{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T06:29:42Z","timestamp":1721370582069},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1016\/j.jisa.2023.103540","type":"journal-article","created":{"date-parts":[[2023,6,22]],"date-time":"2023-06-22T09:36:40Z","timestamp":1687426600000},"page":"103540","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Homomorphic additive lightweight block cipher scheme for securing IoT applications"],"prefix":"10.1016","volume":"76","author":[{"given":"Khalil","family":"Hariss","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2589-5053","authenticated-orcid":false,"given":"Hassan","family":"Noura","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103540_b1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.future.2013.07.014","article-title":"Intelligent services for big data science","volume":"37","author":"Dobre","year":"2014","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.jisa.2023.103540_b2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.procs.2018.04.219","article-title":"Smart home: Architecture, technologies and systems","volume":"131","author":"Li","year":"2018","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.jisa.2023.103540_b3","doi-asserted-by":"crossref","unstructured":"Mainetti L, Patrono L, Stefanizzi ML, Vergallo R. A smart parking system based on iot protocols and emerging enabling technologies. In: 2015 IEEE 2nd world forum on internet of things. 2015, p. 764\u20139.","DOI":"10.1109\/WF-IoT.2015.7389150"},{"key":"10.1016\/j.jisa.2023.103540_b4","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.procs.2020.03.021","article-title":"Iot and big data analytics for smart buildings: A survey","volume":"170","author":"Daissaoui","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.jisa.2023.103540_b5","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.procs.2016.07.258","article-title":"Developing smart cities: An integrated framework","volume":"93","author":"Joshi","year":"2016","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.jisa.2023.103540_b6","series-title":"Medical data analytics in the cloud using homomorphic encryption","first-page":"751","author":"Kocabas","year":"2015"},{"key":"10.1016\/j.jisa.2023.103540_b7","series-title":"Intelligent transport systems: Technologies and applications","author":"Perallos","year":"2015"},{"key":"10.1016\/j.jisa.2023.103540_b8","series-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"10.1016\/j.jisa.2023.103540_b9","series-title":"Homomorphic encryption and applications","author":"Yi","year":"2014"},{"key":"10.1016\/j.jisa.2023.103540_b10","series-title":"Public key cryptography \u2013 PKC 2010","first-page":"420","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"Smart","year":"2010"},{"key":"10.1016\/j.jisa.2023.103540_b11","series-title":"Homomorphic encryption breakthrough - schneier on security","author":"Schneier","year":"2009"},{"key":"10.1016\/j.jisa.2023.103540_b12","series-title":"Practical solutions in fully homomorphic encryption\u2013a survey analyzing existing acceleration methods","author":"Gong","year":"2023"},{"key":"10.1016\/j.jisa.2023.103540_b13","series-title":"Fast arithmetic hardware library for rlwe-based homomorphic encryption","author":"Agrawal","year":"2020"},{"key":"10.1016\/j.jisa.2023.103540_b14","series-title":"2022 IEEE high performance extreme computing conference","first-page":"1","article-title":"Fpga acceleration of fully homomorphic encryption over the torus","author":"Ye","year":"2022"},{"key":"10.1016\/j.jisa.2023.103540_b15","series-title":"Fpt: a fixed-point accelerator for torus fully homomorphic encryption","author":"Van Beirendonck","year":"2022"},{"key":"10.1016\/j.jisa.2023.103540_b16","series-title":"Proceedings of the 5th international conference on information security","first-page":"471","article-title":"A provably secure additive and multiplicative privacy homomorphism","author":"Domingo-Ferrer","year":"2002"},{"key":"10.1016\/j.jisa.2023.103540_b17","series-title":"Information security","first-page":"234","article-title":"Cryptanalysis of an algebraic privacy homomorphism","author":"Wagner","year":"2003"},{"key":"10.1016\/j.jisa.2023.103540_b18","doi-asserted-by":"crossref","unstructured":"Sylvester J. Lx. on a remarkable discovery in the theory of canonical forms and of hyperdeterminants. Philos Mag Ser 1 2:391\u2013410.","DOI":"10.1080\/14786445108645733"},{"key":"10.1016\/j.jisa.2023.103540_b19","series-title":"A survey on homomorphic encryption schemes: Theory and implementation, vol. 51 no. 4","author":"Acar","year":"2018"},{"key":"10.1016\/j.jisa.2023.103540_b20","series-title":"Advances in cryptology - EUROCRYPT \u201999, international conference on the theory and application of cryptographic techniques","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","volume":"vol. 