{"id":"https://openalex.org/W4401990103","doi":"https://doi.org/10.1007/s10207-024-00904-1","title":"Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher","display_name":"Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4401990103","doi":"https://doi.org/10.1007/s10207-024-00904-1"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-024-00904-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00904-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00904-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00904-1.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053916363","display_name":"Safiullah Khan","orcid":"https://orcid.org/0000-0001-8342-6928"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Safiullah Khan","raw_affiliation_strings":["Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, M15 6BX, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, M15 6BX, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062070714","display_name":"Kashif Inayat","orcid":"https://orcid.org/0000-0001-5504-6274"},"institutions":[{"id":"https://openalex.org/I146429904","display_name":"Incheon National University","ror":"https://ror.org/02xf7p935","country_code":"KR","type":"education","lineage":["https://openalex.org/I146429904"]},{"id":"https://openalex.org/I2799803557","display_name":"Barcelona Supercomputing Center","ror":"https://ror.org/05sd8tv96","country_code":"ES","type":"facility","lineage":["https://openalex.org/I2799803557","https://openalex.org/I9617848"]},{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES","KR"],"is_corresponding":false,"raw_author_name":"Kashif Inayat","raw_affiliation_strings":["Barcelona Supercomputing Center - Centro Nacional de Supercomputaci\u00f3n, Barcelona, Spain","System on Chips Laboratory, Department of Electronics Engineering, Incheon National University, Incheon, 22012, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Barcelona Supercomputing Center - Centro Nacional de Supercomputaci\u00f3n, Barcelona, Spain","institution_ids":["https://openalex.org/I9617848","https://openalex.org/I2799803557"]},{"raw_affiliation_string":"System on Chips Laboratory, Department of Electronics Engineering, Incheon National University, Incheon, 22012, Republic of Korea","institution_ids":["https://openalex.org/I146429904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037596497","display_name":"Fahad Bin Muslim","orcid":"https://orcid.org/0000-0002-4153-360X"},"institutions":[{"id":"https://openalex.org/I5400463","display_name":"Ghulam Ishaq Khan Institute of Engineering Sciences and Technology","ror":"https://ror.org/01sb6ek09","country_code":"PK","type":"education","lineage":["https://openalex.org/I5400463"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Fahad Bin Muslim","raw_affiliation_strings":["Faculty of Computer Science and Engineering, GIK Institute, Swabi, 23460, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Engineering, GIK Institute, Swabi, 23460, Pakistan","institution_ids":["https://openalex.org/I5400463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012684090","display_name":"Yasir Shah","orcid":"https://orcid.org/0000-0002-5156-5840"},"institutions":[{"id":"https://openalex.org/I138801177","display_name":"University of Ulster","ror":"https://ror.org/01yp9g959","country_code":"GB","type":"education","lineage":["https://openalex.org/I138801177"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yasir Ali Shah","raw_affiliation_strings":["School of Computing, Engineering and Intelligent Systems, Ulster University, Magee Campus, Londonderry, NI, BT48 7JL, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Intelligent Systems, Ulster University, Magee Campus, Londonderry, NI, BT48 7JL, UK","institution_ids":["https://openalex.org/I138801177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089024524","display_name":"Muhammad Atif Ur Rehman","orcid":"https://orcid.org/0000-0002-6812-8620"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Muhammad Atif Ur Rehman","raw_affiliation_strings":["Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, M15 6BX, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, M15 6BX, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045204653","display_name":"Ayesha Khalid","orcid":"https://orcid.org/0000-0002-4815-6966"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ayesha Khalid","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, UK","Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043985181","display_name":"Malik Imran","orcid":"https://orcid.org/0000-0002-1900-6387"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Malik Imran","raw_affiliation_strings":["Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, UK","Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, UK"],"affiliations":[{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen\u2019s University Belfast, Belfast, BT7 1NN, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"Centre for Secure Information Technologies (CSIT), Queen's University Belfast, Belfast, BT7 1NN, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036343089","display_name":"Akmalbek