latency block cipher for pervasive computing applications (full version). IACR Cryptology ePrint Archive. Report 2012\/529. https:\/\/eprint.iacr.org\/2012\/529. Accessed: August 14 2025."},{"key":"e_1_3_2_153_2","doi-asserted-by":"publisher","unstructured":"Y. Liu T. Zang D. Gu F. Zhao W. Li and Z. Liu. 2020. Improved cryptanalysis of reduced-version QARMA-64\/128. IEEE Access 8 (2020) 8361\u20138370. DOI:10.1109\/ACCESS.2020.2964259","DOI":"10.1109\/ACCESS.2020.2964259"},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3027789"},{"key":"e_1_3_2_155_2","unstructured":"W. Zhang Z. Bao D. Lin V. Rijmen B. Yang and I. Verbauwhede. 2014. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. IACR Cryptology ePrint Archive. Report 2014\/084. https:\/\/eprint.iacr.org\/2014\/084. Accessed: August 14 2025."},{"key":"e_1_3_2_156_2","unstructured":"S. Sinha and S. Karmakar. 2018. Differential fault analysis of RECTANGLE-80. IACR Cryptology ePrint Archive. Report 2018\/428 2018. https:\/\/eprint.iacr.org\/2018\/428. Accessed: August 14 2025."},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3358505.3358527"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","unstructured":"Fran\u00e7ois-Xavier Standaert Gilles Piret Neil Gershenfeld and Jean-Jacques Quisquater. 2006. SEA: A scalable encryption algorithm for small embedded applications. 222\u2013236. DOI:10.1007\/11733447_16","DOI":"10.1007\/11733447_16"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","unstructured":"S. Sadeghi M. Mahmoudzadeh Niknam N. Bagheri and M. R. Aref. 2025. Cryptanalysis of full-round SFN block cipher a lightweight block cipher targeting IoT systems. Scientia Iranica 32 1 (2025) 9. DOI:10.24200\/sci.2023.59581.6319","DOI":"10.24200\/sci.2023.59581.6319"},{"key":"e_1_3_2_160_2","unstructured":"S. Sadeghi and N. Bagheri. 2018. Cryptanalysis of SFN block cipher. IACR Cryptology ePrint Archive. Report 2018\/594. https:\/\/eprint.iacr.org\/2018\/594. Accessed: August 14 2025."},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.01.008"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.06.063"},{"key":"e_1_3_2_163_2","unstructured":"H. A. Alkhzaimi and M. M. Lauridsen. 2013. Cryptanalysis of the SIMON family of block ciphers. IACR Cryptology ePrint Archive. Report 2013\/543. https:\/\/eprint.iacr.org\/2013\/543. Accessed: August 14 2025."},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2014.14"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2014.6994030"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23098-1_4"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_17"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25516-8_23"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","unstructured":"A. Kumar and A. Aggarwal. 2012. Lightweight cryptographic primitives for mobile ad hoc networks. In Recent Trends in Computer Networks and Distributed Systems Security S. M. Thampi A. Y. Zomaya T. Strufe J. M. Alcaraz-Calero and T. Thomas (Eds.). Communications in Computer and Information Science Vol. 335. Heidelberg: Springer 240\u2013251. DOI:10.1007\/978-3-642-34135-9_25","DOI":"10.1007\/978-3-642-34135-9_25"},{"key":"e_1_3_2_170_2","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070432"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E96.A.1437"},{"key":"e_1_3_2_172_2","doi-asserted-by":"publisher","unstructured":"S. Das and D. RoyChowdhury. 