{"id":"https://openalex.org/W3096033756","doi":"https://doi.org/10.1109/access.2020.3036589","title":"SLIM: A Lightweight Block Cipher for Internet of Health Things","display_name":"SLIM: A Lightweight Block Cipher for Internet of Health Things","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3096033756","doi":"https://doi.org/10.1109/access.2020.3036589","mag":"3096033756"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3036589","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3036589","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09250428.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09250428.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073927047","display_name":"Bassam Aboushosha","orcid":"https://orcid.org/0000-0001-5168-3313"},"institutions":[{"id":"https://openalex.org/I27367753","display_name":"El Shorouk Academy","ror":"https://ror.org/025xjs150","country_code":"EG","type":"education","lineage":["https://openalex.org/I27367753"]},{"id":"https://openalex.org/I4210120363","display_name":"Higher Institute of Engineering","ror":"https://ror.org/02pyw9g57","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210120363"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Bassam Aboushosha","raw_affiliation_strings":["Department of Communication and Computer Engineering, Higher Institute of Engineering, El Shorouk Academy, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Communication and Computer Engineering, Higher Institute of Engineering, El Shorouk Academy, Cairo, Egypt","institution_ids":["https://openalex.org/I27367753","https://openalex.org/I4210120363"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045926954","display_name":"Rabie \u0391. Ramadan","orcid":"https://orcid.org/0000-0002-0281-9381"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]},{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Rabie A. Ramadan","raw_affiliation_strings":["Department of Computer Engineering, Cairo University, Cairo, Egypt","Department of Computer Science and Software Engineering, University of Hail, Hail, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Cairo University, Cairo, Egypt","institution_ids":["https://openalex.org/I145487455"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Hail, Hail, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022807772","display_name":"Ashutosh Dhar Dwivedi","orcid":"https://orcid.org/0000-0001-8010-6275"},"institutions":[{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Ashutosh Dhar Dwivedi","raw_affiliation_strings":["Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark","institution_ids":["https://openalex.org/I96673099"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037019550","display_name":"Ayman El\u2010Sayed","orcid":"https://orcid.org/0000-0002-4437-259X"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Ayman El-Sayed","raw_affiliation_strings":["Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020718888","display_name":"Mohamed M. Dessouky","orcid":"https://orcid.org/0000-0003-2609-2225"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Mohamed M. Dessouky","raw_affiliation_strings":["Department of Computer Science and Artificial Intelligence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Artificial Intelligence, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5073927047"],"corresponding_institution_ids":["https://openalex.org/I27367753","https://openalex.org/I4210120363"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.3103,"has_fulltext":true,"cited_by_count":82,"citation_normalized_percentile":{"value":0.97159323,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"203747","last_page":"203757"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997870445251465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7184470295906067},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7181816697120667},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6188333034515381},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4853593409061432},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44385042786598206},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34801626205444336},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32395151257514954}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997870445251465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7184470295906067},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7181816697120667},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6188333034515381},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4853593409061432},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44385042786598206},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34801626205444336},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32395151257514954}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2020.3036589","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3036589","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09250428.