{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:58:46Z","timestamp":1772906326632,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:00:00Z","timestamp":1748563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T00:00:00Z","timestamp":1748563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Symbiosis International"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"DOI":"10.1186\/s13635-025-00204-8","type":"journal-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T17:32:12Z","timestamp":1748626332000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A novel lightweight hybrid cryptographic framework for secure smart card operations"],"prefix":"10.1186","volume":"2025","author":[{"given":"Kranthi Kumar","family":"Singamaneni","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,30]]},"reference":[{"key":"204_CR1","doi-asserted-by":"publisher","first-page":"37703","DOI":"10.1109\/ACCESS.2025.3546147","volume":"13","author":"M Cetintav","year":"2025","unstructured":"M. Cetintav, M.T. Sandikkaya, A review of lightweight IoT authentication protocols from the perspective of security requirements, computation, communication, and hardware costs. IEEE Access. 13, 37703\u201337723 (2025). https:\/\/doi.org\/10.1109\/ACCESS.2025.3546147","journal-title":"IEEE Access."},{"issue":"1","key":"204_CR2","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s42979-023-02486-6","volume":"5","author":"SA Ajagbe","year":"2024","unstructured":"S.A. Ajagbe, O.D. Adeniji, A.A. Olayiwola, S.F. Abiona, Advanced encryption standard (AES)-based text encryption for near field communication (NFC) using Huffman compression. SN Comput Sci. 5(1), 156 (2024)","journal-title":"SN Comput Sci."},{"key":"204_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109330","volume":"118","author":"AE Adeniyi","year":"2024","unstructured":"A.E. Adeniyi, R.G. Jimoh, J.B. Awotunde, A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security. Comput. Electr. Eng. 118, 109330 (2024)","journal-title":"Comput. Electr. Eng."},{"key":"204_CR4","doi-asserted-by":"publisher","first-page":"3148","DOI":"10.1109\/TIFS.2024.3361219","volume":"19","author":"X Zhang","year":"2024","unstructured":"X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang, N. Yu, Provably secure public-key steganography based on elliptic curve cryptography. IEEE Trans. Inf. Forensics Secur. 19, 3148\u20133163 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"204_CR5","first-page":"118","volume":"144","author":"Y Zhong","year":"2024","unstructured":"Y. Zhong, J. Gu, Lightweight block ciphers for resource-constrained environments: A comprehensive survey. Future Gener Comput Syst. 144, 118\u2013134 (2024)","journal-title":"Future Gener Comput Syst."},{"issue":"23","key":"204_CR6","doi-asserted-by":"publisher","first-page":"7502","DOI":"10.3390\/s24237502","volume":"24","author":"CT Ngo","year":"2024","unstructured":"C.T. Ngo, H.W. Ko, J.W. Choi, J.W. Nam, J.P. Hong, A lightweight and high-yield CMOS true random number generator with lightweight PHOTON post-processing. Sensors. 24(23), 7502 (2024)","journal-title":"Sensors."},{"issue":"23","key":"204_CR7","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/electronics13234767","volume":"13","author":"A Sevin","year":"2024","unstructured":"A. Sevin, \u00dc. \u00c7avu\u015fo\u011flu, Design and performance analysis of a SPECK-based lightweight hash function. Electronics 13(23), 4767 (2024)","journal-title":"Electronics"},{"key":"204_CR8","doi-asserted-by":"publisher","first-page":"68114","DOI":"10.1109\/ACCESS.2024.3385449","volume":"12","author":"K Sasikumar","year":"2024","unstructured":"K. Sasikumar, S. Nagarajan, Comprehensive review and analysis of cryptography techniques in cloud computing. IEEE Access. 