Abdusalomov","orcid":"https://orcid.org/0000-0001-5923-8695"},"institutions":[{"id":"https://openalex.org/I55383850","display_name":"Tashkent State University of Economics","ror":"https://ror.org/029t9db68","country_code":"UZ","type":"education","lineage":["https://openalex.org/I55383850"]},{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR","UZ"],"is_corresponding":false,"raw_author_name":"Akmalbek Abdusalomov","raw_affiliation_strings":["Department of Computer Engineering, Gachon University, Seongnam, 461-701, Republic of Korea","Department of Information Systems and Technologies, Tashkent State University of Economics, 100066, Tashkent, Uzbekistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Gachon University, Seongnam, 461-701, Republic of Korea","institution_ids":["https://openalex.org/I12832649"]},{"raw_affiliation_string":"Department of Information Systems and Technologies, Tashkent State University of Economics, 100066, Tashkent, Uzbekistan","institution_ids":["https://openalex.org/I55383850"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5053916363"],"corresponding_institution_ids":["https://openalex.org/I11983389"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":5.4507,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96285894,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"23","issue":"6","first_page":"3653","last_page":"3664"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/realization","display_name":"Realization (probability)","score":0.7877799272537231},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7739248275756836},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.7437165975570679},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6672759652137756},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6108652353286743},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5530991554260254},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.489224910736084},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.4239421486854553},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3955073654651642},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.37982869148254395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34619367122650146},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2681621313095093}],"concepts":[{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.7877799272537231},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7739248275756836},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.7437165975570679},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6672759652137756},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6108652353286743},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5530991554260254},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.489224910736084},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.4239421486854553},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3955073654651642},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.37982869148254395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34619367122650146},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2681621313095093},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1007/s10207-024-00904-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00904-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00904-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/e6d23b04-6da4-4b18-8b9b-80adc98ab3f0","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/e6d23b04-6da4-4b18-8b9b-80adc98ab3f0","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Khan, S, Inayat, K, Muslim, F B, Shah, Y A, Atif Ur Rehman, M, Khalid, A, Imran, M & Abdusalomov, A 2024, 'Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher', International Journal of Information Security, vol. 23, no. 6, pp. 3653-3664. https://doi.org/10.1007/s10207-024-00904-1","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:upcommons.upc.edu:2117/425904","is_oa":true,"landing_page_url":"https://hdl.handle.net/2117/425904","pdf_url":"https://upcommons.upc.edu/bitstreams/46525f84-1960-4b89-8870-ff23eb0642d4/download","source":{"id":"https://openalex.org/S4377196262","display_name":"UPCommons institutional repository (Universitat Polit\u00e8cnica de Catalunya)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9617848","host_organization_name":"Universitat Polit\u00e8cnica de Catalunya","host_organization_lineage":["https://openalex.org/I9617848"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:e-space.mmu.ac.uk:635496","is_oa":true,"landing_page_url":"https://e-space.mmu.ac.uk/view/authors/42bbd466b3010a120ef38b2d89366380.html>","pdf_url":"https://e-space.mmu.ac.uk/635496/1/s10207-024-00904-1%20%282%29.pdf","source":{"id":"https://openalex.org/S4306401617","display_name":"e-space (Manchester Metropolitan University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11983389","host_organization_name":"Manchester Metropolitan University","host_organization_lineage":["https://openalex.org/I11983389"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:pure.atira.dk:publications/0fe9d008-d2f7-4d9e-8b17-90dd21b53a05","is_oa":true,"landing_page_url":"https://pure.ulster.ac.uk/en/publications/0fe9d008-d2f7-4d9e-8b17-90dd21b53a05","pdf_url":"https://pure.ulster.ac.uk/ws/files/214242807/s10207-024-00904-1.pdf","source":{"id":"https://openalex.org/S4306402454","display_name":"Ulster