2013. CAR30: A new scalable stream cipher with rule 30. Cryptography and Communications 5 2 (2013) 137\u2013162. DOI:10.1007\/s12095-012-0079-1","DOI":"10.1007\/s12095-012-0079-1"},{"issue":"2","key":"e_1_3_2_173_2","first-page":"179","article-title":"CAvium-strengthening trivium stream cipher using cellular automata.","volume":"7","author":"Karmakar Sandip","year":"2012","unstructured":"Sandip Karmakar, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury. 2012. CAvium-strengthening trivium stream cipher using cellular automata. Journal of Cellular Automata 7, 2 (2012), 179\u2013197.","journal-title":"Journal of Cellular Automata"},{"key":"e_1_3_2_174_2","unstructured":"A. R. Choudhuri and S. Maitra. 2016. Differential cryptanalysis of Salsa and ChaCha - an evaluation with a hybrid model. IACR Cryptology ePrint Archive 2016\/377. https:\/\/eprint.iacr.org\/2016\/377"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","unstructured":"S. Dey and S. Sarkar. 2021. A theoretical investigation on the distinguishers of Salsa and ChaCha. Discrete Applied Mathematics 302 (2021) 147\u2013162. DOI:10.1016\/j.dam.2021.06.017","DOI":"10.1016\/j.dam.2021.06.017"},{"key":"e_1_3_2_176_2","first-page":"1110","volume-title":"Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017","author":"Jungk Bernhard","year":"2017","unstructured":"Bernhard Jungk and Shivam Bhasin. 2017. Don\u2019t fall into a trap: Physical side-channel analysis of ChaCha20-Poly1305. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE, 1110\u20131115."},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2018.8605653"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoCICs58778.2023.10277110"},{"key":"e_1_3_2_179_2","doi-asserted-by":"crossref","unstructured":"N. Ghafoori and A. Miyaji. 2024. Higher-order differential-linear cryptanalysis of ChaCha stream cipher. IEEE Access 12 (2024) 13386\u201313399.","DOI":"10.1109\/ACCESS.2024.3356868"},{"key":"e_1_3_2_180_2","unstructured":"Martin Hell and Thomas Johansson. 2010. Security evaluation of stream cipher enocoro-128v2. (2010). Retrieved August 14 2025 from https:\/\/lucris.lub.lu.se\/ws\/portalfiles\/portal\/5976181\/2433492.pdf"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2339854"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_5"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.637"},{"key":"e_1_3_2_184_2","first-page":"191","article-title":"The stream cipher MICKEY 2.0","author":"Babbage Steve","year":"2006","unstructured":"Steve Babbage and Matthew Dodd. 2006. The stream cipher MICKEY 2.0. ECRYPT Stream Cipher (2006), 191\u2013209.","journal-title":"ECRYPT Stream Cipher"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2016.18"},{"key":"e_1_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.6109\/jicce.2014.12.4.237"},{"key":"e_1_3_2_187_2","unstructured":"S. Maitra G. Paul and W. Meier. 2015. Salsa20 cryptanalysis: New moves and revisiting old styles. IACR Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2015\/217. Accessed: August 14 2025."},{"key":"e_1_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23141-4_7"},{"key":"e_1_3_2_189_2","doi-asserted-by":"crossref","unstructured":"S. Rostami E. Shakour M. A. Orumiehchiha and J. Pieprzyk. 2019. Cryptanalysis of WG-8 and WG-16 stream ciphers. Cryptography and Communications 11 2 (2019) 351\u2013362.","DOI":"10.1007\/s12095-018-0298-1"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307202"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23951-9_23"},{"key":"e_1_3_2_192_2","unstructured":"Philipp Jovanovic. 