12, 68114\u201368129 (2024)","journal-title":"IEEE Access."},{"key":"204_CR9","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.procs.2024.03.213","volume":"233","author":"CJ Ramakrishna","year":"2024","unstructured":"C.J. Ramakrishna, D.B.K. Reddy, B.K. Priya, P.P. Amritha, K.V. Lakshmy, Analysis of lightweight cryptographic algorithms for IoT gateways. Procedia Comput Sci. 233, 235\u2013242 (2024)","journal-title":"Procedia Comput Sci."},{"issue":"12","key":"204_CR10","doi-asserted-by":"publisher","first-page":"4008","DOI":"10.3390\/s24124008","volume":"24","author":"I Radhakrishnan","year":"2024","unstructured":"I. Radhakrishnan, S. Jadon, P.B. Honnavalli, Efficiency and security evaluation of lightweight cryptographic algorithms for resource-constrained IoT devices. Sensors. 24(12), 4008 (2024)","journal-title":"Sensors."},{"key":"204_CR11","doi-asserted-by":"publisher","unstructured":"Sanal, P., Karagoz, E., Seo, H., Azarderakhsh, R., Mozaffari-Kermani, M. (2021). Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-90022-9_23.","DOI":"10.1007\/978-3-030-90022-9_23"},{"key":"204_CR12","unstructured":"Canto AC, Kaur J, Kermani MM, Azarderakhsh R. Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security. arXiv preprint arXiv:2305.13544. 2023 May 22."},{"key":"204_CR13","doi-asserted-by":"publisher","unstructured":"B. Koziel, R. Azarderakhsh and M. M. Kermani, \"A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography,\" in IEEE Transactions on Computers, vol. 67, no. 11, pp. 1594\u20131609,2018, https:\/\/doi.org\/10.1109\/TC.2018.2815605.","DOI":"10.1109\/TC.2018.2815605"},{"issue":"11","key":"204_CR14","doi-asserted-by":"publisher","first-page":"4648","DOI":"10.1109\/TCSI.2021.3106639","volume":"68","author":"M Bisheh-Niasar","year":"2021","unstructured":"M. Bisheh-Niasar, R. Azarderakhsh, M. Mozaffari-Kermani, Instruction-Set Accelerated Implementation of CRYSTALS-Kyber. IEEE Trans. Circuits Syst. I Regul. Pap. 68(11), 4648\u20134659 (2021). https:\/\/doi.org\/10.1109\/TCSI.2021.3106639","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"4","key":"204_CR15","first-page":"2053","volume":"16","author":"S Ali","year":"2024","unstructured":"S. Ali, F. Anwer, Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes. Int. J. Inf. Technol. 16(4), 2053\u20132067 (2024)","journal-title":"Int. J. Inf. Technol."},{"key":"204_CR16","doi-asserted-by":"publisher","first-page":"101314","DOI":"10.1016\/j.iot.2024.101314","volume":"27","author":"O Popoola","year":"2024","unstructured":"O. Popoola, M.A. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehai, J. Popoola, An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security. Internet Things. 27, 101314 (2024)","journal-title":"Internet Things."},{"issue":"3","key":"204_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.7494\/csci.2024.25.3.6082","volume":"25","author":"A Kova\u010devi\u0107","year":"2024","unstructured":"A. Kova\u010devi\u0107, M. Sara\u010devi\u0107, A. Hasic, Biometrics-based generation of Diffie-Hellman key exchange parameters. Comput Sci. 25(3), 77\u201385 (2024)","journal-title":"Comput Sci."},{"issue":"3","key":"204_CR18","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.26599\/TST.2024.9010028","volume":"30","author":"C Wang","year":"2024","unstructured":"C. Wang, J. Yu, Z. Pei, Q. Wang, C. Hong, A first successful factorization of RSA-2048 integer by D-Wave quantum computer. Tsinghua Sci Technol. 30(3), 1270\u20131282 (2024)","journal-title":"Tsinghua Sci Technol."},{"issue":"5","key":"204_CR19","doi-asserted-by":"publisher","first-page":"5826","DOI":"10.1109\/TNSM.2024.3419431","volume":"21","author":"KK Saha","year":"2024","unstructured":"K.K. Saha, S. Ray, M. Dasgupta, ECMHP: ECC-based secure handshake protocol for multicasting in CCN-IoT environment. IEEE Trans. Netw. Serv. Manag. 