1592","author":"Paillier","year":"1999"},{"key":"10.1016\/j.jisa.2023.103540_b21","series-title":"Theory of cryptography","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"Boneh","year":"2005"},{"key":"10.1016\/j.jisa.2023.103540_b22","series-title":"Advances in cryptology - ASIACRYPT 2003, 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 - December 4, 2003, proceedings","first-page":"37","article-title":"A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications","volume":"vol. 2894","author":"Bresson","year":"2003"},{"issue":"4","key":"10.1016\/j.jisa.2023.103540_b23","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1016\/j.sigpro.2011.10.020","article-title":"Elliptic curve elgamal based homomorphic image encryption scheme for sharing secret images.","volume":"92","author":"Li","year":"2012","journal-title":"Signal process"},{"key":"10.1016\/j.jisa.2023.103540_b24","series-title":"Proceedings of the international conference on the theory and application of cryptographic techniques: Advances in cryptology","first-page":"229","article-title":"The bit security of paillier\u2019s encryption scheme and its applications","author":"Catalano","year":"2001"},{"key":"10.1016\/j.jisa.2023.103540_b25","series-title":"Advanced encryption standard (Aes)","author":"Dworkin","year":"2001"},{"key":"10.1016\/j.jisa.2023.103540_b26","series-title":"Data encryption standard (Des)","author":"UD of Commerce","year":"1993"},{"key":"10.1016\/j.jisa.2023.103540_b27","unstructured":"Zaraket C, Chamoun M, Nicolas T. Calculating the average using paillier\u2019s cryptosystem. In: BDCSIntell. 2019."},{"key":"10.1016\/j.jisa.2023.103540_b28","series-title":"One round cipher algorithm for multimedia iot devices, vol. 77, no. 14","author":"Noura","year":"2018"},{"key":"10.1016\/j.jisa.2023.103540_b29","first-page":"9053","article-title":"Rsa and ecc: A comparative analysis","volume":"12","author":"Mahto","year":"2017","journal-title":"Int J Appl Eng Res"},{"issue":"11","key":"10.1016\/j.jisa.2023.103540_b30","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/TC.2019.2926081","article-title":"Algebraic differential fault analysis on simon block cipher","volume":"68","author":"Le","year":"2019","journal-title":"IEEE Trans Comput"},{"key":"10.1016\/j.jisa.2023.103540_b31","series-title":"Proceedings of the 16th international joint conference on E-business and telecommunications","first-page":"341","article-title":"An efficient fhe scheme to secure cloud computing","author":"Hariss","year":"2019"},{"key":"10.1016\/j.jisa.2023.103540_b32","series-title":"Proceedings of the 10th annual international cryptology conference on advances in cryptology","first-page":"2","article-title":"Differential cryptanalysis of des-like cryptosystems","author":"Biham","year":"1990"},{"key":"10.1016\/j.jisa.2023.103540_b33","article-title":"Lightweight privacy-preserving scheme using homomorphic encryption in industrial internet of things","author":"Li","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.jisa.2023.103540_b34","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/2793998","article-title":"Somewhat homomorphic encryption: Ring learning with error algorithm for faster encryption of iot sensor signal-based edge devices","volume":"2022","author":"Subramaniyaswamy","year":"2022","journal-title":"Secur Commun Netw"},{"key":"10.1016\/j.jisa.2023.103540_b35","series-title":"Faster secure arithmetic computation using switchable homomorphic encryption","author":"Lim","year":"2014"},{"key":"10.1016\/j.jisa.2023.103540_b36","doi-asserted-by":"crossref","unstructured":"Hariss K, Chamoun M, Samhat AE. On dghv and bgv fully homomorphic encryption schemes. In: 2017 1st cyber security in networking conference. 2017, p. 1\u20139.","DOI":"10.1109\/CSNET.2017.8242007"},{"issue":"4","key":"10.1016\/j.jisa.2023.103540_b37","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1080\/0020739970280407","article-title":"The cross product of two vectors is notjust another vector \u2013 a major misconception being perpetuated in calculus and vector analysis textbooks","volume":"28","author":"Elk","year":"1997","journal-title":"Int J Math Educ Sci Technol"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623001242?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623001242?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T14:59:20Z","timestamp":1692629960000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623001242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":37,"alternative-id":["S2214212623001242"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103540","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Homomorphic additive lightweight block cipher scheme for securing IoT applications","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103540","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103540"}}