2012. Piccolo 2012. Retrieved February 8 2025 from https:\/\/github.com\/Daeinar\/piccolo. (2012)."},{"key":"e_1_3_2_193_2","article-title":"PRESENT arduion","year":"2013","unstructured":"aczid. 2013. PRESENT arduion. Online. (2013). Retrieved March 31, 2025 from https:\/\/github.com\/aczid\/PRESENT_arduino","journal-title":"Online"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41332-2_7"},{"key":"e_1_3_2_195_2","first-page":"57","volume-title":"CRYPTO: Proceedings of the 34th Annual Cryptology Conference, Part I 34","author":"Albrecht Martin R.","year":"2014","unstructured":"Martin R. Albrecht et\u00a0al. 2014. Block ciphers\u2013focus on the linear layer (feat. PRIDE). In CRYPTO: Proceedings of the 34th Annual Cryptology Conference, Part I 34. Springer, 57\u201376."},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","unstructured":"R. Avanzi S. Banik O. Dunkelman M. Eichlseder S. Ghosh M. Nageler and F. Regazzoni. 2023. The QARMAv2 family of tweakable block ciphers. IACR Transactions on Symmetric Cryptology 2023 3 (2023) 25\u201373. DOI:10.46586\/tosc.v2023.i3.25-73","DOI":"10.46586\/tosc.v2023.i3.25-73"},{"key":"e_1_3_2_197_2","doi-asserted-by":"publisher","unstructured":"R. Avanzi. 2017. The QARMA block cipher family. Almost MDS matrices over rings with zero divisors nearly symmetric even-mansour constructions with non-involutory central rounds and search heuristics for low-latency s-boxes. IACR Transactions on Symmetric Cryptology 2017 1 (2017) 4\u201344. DOI:10.13154\/tosc.v2017.i1","DOI":"10.13154\/tosc.v2017.i1"},{"key":"e_1_3_2_198_2","unstructured":"Arm Community. 2016. Armv8-A architecture: 2016 additions. (Oct2016). Retrieved August 14 2025 from https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/armv8-a-architecture-2016-additions"},{"key":"e_1_3_2_199_2","unstructured":"R. Zong and X. Dong. 2016. Meet-in-the-middle attack on QARMA block cipher. IACR Cryptology ePrint Archive. Report 2016\/1160. https:\/\/eprint.iacr.org\/2016\/1160. Accessed: August 14 2025."},{"key":"e_1_3_2_200_2","unstructured":"Jinyan Xu. 2022. Qarma64 2022b. Retrieved March 12 2025 from https:\/\/github.com\/Phantom1003\/QARMA64. (2022)."},{"key":"e_1_3_2_201_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8663068"},{"key":"e_1_3_2_202_2","first-page":"572","volume-title":"Proceedings of the 2014 IEEE 5th International Conference on Communications and Electronics (ICCE)","author":"Hue Ta Thi Kim","year":"2014","unstructured":"Ta Thi Kim Hue, Thang Manh Hoang, and Dat Tran. 2014. Chaos-based S-box for lightweight block cipher. In Proceedings of the 2014 IEEE 5th International Conference on Communications and Electronics (ICCE). IEEE, 572\u2013577."},{"key":"e_1_3_2_203_2","first-page":"103","volume-title":"Proceedings of the 3rd International Conference on RFID Security-RFIDSec","volume":"2007","author":"Mace Franois","year":"2007","unstructured":"Franois Mace, Franois-Xavier Standaert, Jean-Jacques Quisquater, et\u00a0al. 2007. ASIC implementations of the block cipher sea for constrained applications. In Proceedings of the 3rd International Conference on RFID Security-RFIDSec, Vol. 2007. 103\u2013114."