21(5), 5826\u20135842 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3419431","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"6","key":"204_CR20","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1109\/TCSI.2024.3384414","volume":"71","author":"D Owens","year":"2024","unstructured":"D. Owens, R.E. Khatib, M. Bisheh-Niasar, R. Azarderakhsh, M.M. Kermani, Efficient and side-channel resistant Ed25519 on ARM Cortex-M4. IEEE Trans Circuits Syst I. 71(6), 2674\u20132686 (2024). https:\/\/doi.org\/10.1109\/TCSI.2024.3384414","journal-title":"IEEE Trans Circuits Syst I."},{"issue":"6","key":"204_CR21","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/4236.895016","volume":"4","author":"R Perlman","year":"2000","unstructured":"R. Perlman, C. Kaufman, Key exchange in IPSec: analysis of IKE. IEEE Internet Comput. 4(6), 50\u201356 (2000). https:\/\/doi.org\/10.1109\/4236.895016","journal-title":"IEEE Internet Comput."},{"issue":"9","key":"204_CR22","doi-asserted-by":"publisher","first-page":"11449","DOI":"10.1109\/TII.2024.3399915","volume":"20","author":"Y Wu","year":"2024","unstructured":"Y. Wu, H. Guo, Y. Han, S. Li, J. Liu, A security-enhanced authentication and key agreement protocol in smart grid. IEEE Trans Ind Inform. 20(9), 11449\u201311457 (2024). https:\/\/doi.org\/10.1109\/TII.2024.3399915","journal-title":"IEEE Trans Ind Inform."},{"key":"204_CR23","doi-asserted-by":"publisher","first-page":"13499","DOI":"10.1007\/s11227-024-05962-9","volume":"80","author":"Y Song","year":"2024","unstructured":"Y. Song, H. Gao, S. Wang et al., Token open secure and practical NTRU-based updatable encryption. J. Supercomput. 80, 13499\u201313532 (2024). https:\/\/doi.org\/10.1007\/s11227-024-05962-9","journal-title":"J. Supercomput."},{"key":"204_CR24","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.1007\/s10623-024-01368-z","volume":"92","author":"K Lin","year":"2024","unstructured":"K. Lin, J. Lin, S. Cai et al., Compressed M-SIDH: An instance of compressed SIDH-like schemes with isogenies of highly composite degrees. Des. Codes Cryptogr. 92, 1823\u20131843 (2024). https:\/\/doi.org\/10.1007\/s10623-024-01368-z","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"204_CR25","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/TCSI.2024.3443238","volume":"72","author":"T-H Nguyen","year":"2025","unstructured":"T.-H. Nguyen, D.-T. Dam, P.-P. Duong, B. Kieu-Do-Nguyen, C.-K. Pham, T.-T. Hoang, Efficient hardware implementation of the lightweight CRYSTALS-Kyber. IEEE Trans. Circuits Syst. I Regul. Pap. 72(2), 610\u2013622 (2025). https:\/\/doi.org\/10.1109\/TCSI.2024.3443238","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"204_CR26","doi-asserted-by":"publisher","unstructured":"Gu S, et al. A low latency and high throughput hardware design of random matrix number generator for FrodoKEM. In: 2024 IEEE 17th International Conference on Solid-State & Integrated Circuit Technology (ICSICT); 2024 Nov 7\u20139; Zhuhai, China. p. 1\u20133. https:\/\/doi.org\/10.1109\/ICSICT62049.2024.10831677.","DOI":"10.1109\/ICSICT62049.2024.10831677"},{"key":"204_CR27","doi-asserted-by":"publisher","unstructured":"Filho DL G, et al. PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs. In: 2024 IEEE 31st Symposium on Computer Arithmetic (ARITH); 2024 Jul 6\u20139; Malaga, Spain. p. 9\u201316. https:\/\/doi.org\/10.1109\/ARITH61463.2024.00012.","DOI":"10.1109\/ARITH61463.2024.00012"},{"issue":"1","key":"204_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s13389-023-00337-x","volume":"14","author":"LA Ribeiro","year":"2024","unstructured":"L.A. Ribeiro, J.P. da Silva Lima, R.J. de Queiroz, A.B. Chagas, J.R. Junior, J.P. Quintino et al., SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures. J. Cryptogr. Eng. 14(1), 35\u201341 (2024)","journal-title":"J. Cryptogr. Eng."