{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:23:22Z","timestamp":1730208202689,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/cits.2017.8035317","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T20:48:10Z","timestamp":1505422090000},"page":"292-296","source":"Crossref","is-referenced-by-count":6,"title":["A survey of the current state of lightweight cryptography for the Internet of things"],"prefix":"10.1109","author":[{"given":"Wanican","family":"Julian Okello","sequence":"first","affiliation":[]},{"given":"Qingling","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Faizan","family":"Ali Siddiqui","sequence":"additional","affiliation":[]},{"given":"Chaozhu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Differential Cryptanalysis of the Data Encryption Standard","year":"2009","author":"biham","key":"ref10"},{"journal-title":"P Darmstadt University of Technology","article-title":"Algebraic methods in analyzing lightweight cryptographic symmetric primitives","year":"2012","author":"walter","key":"ref11"},{"journal-title":"Lightweight Cryptography from Smallest to Fastest Trade-offs in HW Performance","year":"2015","author":"knezevic","key":"ref12"},{"journal-title":"Lightweight Cryntogranhv for FPGAs","year":"2006","author":"yalla","key":"ref13"},{"journal-title":"FELICS-Fair Evaluation of Lightweight Cryptographic Systems","year":"0","author":"dinu","key":"ref14"},{"journal-title":"XBX eXternal Benchmarking eXtension for the SUPERCOP crypto benchmarking framework","first-page":"1","year":"0","author":"wenzel-benner","key":"ref15"},{"journal-title":"ATHENa-Automated Tool for Hardware EvaluatioN Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware using FPGAs","year":"0","author":"gaj","key":"ref16"},{"journal-title":"B Project","year":"2013","author":"micka\u00ebl","key":"ref17"},{"journal-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","year":"2010","author":"rukhin","key":"ref18"},{"journal-title":"Cryptol","year":"0","key":"ref19"},{"key":"ref4","first-page":"1689","article-title":"Understanding Cryptography","volume":"53","author":"fallis","year":"2013","journal-title":"J Chem Inf Model"},{"journal-title":"Intel","article-title":"Intel IoT Platform","year":"0","key":"ref27"},{"journal-title":"Lightweight Cryptography","year":"2007","author":"poschmann","key":"ref3"},{"journal-title":"The ntru project","year":"0","key":"ref6"},{"journal-title":"Lightweight Cryptography Lounge","year":"2015","key":"ref5"},{"journal-title":"Cryptanalysis of Lightweight Ciphers","first-page":"198","year":"2010","author":"borghoff","key":"ref8"},{"journal-title":"Ruhr-University Bochum","article-title":"ELLIPTIC CURVE CRYPTOGRAPHY","year":"2006","author":"kumar","key":"ref7"},{"journal-title":"Design and Implementation of Efficient and Secure Lightweight Cryptosystems","year":"2014","author":"mansouri","key":"ref2"},{"journal-title":"Linear Cryptanalysis Method for DES Cipher","year":"1998","author":"matsui","key":"ref9"},{"key":"ref1","article-title":"A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)","volume":"2012","author":"saarinen","year":"2012","journal-title":"IA CR Cryptology ePrint Archive"},{"journal-title":"eCryptfs","article-title":"Network of Excellence in Cryptology","year":"0","key":"ref20"},{"journal-title":"Washington Homeland Security Roundtable","year":"0","key":"ref22"},{"journal-title":"SIMON and SPECK Block Ciphers for the Internet of Things","year":"2015","author":"beaulieu","key":"ref21"},{"volume":"2","journal-title":"IETF Standardization in the Field of the Internet of Things (IoT) A Survey","year":"2013","author":"ishaq","key":"ref24"},{"journal-title":"NIST ‘ s Lightweight Crypto Project","year":"0","author":"turan","key":"ref23"},{"journal-title":"The 128-bit Blockcipher Clefia","year":"0","author":"shirai","key":"ref26"},{"journal-title":"Google","article-title":"Brillo","year":"0","key":"ref25"}],"event":{"name":"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)","start":{"date-parts":[[2017,7,21]]},"location":"Dalian, China","end":{"date-parts":[[2017,7,23]]}},"container-title":["2017 International Conference on Computer, Information and Telecommunication Systems (CITS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8027230\/8035266\/08035317.pdf?arnumber=8035317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T04:05:40Z","timestamp":1507003540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8035317\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cits.2017.8035317","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}