{"id":"https://openalex.org/W4385486297","doi":"https://doi.org/10.1109/access.2023.3301128","title":"Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things","display_name":"Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385486297","doi":"https://doi.org/10.1109/access.2023.3301128"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3301128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3301128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10201838.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10201838.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011631794","display_name":"Susila Windarta","orcid":"https://orcid.org/0000-0002-1234-9870"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Susila Windarta","raw_affiliation_strings":["Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia","Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0000-0002-1234-9870","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]},{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038425809","display_name":"Suryadi Suryadi","orcid":"https://orcid.org/0000-0003-2009-9653"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Suryadi Suryadi","raw_affiliation_strings":["Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Indonesia, Depok, Indonesia","Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Indonesia, Depok, Jawa Barat, Indonesia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]},{"raw_affiliation_string":"Department of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Indonesia, Depok, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079944075","display_name":"Kalamullah Ramli","orcid":"https://orcid.org/0000-0002-0374-4465"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Kalamullah Ramli","raw_affiliation_strings":["Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia","Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Jawa Barat, Indonesia"],"raw_orcid":"https://orcid.org/0000-0002-0374-4465","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]},{"raw_affiliation_string":"Department of Electrical Engineering, Faculty of Engineering, Universitas Indonesia, Depok, Jawa Barat, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067665567","display_name":"Andriani Adi Lestari","orcid":"https://orcid.org/0000-0001-6613-4114"},"institutions":[{"id":"https://openalex.org/I2799392579","display_name":"Jakarta State Polytechnic","ror":"https://ror.org/04v8qfb10","country_code":"ID","type":"education","lineage":["https://openalex.org/I2799392579"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Andriani Adi Lestari","raw_affiliation_strings":["Cryptography Department, Politeknik Siber dan Sandi Negara, Cryptographic Hardware Engineering Study Program, Ciseeng, Bogor, Indonesia","Cryptographic Hardware Engineering Study Program, Cryptography Department, Politeknik Siber dan Sandi Negara, Ciseeng, Bogor, Jawa Barat, Indonesia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptography Department, Politeknik Siber dan Sandi Negara, Cryptographic Hardware Engineering Study Program, Ciseeng, Bogor, Indonesia","institution_ids":["https://openalex.org/I2799392579"]},{"raw_affiliation_string":"Cryptographic Hardware Engineering Study Program, Cryptography Department, Politeknik Siber dan Sandi Negara, Ciseeng, Bogor, Jawa Barat, Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092582001","display_name":"Wildan Wildan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wildan Wildan","raw_affiliation_strings":["Cybersecurity and Cryptography Technology Research and Development Center, National Cyber and Crypto Agency, Depok, Indonesia","Cybersecurity and Cryptography Technology Research and Development Center, National Cyber and Crypto Agency, Jalan Raya Muchtar 70 Bojongsari, Depok, Jawa Barat, Indonesia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cybersecurity and Cryptography Technology Research and Development Center, National Cyber and Crypto Agency, Depok, Indonesia","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Cybersecurity and Cryptography Technology Research and Development Center, National Cyber and Crypto Agency, Jalan Raya Muchtar 70 Bojongsari, Depok, Jawa Barat, Indonesia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021142200","display_name":"Bernardi Pranggono","orcid":"https://orcid.org/0000-0002-2992-697X"},"institutions":[{"id":"https://openalex.org/I51216347","display_name":"Anglia Ruskin University","ror":"https://ror.org/0009t4v78","country_code":"GB","type":"education","lineage":["https://openalex.org/I51216347"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bernardi Pranggono","raw_affiliation_strings":["School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K","School of Computing and Information Science, Anglia Ruskin University, Cambridge, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-2992-697X","affiliations":[{"raw_affiliation_string":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, U.K","institution_ids":["https://openalex.org/I51216347"]},{"raw_affiliation_string":"School of Computing and Information Science, Anglia Ruskin University, Cambridge, United Kingdom","institution_ids":["https://openalex.org/I51216347"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040325946","display_name":"Rini Wisnu Wardhani","orcid":"https://orcid.org/0000-0003-0565-6458"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Rini Wisnu Wardhani","raw_affiliation_strings":["School of Computer Science and Engineering, Pusan National University, Busan, South Korea","Cryptographic Hardware Engineering Study Program, Cryptography Department, Politeknik Siber dan Sandi Negara, Ciseeng, Bogor, Jawa