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:093c119277c74e5da9d96c4a58d89fec","is_oa":true,"landing_page_url":"https://doaj.org/article/093c119277c74e5da9d96c4a58d89fec","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 203747-203757 (2020)","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:openaire/a16f7ccf-2365-4709-ae32-84ea2a0f5743","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/a16f7ccf-2365-4709-ae32-84ea2a0f5743","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2020, 'SLIM : A lightweight block cipher for internet of health things', IEEE Access, vol. 8, pp. 203747-203757. https://doi.org/10.1109/ACCESS.2020.3036589","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/a16f7ccf-2365-4709-ae32-84ea2a0f5743","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85101875584&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aboushosha, B, Ramadan, R A, Dwivedi, A D, El-Sayed, A & Dessouky, M M 2020, 'SLIM : A lightweight block cipher for internet of health things', IEEE Access, vol. 8, pp. 203747-203757. https://doi.org/10.1109/ACCESS.2020.3036589","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3036589","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3036589","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09250428.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3096033756.pdf","grobid_xml":"https://content.openalex.org/works/W3096033756.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W35428663","https://openalex.org/W45372631","https://openalex.org/W147018390","https://openalex.org/W153516704","https://openalex.org/W930621015","https://openalex.org/W1511842436","https://openalex.org/W1522919234","https://openalex.org/W1575062508","https://openalex.org/W1578155860","https://openalex.org/W1596841000","https://openalex.org/W1601321736","https://openalex.org/W1607874478","https://openalex.org/W1629301835","https://openalex.org/W1853704432","https://openalex.org/W1894646615","https://openalex.org/W1904699185","https://openalex.org/W1951852031","https://openalex.org/W1964723977","https://openalex.org/W1993546472","https://openalex.org/W2018345087","https://openalex.org/W2023130409","https://openalex.org/W2087928947","https://openalex.org/W2099779458","https://openalex.org/W2106698019","https://openalex.org/W2128563029","https://openalex.org/W2130585055","https://openalex.org/W2132271754","https://openalex.org/W2141124495","https://openalex.org/W2163354454","https://openalex.org/W2175090126","https://openalex.org/W2182055373","https://openalex.org/W2182153974","https://openalex.org/W2399950949","https://openalex.org/W2799395196","https://openalex.org/W2901118812","https://openalex.org/W3030010127","https://openalex.org/W3031654516","https://openalex.org/W3047428447","https://openalex.org/W6624471988","https://openalex.org/W6634504867","https://openalex.org/W6639606277","https://openalex.org/W6641304879","https://openalex.org/W6674967655","https://openalex.org/W6679300870","https://openalex.org/W6686197473","https://openalex.org/W6778725810","https://openalex.org/W6778747887"],"related_works":["https://openalex.org/W1638546798","https://openalex.org/W4390979909","https://openalex.org/W4389575897","https://openalex.org/W2117179505","https://openalex.org/W3080116368","https://openalex.org/W1524307340","https://openalex.org/W2092816212","https://openalex.org/W2150878966","https://openalex.org/W1965485605","https://openalex.org/W1980393268"],"abstract_inverted_index":{"Nowadays,":[0],"there":[1],"is":[2,77,110,145],"a":[3,68,99,111,141,181,211],"strong":[4],"demand":[5],"for":[6,25,54,92,104,133,163,188],"increasing":[7],"the":[8,117,124,160,201],"protection":[9,82,132],"of":[10,214],"resource-constrained":[11],"devices":[12],"such":[13,37,84],"as":[14,38],"Radio":[15],"frequency":[16],"identification":[17],"(RFID)":[18],"systems.":[19,47,95],"Current":[20],"cryptographic":[21,127],"algorithms":[22],"are":[23,31,123],"sufficient":[24,212],"high-resource":[26],"desktop":[27],"computers.":[28],"RFID":[29,75,94,105,189],"systems":[30,76,106],"commonly":[32],"used":[33,126],"in":[34,74,139,174],"high-security":[35],"applications":[36],"access":[39,56],"control":[40],"systems,":[41,44,190],"transaction":[42],"banking":[43],"and":[45,128,151,165,177,191,205,209],"payment":[46,60],"The":[48,71,136,167],"attacker":[49],"attempts":[50],"to":[51,57,62,79,146],"mislead":[52],"RFIDs":[53],"unauthorized":[55],"services":[58],"without":[59],"or":[61],"circumvent":[63],"security":[64,90],"mechanisms":[65],"by":[66],"detecting":[67],"secret":[69],"password.":[70],"biggest":[72],"challenge":[73,138],"how":[78],"ensure":[80],"successful":[81],"against":[83,200,216],"infringements.":[85],"Lightweight":[86],"cryptography":[87,102],"can":[88],"provide":[89,129],"assurance":[91],"protecting":[93],"This":[96],"article":[97],"presents":[98],"new":[100],"ultra-lightweight":[101],"algorithm":[103,169],"called":[107],"SLIM.":[108],"SLIM":[109,195],"32-bit":[112],"block":[113,121,143,157],"cipher":[114,144],"based":[115],"on":[116],"Feistel":[118],"structure":[119],"since":[120],"ciphers":[122],"most":[125,202],"very":[130],"tight":[131],"IoT":[134],"devices.":[135],"key":[137,162],"designing":[140],"lightweight":[142],"cope":[147],"with":[148,180],"performance,":[149],"cost,":[150],"security.":[152],"SLIM,":[153],"like":[154],"all":[155],"symmetric":[156],"cipher,":[158],"uses":[159],"same":[161],"encryption":[164],"decryption.":[166],"proposed":[168],"has":[170,196,210],"an":[171,185,192],"excellent":[172],"performance":[173],"both":[175],"hardware":[176],"software":[178],"environments,":[179],"limited":[182],"implementation":[183],"area,":[184],"acceptable":[186],"cost/security":[187],"energy-efficient":[193],"behaviour.":[194],"demonstrated":[197],"high":[198],"immunity":[199],"effective":[203],"linear":[204],"differential":[206],"cryptanalysis":[207],"attacks":[208],"margin":[213],"defence":[215],"these":[217],"attacks.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