},{"issue":"3","key":"204_CR29","first-page":"322","volume":"23","author":"MN Alenezi","year":"2024","unstructured":"M.N. Alenezi, H. Alabdulrazzaq, H.M. Alhatlani, F.A. Alobaid, On the performance of AES algorithm variants. Int. J. Inf. Comput. Secur. 23(3), 322\u2013337 (2024)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"204_CR30","doi-asserted-by":"crossref","unstructured":"Basco JZE, Romualdo AF, Saluta JA, Santiago Jr CS, Marfil RM. Comparison of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) in security issues of cloud computing: a literature review. In: International Conference on Frontiers of Intelligent Computing: Theory and Applications; 2024 Jun; Singapore. Springer Nature Singapore; p. 189\u2013200.","DOI":"10.1007\/978-981-96-0147-9_16"},{"key":"204_CR31","doi-asserted-by":"crossref","unstructured":"Shi K, Wang C, Cheng J, Liu W, Sun N, Zhao H, et al. State\u2010of\u2010the\u2010art 3DES pipelined cryptographic engine design against side\u2010channel attacks. Int J Circuit Theory Appl. 2024;52(2).","DOI":"10.1002\/cta.4291"},{"key":"204_CR32","doi-asserted-by":"crossref","unstructured":"Saeed A, Tran B, Khalid M, Mujahid U, Najam-ul-Islam M. On ISO-29167: Speck. ICT for Intelligent Systems: Proceedings of ICTIS 2024. 2024;1(1):1\u20131.","DOI":"10.1007\/978-981-97-5799-2_1"},{"issue":"2","key":"204_CR33","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00236-024-00455-x","volume":"61","author":"H Li","year":"2024","unstructured":"H. Li, D. Qiu, L. Luo, P. Mateus, Exact distributed quantum algorithm for generalized Simon\u2019s problem. Acta Informatica 61(2), 131\u2013159 (2024)","journal-title":"Acta Informatica"},{"key":"204_CR34","unstructured":"Singh S, et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges, and solutions. J Ambient Intell Humaniz Comput. 2024;1\u201318."},{"key":"204_CR35","doi-asserted-by":"crossref","unstructured":"Sri Yugenther B, Anila Glory H, Naresh Kumar H, Sivaraman R, Shankar Sriram VS. Augmenting security in edge devices: FPGA-based enhanced LEA algorithm with S-box and chaotic functions. In: International Conference on Applications and Techniques in Information Security; 2024 Nov; Singapore. Springer Nature Singapore; p. 119\u201331.","DOI":"10.1007\/978-981-97-9743-1_9"},{"issue":"6","key":"204_CR36","first-page":"1","volume":"14","author":"S Atanov","year":"2024","unstructured":"S. Atanov, Y. Seitkulov, K. Moldamurat, B. Yergaliyeva, A. Kyzyrkanov, Z. Seitbattalov, About one lightweight encryption algorithm ensuring the security of data transmission and communication between internet of things devices. Int J Electr Comput Eng. 14(6), 1\u201310 (2024)","journal-title":"Int J Electr Comput Eng."},{"key":"204_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40031-024-01067-2","volume":"105","author":"HR Nagesh","year":"2024","unstructured":"H.R. Nagesh, A. Poojari, V.G.K. Kumar, Design, implementation and analysis of HIBRI cipher on IoT platforms. J Inst Eng India Ser B. 105, 1\u201313 (2024). https:\/\/doi.org\/10.1007\/s40031-024-01067-2","journal-title":"J Inst Eng India Ser B."},{"key":"204_CR38","doi-asserted-by":"crossref","unstructured":"Akhlaq AH, Allu SN, Yerukala N. Quantum resource estimation of PRINCE and Midori block ciphers. Int J Inf Technol. 2024;1\u201310.","DOI":"10.1007\/s41870-024-01997-6"},{"issue":"1","key":"204_CR39","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1186\/s12911-024-02548-6","volume":"24","author":"T Chinbat","year":"2024","unstructured":"T. Chinbat, S. Madanian, D. Airehrour, F. Hassandoust, Machine learning cryptography methods for IoT in healthcare. BMC Med. Inform. Decis. Mak. 24(1), 153 (2024)","journal-title":"BMC Med. Inform. Decis. Mak."