Barat, Indonesia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Pusan National University, Busan, South Korea","institution_ids":["https://openalex.org/I4921948"]},{"raw_affiliation_string":"Cryptographic Hardware Engineering Study Program, Cryptography Department, Politeknik Siber dan Sandi Negara, Ciseeng, Bogor, Jawa Barat, Indonesia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5011631794"],"corresponding_institution_ids":["https://openalex.org/I29617571"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.0221,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89238886,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"84074","last_page":"84090"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.8345891237258911},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8063092827796936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7848408222198486},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.7166541218757629},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.7056519389152527},{"id":"https://openalex.org/keywords/mdc-2","display_name":"MDC-2","score":0.7014980316162109},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5616231560707092},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.549928605556488},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.5247143507003784},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.5003511905670166},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4627767503261566},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.4581730365753174},{"id":"https://openalex.org/keywords/hash-tree","display_name":"Hash tree","score":0.4441722631454468},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.382586270570755},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3211507797241211},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3170131742954254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1260744035243988}],"concepts":[{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.8345891237258911},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8063092827796936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7848408222198486},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.7166541218757629},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.7056519389152527},{"id":"https://openalex.org/C200086178","wikidata":"https://www.wikidata.org/wiki/Q3841252","display_name":"MDC-2","level":5,"score":0.7014980316162109},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5616231560707092},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.549928605556488},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.5247143507003784},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.5003511905670166},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4627767503261566},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.4581730365753174},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.4441722631454468},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.382586270570755},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3211507797241211},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3170131742954254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1260744035243988}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2023.3301128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3301128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10201838.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:shura.shu.ac.uk:32279","is_oa":true,"landing_page_url":"http://orcid.org/0000-0002-2992-697X>","pdf_url":"https://shura.shu.ac.uk/32279/1/Two%20New%20Lightweight%20Cryptographic%20Hash%20Functions%20Based%20on%20Saturnin%20and%20Beetle%20for%20the%20Internet%20of%20Things.pdf","source":{"id":"https://openalex.org/S4306401600","display_name":"SHURA (Sheffield Hallam University Research Archive) (Sheffield Hallam University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71422933","host_organization_name":"Sheffield Hallam University","host_organization_lineage":["https://openalex.org/I71422933"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:doaj.org/article:9cc92d0ab6e548be822c1fd127fc2e88","is_oa":true,"landing_page_url":"https://doaj.org/article/9cc92d0ab6e548be822c1fd127fc2e88","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 84074-84090 (2023)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/27103642","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Two_New_Lightweight_Cryptographic_Hash_Functions_Based_on_Saturnin_and_Beetle_for_the_Internet_of_Things/27103642","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3301128","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3301128","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10201838.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5}],"awards":[{"id":"https://openalex.org/G1364490200","display_name":null,"funder_award_id":"NKB-820/UN2.RST/HKP.05.00/2023","funder_id":"https://openalex.org/F4320323819","funder_display_name":"Universitas Indonesia"},{"id":"https://openalex.org/G3161546081","display_name":null,"funder_award_id":"NKB-509/UN2.RST/HKP.05.00/2022","funder_id":"https://openalex.org/F4320323819","funder_display_name":"Universitas Indonesia"},{"id":"https://openalex.org/G3833462595","display_name":null,"funder_award_id":"RST/HKP.05.00/2022","funder_id":"https://openalex.org/F4320323819","funder_display_name":"Universitas Indonesia"},{"id":"https://openalex.org/G5823471754","display_name":null,"funder_award_id":"20194210114181","funder_id":"https://openalex.org/F4320328515","funder_display_name":"Lembaga Pengelola Dana Pendidikan"},{"id":"https://openalex.org/G7230163141","display_name":null,"funder_award_id":"UN2.RST/HKP.05.00/2022","funder_id":"https://openalex.org/F4320323819","funder_display_name":"Universitas Indonesia"}],"funders":[{"id":"https://openalex.org/F4320323819","display_name":"Universitas Indonesia","ror":"https://ror.org/0116zj450"},{"id":"https://openalex.org/F4320328515","display_name":"Lembaga Pengelola Dana Pendidikan","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4385486297.pdf","grobid_xml":"https://content.openalex.org/works/W4385486297.