{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:35:34Z","timestamp":1772642134599,"version":"3.50.1"},"reference-count":11,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T00:00:00Z","timestamp":1577750400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Military Crypto Research Center","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}]},{"DOI":"10.13039\/501100003626","name":"Defense Acquisition Program Administration","doi-asserted-by":"publisher","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100003626","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005073","name":"Agency for Defense Development","doi-asserted-by":"publisher","award":["UD170109ED"],"award-info":[{"award-number":["UD170109ED"]}],"id":[{"id":"10.13039\/501100005073","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,12,31]]},"abstract":"<jats:p>Recent lightweight block cipher competition (FELICS Triathlon) evaluates efficient implementations of block ciphers for Internet of things (IoT) environment. In the competition, the implementation of HIGHT block cipher achieved the most efficient lightweight block cipher, in terms of code size (ROM), memory (RAM), and execution time. In this paper, we further investigate lightweight features of HIGHT block cipher and present the optimized implementations of both software and hardware for low-end IoT platforms, including resource-constrained devices (8-bit AVR and 32-bit ARM Cortex-M3) and application-specific integrated circuit (ASIC). By using proposed optimization methods, the implemented HIGHT block cipher shows better performance compared to previous state-of-the-art implementations.<\/jats:p>","DOI":"10.1155\/2019\/5323578","type":"journal-article","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T18:32:51Z","timestamp":1577817171000},"page":"1-10","source":"Crossref","is-referenced-by-count":20,"title":["Compact Implementations of HIGHT Block Cipher on IoT Platforms"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2858-571X","authenticated-orcid":true,"given":"Bohun","family":"Kim","sequence":"first","affiliation":[{"name":"Korea University, Electrical Engineering, Seoul 136-701, Republic of Korea"}]},{"given":"Junghoon","family":"Cho","sequence":"additional","affiliation":[{"name":"Korea University, Electrical Engineering, Seoul 136-701, Republic of Korea"}]},{"given":"Byungjun","family":"Choi","sequence":"additional","affiliation":[{"name":"Korea University, Electrical Engineering, Seoul 136-701, Republic of Korea"}]},{"given":"Jongsun","family":"Park","sequence":"additional","affiliation":[{"name":"Korea University, Electrical Engineering, Seoul 136-701, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":true,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[{"name":"Hansung University, IT Engineering, 116 Samseong-Yoro-16-Gil Seongbuk-gu, Seoul 136-792, Republic of Korea"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_4"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13051-4_19"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.180"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-76481-8_16"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_33"},{"key":"9","first-page":"3","volume-title":"The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers","year":"2014"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05149-9_1"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13858-4_5"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/3173455"},{"issue":"8","key":"14","first-page":"1133","volume":"22","year":"2018","journal-title":"Journal of the Korea Institute of Information and Communication Engineering"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/mdt.2007.178"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5323578.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5323578.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/5323578.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T18:32:58Z","timestamp":1577817178000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/5323578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,31]]},"references-count":11,"alternative-id":["5323578","5323578"],"URL":"https:\/\/doi.org\/10.1155\/2019\/5323578","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,31]]}}}