},{"issue":"4","key":"204_CR40","first-page":"206","volume":"11","author":"A Baghel","year":"2023","unstructured":"A. Baghel, Z. Mishra, O. Parmar, A.S. Rajput, Optimised architectures of Midori block cipher for area-constrained IoT applications. Int. J. High Perform. Syst. Archit. 11(4), 206\u2013215 (2023)","journal-title":"Int. J. High Perform. Syst. Archit."},{"issue":"4","key":"204_CR41","first-page":"2647","volume":"16","author":"N Yasmin","year":"2024","unstructured":"N. Yasmin, R. Gupta, Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices. Int. J. Inf. Technol. 16(4), 2647\u20132659 (2024)","journal-title":"Int. J. Inf. Technol."},{"key":"204_CR42","doi-asserted-by":"crossref","unstructured":"Toma NI, Kashem MA, Rana S. A Lightweight Cryptographic Algorithm for IoT Devices based on Hybrid Architecture. In2024 3rd International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE) 2024 Apr 25 (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICAEEE62219.2024.10561749"},{"issue":"1","key":"204_CR43","first-page":"1","volume":"32","author":"S Suhaili","year":"2024","unstructured":"S. Suhaili, N. Julai, R. Sapawi, N. Rajaee, Towards maximising hardware resources and design efficiency via high-speed implementation of HMAC based on SHA-256 design. Pertanika J Sci Technol. 32(1), 1\u201310 (2024)","journal-title":"Pertanika J Sci Technol."},{"key":"204_CR44","doi-asserted-by":"crossref","unstructured":"Zhang X, Shen Y, Wang L. Security analysis of CMAC in the multi-user model. In: International Conference on Information Security; 2024 Oct; Cham, Switzerland. Springer Nature Switzerland; p. 67\u201386.","DOI":"10.1007\/978-3-031-75757-0_4"},{"key":"204_CR45","doi-asserted-by":"publisher","unstructured":"Crocetti L, Fanucci L, Baldanzi L, Falaschi F. A Scalable and Configurable Architecture for Hardware Authenticated Encryption Modules Compliant with the CCSDS Security Specifications. In: 2024 Security for Space Systems (3S); 2024 Apr; Noordwijk, Netherlands. p. 1\u20138. https:\/\/doi.org\/10.23919\/3S60530.2024.10592288.","DOI":"10.23919\/3S60530.2024.10592288"},{"key":"204_CR46","doi-asserted-by":"crossref","unstructured":"Patidar S, Jindal R, Kumar N. A secure and energy-efficient edge computing improved SZ 2.1 hybrid algorithm for handling IoT data stream. Multimedia Tools Appl. 2024;1\u201332.","DOI":"10.1007\/s11042-024-18765-0"},{"issue":"12","key":"204_CR47","doi-asserted-by":"publisher","first-page":"4453","DOI":"10.1007\/s10623-024-01506-7","volume":"92","author":"S Mao","year":"2024","unstructured":"S. Mao, T. Guo, P. Wang, R. Xu, Y. Chen, L. Hu, A quantum-secure partial parallel MAC QPCBC. Des. Codes Cryptogr. 92(12), 4453\u20134486 (2024)","journal-title":"Des. Codes Cryptogr."},{"key":"204_CR48","doi-asserted-by":"publisher","unstructured":"Udeshi M, Krishnamurthy P, Karri R, Khorrami F. Tamper-proof network traffic measurements on a NIC for intrusion detection. IEEE Trans Netw Serv Manag. 2024.https:\/\/doi.org\/10.1109\/TNSM.2024.3512180","DOI":"10.1109\/TNSM.2024.3512180"},{"issue":"1","key":"204_CR49","doi-asserted-by":"publisher","first-page":"20240050","DOI":"10.1515\/eng-2024-0050","volume":"14","author":"AA Mohammed","year":"2024","unstructured":"A.A. Mohammed, A.M.S. Rahma, H.B. AbdulWahab, Improvements in the randomness and security of digital currency using the photon sponge hash function through Maiorana\u2013McFarland S-box replacement. Open Eng. 14(1), 20240050 (2024)","journal-title":"Open Eng."},{"key":"204_CR50","unstructured":"Datta N, Dey S, Dutta A, Kanungo D. Multi user security of LightMAC and LightMAC_Plus. Cryptology ePrint Archive. 2024. Available from: https:\/\/eprint.iacr.org\/2024\/030."