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W35428663","https://openalex.org/W35465894","https://openalex.org/W112080296","https://openalex.org/W147018390","https://openalex.org/W1503638523","https://openalex.org/W1517403092","https://openalex.org/W1518029257","https://openalex.org/W1539249970","https://openalex.org/W1780696059","https://openalex.org/W1959383191","https://openalex.org/W1984365546","https://openalex.org/W2058507421","https://openalex.org/W2106698019","https://openalex.org/W2169928374","https://openalex.org/W2392113277","https://openalex.org/W2399522404","https://openalex.org/W2401252705","https://openalex.org/W2499903304","https://openalex.org/W2567095714","https://openalex.org/W2619630761","https://openalex.org/W2621380316","https://openalex.org/W2901477756","https://openalex.org/W2938630680","https://openalex.org/W2951694401","https://openalex.org/W2954885714","https://openalex.org/W2986458967","https://openalex.org/W3010065569","https://openalex.org/W3015560102","https://openalex.org/W3045281960","https://openalex.org/W3046581855","https://openalex.org/W3081737099","https://openalex.org/W3175154342","https://openalex.org/W3200894591","https://openalex.org/W3201982261","https://openalex.org/W4211236184","https://openalex.org/W4213335922","https://openalex.org/W4225147756","https://openalex.org/W4230325126","https://openalex.org/W4235801565","https://openalex.org/W4240574532","https://openalex.org/W4289821808","https://openalex.org/W4292348028","https://openalex.org/W4312301050","https://openalex.org/W6685056582","https://openalex.org/W6712451064","https://openalex.org/W6738472258","https://openalex.org/W6797707491","https://openalex.org/W6801827957"],"related_works":["https://openalex.org/W2189320722","https://openalex.org/W1487949331","https://openalex.org/W2937807672","https://openalex.org/W3023506926","https://openalex.org/W2291537859","https://openalex.org/W2037181904","https://openalex.org/W1554022419","https://openalex.org/W2407671386","https://openalex.org/W3082687455","https://openalex.org/W2982222368"],"abstract_inverted_index":{"With":[0],"the":[1,10,57,73,76,92,97,109,116,160,172,193,197,227,240],"enormous":[2],"growth":[3],"in":[4,46,226],"Internet":[5],"of":[6,12,59,100,115,156,200,230,242,260],"Things":[7],"(IoT)":[8],"applications,":[9],"volume":[11],"data":[13,27,44,78],"shared":[14],"among":[15],"IoT":[16,22,47,49,77,266],"devices":[17,267],"is":[18,120,263],"vastly":[19],"increasing.":[20],"Extensive":[21],"device":[23],"connectivity":[24],"and":[25,88,96,125,129,138,146,174,180,192,209,222,232,255],"substantial":[26],"transmission":[28],"have":[29,69],"made":[30],"information":[31],"integrity":[32,45,79],"susceptible":[33],"to":[34,42,136,182,206],"various":[35],"assaults.":[36],"Therefore,":[37,239],"hash":[38,67,85,118,186,203,215,245],"functions":[39,68,119,204,216,246],"are":[40,51,252],"required":[41],"ensure":[43],"networks.":[48],"systems":[50],"constrained":[52],"by":[53,107],"their":[54],"complexity,":[55],"necessitating":[56],"consumption":[58],"minimal":[60],"computational":[61],"power.":[62],"As":[63],"a":[64,144,166],"result,":[65],"lightweight":[66,84],"been":[70],"selected":[71],"as":[72,250],"solution":[74],"for":[75,159,265],"issue.":[80],"We":[81],"present":[82],"two":[83,202],"functions,":[86],"Alit-Hash":[87,128,173],"Tjuilik-Hash,":[89],"based":[90],"on":[91,143,165],"Saturnin":[93,110],"block":[94,111],"cipher":[95],"Beetle":[98],"mode":[99],"operation.":[101],"In":[102],"particular,":[103],"we":[104],"created":[105],"Tjuilik-Hash":[106,130,161,175],"modifying":[108],"cipher.":[112],"The":[113,214],"strength":[114],"proposed":[117,244],"evaluated":[121,185],"through":[122],"security":[123],"analysis":[124],"performance":[126,199],"testing.":[127],"both":[131,243,253],"show":[132],"reasonably":[133],"good":[134,198],"resistance":[135],"differential":[137],"linear":[139],"cryptanalysis.":[140],"Hardware":[141],"implementations":[142,176],"cost-effective":[145,254],"low-power":[147],"microcontroller":[148],"board":[149],"(ATmega2560)":[150],"demonstrate":[151],"an":[152,257],"average":[153],"execution":[154],"time":[155],"0.746":[157],"microseconds":[158],"algorithm.":[162],"Performance":[163],"evaluations":[164],"64-bit":[167],"personal":[168],"computer":[169],"indicate":[170],"that":[171],"exhibit":[177],"comparable":[178],"speed":[179],"throughput":[181],"seven":[183,218],"other":[184],"functions.":[187],"Simulation":[188],"experiments":[189],"employing":[190],"Contiki-NG":[191],"Cooja":[194],"simulator":[195],"confirm":[196],"these":[201],"relative":[205],"Photon-Beetle-Hash,":[207],"Photon,":[208],"Spongent":[210],"across":[211],"five":[212],"metrics.":[213],"pass":[217,223],"cryptographic":[219],"randomness":[220],"tests":[221,225],"all":[224],"National":[228],"Institute":[229],"Standards":[231],"Technology":[233],"(NIST)":[234],"Statistical":[235],"Test":[236],"Suite":[237],"(STS).":[238],"implementation":[241],"should":[247],"be":[248],"considered,":[249],"they":[251],"provide":[256],"adequate":[258],"level":[259],"security,":[261],"which":[262],"essential":[264],"with":[268],"limited":[269],"resources.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