University Research Portal (Ulster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138801177","host_organization_name":"University of Ulster","host_organization_lineage":["https://openalex.org/I138801177"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Khan, S, Inayat, K, Muslim, F B, Shah, Y A, Rehman, M A U, Khalid, A, Imran, M & Abdusalomov, A 2024, 'Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher', International Journal of Information Security, vol. 23, no. 6, pp. 3653-3664. https://doi.org/10.1007/s10207-024-00904-1","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/s10207-024-00904-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-024-00904-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-024-00904-1.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4401990103.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1958047932","https://openalex.org/W1996182770","https://openalex.org/W2028435862","https://openalex.org/W2150220050","https://openalex.org/W2217811860","https://openalex.org/W2355550369","https://openalex.org/W2548820325","https://openalex.org/W2765134690","https://openalex.org/W2786065970","https://openalex.org/W2931923623","https://openalex.org/W2950471701","https://openalex.org/W2966248640","https://openalex.org/W3134559703","https://openalex.org/W4210248528","https://openalex.org/W4311224134","https://openalex.org/W4312225702"],"related_works":["https://openalex.org/W4316095964","https://openalex.org/W2383001583","https://openalex.org/W2771395446","https://openalex.org/W2131084560","https://openalex.org/W3112038843","https://openalex.org/W1499106549","https://openalex.org/W2092816212","https://openalex.org/W138071016","https://openalex.org/W4200387112","https://openalex.org/W4313287912"],"abstract_inverted_index":{"Abstract":[0],"The":[1,117,162,240],"Internet":[2],"of":[3,8,130,147,159,248,255,275],"Things":[4],"(IoT)":[5],"nodes":[6,21],"consist":[7],"sensors":[9],"that":[10,33],"collect":[11],"environmental":[12],"data":[13,17,31],"and":[14,22,73,113,156,172,188,220,273],"then":[15],"perform":[16],"exchange":[18],"with":[19,68,260],"surrounding":[20],"gateways.":[23],"Cybersecurity":[24],"attacks":[25],"pose":[26],"a":[27,98,136],"threat":[28],"to":[29,46,70,150,206,250],"the":[30,51,59,71,91,123,128,145,152,160,246,252,276],"security":[32],"is":[34,267],"being":[35],"transmitted":[36],"in":[37,58,140],"any":[38],"IoT":[39,60,65,256],"network.":[40],"Cryptographic":[41],"primitives":[42],"are":[43],"widely":[44],"adopted":[45],"address":[47],"these":[48,86],"threats;":[49],"however,":[50],"substantial":[52],"computation":[53],"demands":[54],"limit":[55],"their":[56,236],"applicability":[57],"ecosystem.":[61],"In":[62],"addition,":[63],"each":[64],"node":[66],"varies":[67],"respect":[69],"area":[72,132,142,155],"throughput":[74],"(TP)":[75],"requirements,":[76],"thus":[77],"demanding":[78],"flexible":[79],"implementation":[80,163,242,259],"for":[81,167,270],"encryption/decryption":[82],"processes.":[83],"To":[84],"solve":[85],"issues,":[87],"this":[88],"work":[89],"implements":[90],"NIST":[92],"lightweight":[93],"cryptography":[94],"standard,":[95],"Ascon,":[96],"on":[97],"SAED":[99],"32":[100],"nm":[101,264],"process":[102],"design":[103,148],"kit":[104],"(PDK)":[105],"library":[106,266],"by":[107,135,235],"employing":[108],"loop":[109,111,168],"folded,":[110],"unrolled":[112,115,119,238],"fully":[114,118,237],"architectures.":[116],"architecture":[120],"can":[121,244],"achieve":[122],"highest":[124],"TP":[125,157],"but":[126],"at":[127],"cost":[129],"higher":[131],"utilisation.":[133],"Unrolling":[134],"lower":[137,141],"factor":[138],"results":[139,164],"implementations,":[143],"enabling":[144],"exploration":[146],"space":[149],"tackle":[151],"trade-off":[153],"between":[154],"performance":[158],"design.":[161],"show":[165],"that,":[166],"folded":[169],"architecture,":[170],"Ascon-128":[171],"Ascon-128a":[173],"require":[174],"36.7k":[175],"$$\\upmu":[176,190,208,222],"\\textrm{m}^{2}$$":[177,191,209,223],"<mml:math":[178,192,210,224],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[179,193,211,225],"<mml:mrow>":[180,194,212,226],"<mml:mi>\u03bc</mml:mi>":[181,195,213,227],"<mml:msup>":[182,196,214,228],"<mml:mtext>m</mml:mtext>":[183,197,215,229],"<mml:mn>2</mml:mn>":[184,198,216,230],"</mml:msup>":[185,199,217,231],"</mml:mrow>":[186,200,218,232],"</mml:math>":[187,201,219,233],"38.5k":[189],"chip":[202],"area,":[203],"respectively":[204],"compared":[205],"277.1k":[207],"306.6k":[221],"required":[234],"implementations.":[239],"proposed":[241],"strategies":[243],"adjust":[245],"number":[247],"rounds":[249],"accommodate":[251],"varied":[253],"requirements":[254],"ecosystems.":[257],"An":[258],"an":[261],"open-source":[262],"45":[263],"PDK":[265],"also":[268],"undertaken":[269],"enhanced":[271],"generalization":[272],"reproducibility":[274],"results.":[277]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