},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4269"},{"key":"e_1_3_2_205_2","unstructured":"ISO\/IEC. 2010. ISO\/IEC 18033-3:2010 Information technology \u2014 Security techniques \u2014 Encryption algorithms Part 3: Block ciphers. (Feb2010). Retrieved February 13 2025 from https:\/\/www.iso.org\/standard\/54531.html"},{"key":"e_1_3_2_206_2","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4269"},{"key":"e_1_3_2_207_2","article-title":"SEED encryption algorithm","year":"2005","unstructured":"KISA. 2005. SEED encryption algorithm. online. (2005). Retrieved August 14, 2025 from https:\/\/seed.kisa.or.kr\/kisa\/algorithm\/EgovSeedInfo.do","journal-title":"online"},{"key":"e_1_3_2_208_2","unstructured":"openssl. 2018. EVP_CIPHER-SEED. Retrieved March 23 2025 from https:\/\/docs.openssl.org\/master\/man7\/EVP_CIPHER-SEED\/#name. (2018)."},{"key":"e_1_3_2_209_2","doi-asserted-by":"publisher","unstructured":"L. Li B. Liu Y. Zhou and Y. Zou. 2018. SFN: A new lightweight block cipher. Microprocessors and Microsystems 60 (2018) 138\u2013150. DOI:10.1016\/j.micpro.2018.04.009","DOI":"10.1016\/j.micpro.2018.04.009"},{"key":"e_1_3_2_210_2","unstructured":"ISO\/IEC 29167-21:2018. 2018. Information technology \u2014 Automatic identification and data capture techniques Part 21: Crypto suite SIMON security services for air interface communications. (Apr2018). Retrieved February 13 2025 from https:\/\/www.iso.org\/standard\/70388.html"},{"key":"e_1_3_2_211_2","unstructured":"R. Beaulieu D. Shors J. Smith S. Treatman-Clark B. Weeks and L. Wingers. 2013. The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive. Report 2013\/404. https:\/\/eprint.iacr.org\/2013\/404. Accessed: August 14 2025."},{"key":"e_1_3_2_212_2","unstructured":"Calvin McCoy. 2018. Simon Speck Ciphers 2018. Retrieved March 14 2025 from https:\/\/github.com\/inmcm\/Simon_Speck_Ciphers. (2018)."},{"key":"e_1_3_2_213_2","doi-asserted-by":"publisher","unstructured":"B. Aboushosha R. A. Ramadan A. D. Dwivedi A. El-Sayed and M. M. Dessouky. 2020. SLIM: A lightweight block cipher for internet of health things. IEEE Access 8 (2020) 203747\u2013203757. DOI:10.1109\/ACCESS.2020.3036589","DOI":"10.1109\/ACCESS.2020.3036589"},{"key":"e_1_3_2_214_2","unstructured":"Je Sen.2022. Slim-cipher 2022. Retrieved March 14 2025 from https:\/\/github.com\/CryptoUSM\/slim-cipher. (2022)."},{"key":"e_1_3_2_215_2","first-page":"1","article-title":"Block ciphers for the IoT\u2013SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared","author":"Appel Michael","year":"2016","unstructured":"Michael Appel, Andreas Bossert, Steven Cooper, Tobias Ku\u00dfmaul, Johannes L\u00f6ffler, Christof Pauer, and Alexander Wiesmaier. 2016. Block ciphers for the IoT\u2013SIMON, SPECK, KATAN, LED, TEA, PRESENT, and SEA compared. Proc. Appel Block CF (2016), 1\u201337.","journal-title":"Proc. Appel Block CF"},{"key":"e_1_3_2_216_2","unstructured":"Denhart. 2010. Tea Encryption on Arduino 2010. Retrieved February 14 2025 from https:\/\/github.com\/dkobia\/TEA-encryption-on-arduino. (2010)."},{"key":"e_1_3_2_217_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_28"},{"key":"e_1_3_2_218_2","unstructured":"Michal Protasowicki.2021. XTEA Cipher 2021. Retrieved February 19 2025 from https:\/\/docs.arduino.cc\/libraries\/xtea-cipher\/?queryID=undefined. (2021)."},{"key":"e_1_3_2_219_2","doi-asserted-by":"crossref","unstructured":"J. Lu. 2009. Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8 1 (2009) 1\u201311.","DOI":"10.1007\/s10207-008-0059-9"},{"key":"e_1_3_2_220_2","unstructured":"NIST SP 800-232 IPD. 2024. Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption Hash and Extendable Output Functions. (Nov2024). Retrieved August 14 2025 from https:\/\/csrc.nist.gov\/pubs\/sp\/800\/232\/ipd"},{"key":"e_1_3_2_221_2","article-title":"Information security \u2014 Lightweight cryptography Part 2: Block ciphers","author":"29192-2 ISO\/IEC","year":"2019","unstructured":"ISO\/IEC 29192-2. 