},{"key":"204_CR51","doi-asserted-by":"publisher","unstructured":"Lai C, Ma J, Wang X, Zhou H, Zheng D. A novel authentication and key agreement scheme for in-vehicle networks. IEEE Trans Veh Technol. 2025https:\/\/doi.org\/10.1109\/TVT.2025.3540442","DOI":"10.1109\/TVT.2025.3540442"},{"key":"204_CR52","doi-asserted-by":"crossref","unstructured":"Dobraunig C, Eichlseder M, Mendel F, Schl\u00e4ffer M. Ascon MAC, PRF, and short-input PRF: lightweight, fast, and efficient pseudorandom functions. In: Cryptographers' Track at the RSA Conference; 2024 May; Cham, Switzerland. Springer Nature Switzerland; p. 381\u2013403.","DOI":"10.1007\/978-3-031-58868-6_15"},{"key":"204_CR53","doi-asserted-by":"publisher","unstructured":"Khaled KB, Borsos D, Katona J. Benchmarking Cryptographic Protocols for (IoT) Malware Defence. In: 2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI); 2025 Jan; Star\u00e1 Lesn\u00e1, Slovakia. p. 000041\u20136. https:\/\/doi.org\/10.1109\/SAMI63904.2025.10883306.","DOI":"10.1109\/SAMI63904.2025.10883306"},{"issue":"27","key":"204_CR54","doi-asserted-by":"publisher","first-page":"101314","DOI":"10.1016\/j.iot.2024.101314","volume":"1","author":"O Popoola","year":"2024","unstructured":"O. Popoola, M.A. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehai, J. Popoola, An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security. Intern. Things. 1(27), 101314 (2024)","journal-title":"Intern. Things."},{"key":"204_CR55","doi-asserted-by":"crossref","unstructured":"Yang Y, Yuan X, Alromih A, Pasikhani AM, Gope P, Sikdar B. Leveraging a new GAN-based transformer with ECDH crypto-system for enhancing energy theft detection in smart grid. arXiv preprint arXiv:2411.18023. 2024.","DOI":"10.56553\/popets-2024-0144"},{"issue":"10","key":"204_CR56","doi-asserted-by":"publisher","first-page":"12339","DOI":"10.1109\/TII.2024.3423315","volume":"20","author":"J Se\u00f1or","year":"2024","unstructured":"J. Se\u00f1or, J. Portilla, M. Portela-Garc\u00eda, Performance analysis of postquantum cryptographic schemes for securing large-scale wireless sensor networks. IEEE Trans Ind Inform. 20(10), 12339\u201312349 (2024). https:\/\/doi.org\/10.1109\/TII.2024.3423315","journal-title":"IEEE Trans Ind Inform."},{"key":"204_CR57","doi-asserted-by":"publisher","unstructured":"Juaristi P, Agudo I, Rios R, Ricci L. Benchmarking post-quantum cryptography in Ethereum-based blockchains. In: Computer Security. ESORICS 2024 International Workshops: DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16\u201320, 2024, Revised Selected Papers, Part I. Berlin, Heidelberg: Springer; 2025. p. 340\u201353. https:\/\/doi.org\/10.1007\/978-3-031-82349-7_23","DOI":"10.1007\/978-3-031-82349-7_23"},{"key":"204_CR58","doi-asserted-by":"publisher","first-page":"74572","DOI":"10.1109\/ACCESS.2024.3404232","volume":"12","author":"D Chaudhary","year":"2024","unstructured":"D. Chaudhary, P. Kumar Dadsena, A. Padmavathi, M.M. Hassan, B.F. Alkhamees, U. Kumar, Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices. IEEE Access. 12, 74572\u201374585 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3404232","journal-title":"IEEE Access."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-025-00204-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-025-00204-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-025-00204-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T06:02:00Z","timestamp":1748671320000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-025-00204-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,30]]},"references-count":58,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1186\/s13635-025-00204-8","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,30]]},"assertion":[{"value":"27 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"19"}}