2019. Information security \u2014 Lightweight cryptography Part 2: Block ciphers. Online. (Feb2019). Retrieved August 14, 2025 from https:\/\/www.iso.org\/standard\/78477.html","journal-title":"Online"},{"key":"e_1_3_2_222_2","unstructured":"Julian Harttung. 2017. Mcrypton-vhdl 2017. Retrieved March 10 2025 from https:\/\/github.com\/huljar\/mcrypton-vhdl. (2017)."},{"key":"e_1_3_2_223_2","unstructured":"Adithya Pokala. 2020. Piccolo Cipher 2020. Retrieved February 12 2025 from https:\/\/github.com\/adipokala\/piccolo-cipher. (2020)."},{"key":"e_1_3_2_224_2","unstructured":"Julian Harttung. 2016. Prince-vhdl. Retrieved March 02 2025 from https:\/\/github.com\/huljar\/prince-vhdl. (2016)."},{"key":"e_1_3_2_225_2","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2011.5764619"},{"key":"e_1_3_2_226_2","unstructured":"Q. Chai X. Fan and G. Gong. 2011. An ultra-efficient key recovery attack on the lightweight stream cipher A2U2. IACR Cryptology ePrint Archive. Report 2011\/247. https:\/\/eprint.iacr.org\/2011\/247. Accessed: August 14 2025."},{"key":"e_1_3_2_227_2","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626238"},{"key":"e_1_3_2_228_2","unstructured":"M. \u00c5gren. 2012. On some symmetric lightweight cryptographic designs. Department of Electrical and Information Technology. Lund University Sweden."},{"key":"e_1_3_2_229_2","unstructured":"J. Jose S. Das and D. Roy Chowdhury. 2016. Prevention of fault attacks in cellular automata based stream ciphers. Journal of Cellular Automata 12 1\/2 (2016) 141\u2013157."},{"key":"e_1_3_2_230_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1399"},{"key":"e_1_3_2_231_2","unstructured":"A. John S. K. M. Reddy and J. Jose. 2022. Fault resistant Trivium-like stream cipher using higher radii cellular automata. Journal of Cellular Automata 16 5\u20136 (2022) 463\u2013490."},{"key":"e_1_3_2_232_2","unstructured":"marcizhu. 2020. ChaCha20. Retrieved March 23 2025 from https:\/\/github.com\/marcizhu\/ChaCha20. (2020)."},{"key":"e_1_3_2_233_2","unstructured":"haiwen. 2020. Allow ChaCha20 type ciphers to avoid crippling servers without AES hardware acceleration. Retrieved March 23 2025 from https:\/\/github.com\/haiwen\/seadroid\/issues\/903. (2020)."},{"key":"e_1_3_2_234_2","doi-asserted-by":"publisher","unstructured":"Y. Nir and A. Langley. 2015. ChaCha20 and Poly1305 for IETF Protocols. RFC 8439 RFC Editor. DOI:10.17487\/RFC8439","DOI":"10.17487\/RFC8439"},{"key":"e_1_3_2_235_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISITA.2010.5649627"},{"key":"e_1_3_2_236_2","doi-asserted-by":"publisher","unstructured":"M. Robshaw. 2008. The eSTREAM project. In New Stream Cipher Designs: The eSTREAM Finalists M. Robshaw and O. Billet (Eds.). Lecture Notes in Computer Science Vol. 4986. 1\u20136. DOI:10.1007\/978-3-540-68351-3_1","DOI":"10.1007\/978-3-540-68351-3_1"},{"key":"e_1_3_2_237_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-024-00367-z"},{"key":"e_1_3_2_238_2","article-title":"Enocoro128 v2","author":"Ballo Tiemoko","year":"2021","unstructured":"Tiemoko Ballo. 2021. Enocoro128 v2. Online. (2021). Retrieved March 12, 2025 from https:\/\/github.com\/entropic-security\/enocoro128v2","journal-title":"Online"},{"key":"e_1_3_2_239_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2011.044106"},{"key":"e_1_3_2_240_2","doi-asserted-by":"crossref","unstructured":"M. Wro\u0144ski E. Burek and M. Le\u015bniak. 2023. (In) security of stream ciphers against quantum annealing attacks on the example of the Grain-128 and Grain-128a ciphers. IACR Cryptology ePrint Archive. Report 2023\/1502 2023. https:\/\/eprint.iacr.org\/2023\/1502. Accessed: August 14 2025.","DOI":"10.1109\/TETC.2024.3474856"},{"key":"e_1_3_2_241_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2256419"},{"key":"e_1_3_2_242_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35423-7_25"},{"key":"e_1_3_2_243_2","article-title":"Grain128 AEAD","author":"S\u00f6nnerup Jonathan","year":"2021","unstructured":"Jonathan S\u00f6nnerup. 2021. Grain128 AEAD. Online. (2021). Retrieved March 12, 2025 from https:\/\/github.com\/Noxet\/Grain-128AEAD","journal-title":"Online"},{"key":"e_1_3_2_244_2","volume-title":"Proceedings of the Workshop on the State of the Art of Stream Ciphers (SACS\u201908)","author":"Good Tim","year":"2008","unstructured":"Tim Good and Mohammed Benaissa. 2008. Hardware performance of eStream phase-III stream cipher candidates. In Proceedings of the Workshop on the State of the Art of Stream Ciphers (SACS\u201908)."},{"key":"e_1_3_2_245_2","article-title":"Crypto Mickey 2.0","author":"Tuteja Mridul","year":"2018","unstructured":"Mridul Tuteja. 2018. Crypto Mickey 2.0. Online. (2018). Retrieved March 12, 2025 from https:\/\/github.com\/mridultuteja\/crypto-mickey-2.0","journal-title":"Online"},{"key":"e_1_3_2_246_2","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.5.1278-1283"},{"key":"e_1_3_2_247_2","doi-asserted-by":"publisher","DOI":"10.2991\/icmii-15.2015.25"},{"key":"e_1_3_2_248_2","doi-asserted-by":"publisher","unstructured":"A. A. Kuznetsov O. V. Potii N. A. Poluyanenko Y. I. Gorbenko and N. Kryvinska. 2022. Analysis of standardized algorithms for streaming cryptographic convention defined in ISO\/IEC 18033-4. In Stream Ciphers in Modern Real-time IT Systems: Analysis Design and Comparative Studies A. A. Kuznetsov O. V. Potii N. A. Poluyanenko Y. I. Gorbenko and N. Kryvinska (Eds.). Studies in Systems Decision and Control Vol. 375. Cham: Springer 2022 111\u2013163. DOI:10.1007\/978-3-030-79770-6_8","DOI":"10.1007\/978-3-030-79770-6_8"},{"key":"e_1_3_2_249_2","unstructured":"M. Boesgaard M. Vesterager T. Christensen and E. Zenner. 2005. The stream cipher Rabbit. ECRYPT Stream Cipher Project Report Report 2005\/006. 28."},{"key":"e_1_3_2_250_2","article-title":"Rabbit Cipher","author":"Daga Vaibhav","year":"2016","unstructured":"Vaibhav Daga. 2016. Rabbit Cipher. Online. (2016). Retrieved March 13, 2025 from https:\/\/github.com\/vbdaga\/Rabbit-Cipher","journal-title":"Online"},{"key":"e_1_3_2_251_2","article-title":"Rabbit Light Weight Stream Cipher","author":"Tuteja Mridul","year":"2024","unstructured":"Mridul Tuteja. 2024. Rabbit Light Weight Stream Cipher. Online. (2024). Retrieved March 10, 2025 from https:\/\/asecuritysite.com\/stream\/rabbit","journal-title":"Online"},{"key":"e_1_3_2_252_2","doi-asserted-by":"publisher","unstructured":"D. J. Bernstein. 2008. The Salsa20 family of stream ciphers. In New Stream Cipher Designs: The eSTREAM Finalists M. Robshaw and O. Billet (Eds.). Lecture Notes in Computer Science Vol. 4986. Heidelberg: Springer. 84\u201397. DOI:10.1007\/978-3-540-68351-3_8","DOI":"10.1007\/978-3-540-68351-3_8"},{"key":"e_1_3_2_253_2","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob.2016.7811443"},{"key":"e_1_3_2_254_2","article-title":"Salsa20","author":"Weber Alex","year":"2016","unstructured":"Alex Weber. 2016. Salsa20. Online. (2016). Retrieved March 15, 2025 from https:\/\/github.com\/alexwebr\/salsa20","journal-title":"Online"},{"key":"e_1_3_2_255_2","article-title":"Salsa20 C++","author":"Ildus Nezametdinov","year":"2015","unstructured":"Nezametdinov Ildus. 2015. Salsa20 C++. Online. (2015). Retrieved March 16, 2025 from https:\/\/github.com\/everard\/Salsa20","journal-title":"Online"},{"key":"e_1_3_2_256_2","unstructured":"N. Mentens J. Genoe L. Batina and I. Verbauwhede. 2008. A low-cost implementation of Trivium. In Pre-proceedings of SASC 2008 - The State of the Art of Stream Ciphers K.U. Leuven and IBBT. 197\u2013204."},{"key":"e_1_3_2_257_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36157-9_12"},{"key":"e_1_3_2_258_2","doi-asserted-by":"publisher","unstructured":"F. E. Potestad-Ord\u00f3\u00f1ez M. Valencia-Barrero C. Baena-Oliva P. Parra-Fern\u00e1ndez and C. J. Jim\u00e9nez-Fern\u00e1ndez. 2020. Breaking Trivium stream cipher implemented in ASIC using experimental attacks and DFA. Sensors 20 23 (2020) 6909. DOI:10.3390\/s20236909","DOI":"10.3390\/s20236909"},{"key":"e_1_3_2_259_2","article-title":"Trivium Light Weight Stream Cipher","author":"Buchanan William J.","year":"2024","unstructured":"William J. Buchanan. 2024. Trivium Light Weight Stream Cipher. Online. (2024). Retrieved January 28, 2025 from https:\/\/asecuritysite.com\/encryption\/trivium","journal-title":"Online"},{"key":"e_1_3_2_260_2","article-title":"ISO\/IEC 29192-3:2012","year":"2012","unstructured":"ISO\/IEC. 2012. ISO\/IEC 29192-3:2012. Online. (Feb2012). Retrieved August 14, 2025 from https:\/\/www.iso.org\/standard\/56426.html","journal-title":"Online"},{"key":"e_1_3_2_261_2","unstructured":"ISO\/IEC. 2011. ISO\/IEC 18033-4:2011 Information technology \u2014 Security techniques \u2014 Encryption algorithms - Part 4: Stream ciphers. (Feb2011). Retrieved February 13 2025 from https:\/\/www.iso.org\/standard\/54532.html"},{"key":"e_1_3_2_262_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46828-6_3"},{"key":"e_1_3_2_263_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307202"},{"key":"e_1_3_2_264_2","doi-asserted-by":"publisher","unstructured":"NIST. 2024. NIST IR 8547 - Transition to Post-Quantum Cryptography Standards. (2024). DOI:10.6028\/NIST.IR.8547.ipd. Accessed date: August 14 2025.","DOI":"10.6028\/NIST.IR.8547.ipd"},{"key":"e_1_3_2_265_2","unstructured":"NIST. 2024. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. (Feb2024). Retrieved August 14 2025 from https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final"},{"key":"e_1_3_2_266_2","unstructured":"NIST. 2024. FIPS 204: Module-Lattice-Based Digital Signature Standard. (Aug2024). Retrieved August 14 2025 from https:\/\/csrc.nist.gov\/pubs\/fips\/204\/ipd"},{"key":"e_1_3_2_267_2","unstructured":"NIST. 2023. FIPS 205: Stateless Hash-Based Digital Signature Standard. (Aug2023). Retrieved August 14 2025 from https:\/\/csrc.nist.gov\/pubs\/fips\/205\/ipd"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T22:51:26Z","timestamp":1757026286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,4]]},"references-count":266,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3757734"],"URL":"https:\/\/doi.org\/10.1145\/3757734","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,4]]},"assertion":[{"value":"2024-04-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-16","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}