{"id":"https://openalex.org/W2050488636","doi":"https://doi.org/10.1109/isias.2011.6122793","title":"Analysis on Lightweight Block Cipher, KTANTAN","display_name":"Analysis on Lightweight Block Cipher, KTANTAN","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2050488636","doi":"https://doi.org/10.1109/isias.2011.6122793","mag":"2050488636"},"language":"en","primary_location":{"id":"doi:10.1109/isias.2011.6122793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049937025","display_name":"Nik Azura Nik Abdullah","orcid":"https://orcid.org/0009-0004-2375-7150"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nik Azura Nik Abdullah","raw_affiliation_strings":["CyberSecurity Malaysia, Seri Kembangan, Selangor, MY"],"affiliations":[{"raw_affiliation_string":"CyberSecurity Malaysia, Seri Kembangan, Selangor, MY","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5096178772","display_name":"Norul Hidayah Lot Ahmad Zawawi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Norul Hidayah Lot @ Ahmad Zawawi","raw_affiliation_strings":["Cyber Technology Research Department, CyberSecurity Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Cyber Technology Research Department, CyberSecurity Malaysia, Kuala Lumpur, Malaysia","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085113088","display_name":"Hazlin Abdul Rani","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hazlin Abdul Rani","raw_affiliation_strings":["Cyber Technology Research Department, CyberSecurity Malaysia, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Cyber Technology Research Department, CyberSecurity Malaysia, Kuala Lumpur, Malaysia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049937025"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8552,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7937556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"51"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.7899408340454102},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.7310940027236938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7309019565582275},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.6135509014129639},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.582587718963623},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5811447501182556},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.5714919567108154},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5492298007011414},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5337271094322205},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.49048683047294617},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.46962597966194153},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.4425642788410187},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4229973256587982},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4207083582878113},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.41934674978256226},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4119695723056793},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4031062424182892},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1702151894569397},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16038131713867188},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.12837696075439453},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12355831265449524},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.11834031343460083},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.06065976619720459},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.05791133642196655}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.7899408340454102},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.7310940027236938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7309019565582275},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.6135509014129639},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.582587718963623},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5811447501182556},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.5714919567108154},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5492298007011414},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5337271094322205},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.49048683047294617},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.46962597966194153},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.4425642788410187},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4229973256587982},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4207083582878113},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.41934674978256226},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4119695723056793},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4031062424182892},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1702151894569397},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16038131713867188},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.12837696075439453},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12355831265449524},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.11834031343460083},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.06065976619720459},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.05791133642196655},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isias.2011.6122793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isias.2011.6122793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 7th International Conference on Information Assurance and Security (IAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W130748940","https://openalex.org/W1505779117","https://openalex.org/W1517403092","https://openalex.org/W1607874478","https://openalex.org/W2750794233","https://openalex.org/W4240963859","https://openalex.org/W4243494487","https://openalex.org/W6825343983"],"related_works":["https://openalex.org/W2187592226","https://openalex.org/W2150486630","https://openalex.org/W2159145942","https://openalex.org/W2403423567","https://openalex.org/W4399418742","https://openalex.org/W3023277189","https://openalex.org/W4235009056","https://openalex.org/W1557906236","https://openalex.org/W2949773584","https://openalex.org/W2955849560"],"abstract_inverted_index":{"In":[0],"this":[1],"research,":[2],"we":[3,59],"present":[4],"the":[5,37,53,71],"analysis":[6],"on":[7,70],"Lightweight":[8],"Block":[9],"Cipher;":[10],"KTANTAN.":[11],"This":[12],"block":[13,20],"cipher":[14],"consists":[15],"of":[16,22,39],"three":[17,64],"algorithms":[18,65],"with":[19],"sizes":[21],"32/48/64-bit":[23],"and":[24],"utilizes":[25],"an":[26],"80-bit":[27],"key.":[28],"NIST":[29],"Statistical":[30],"Test":[31],"Suite":[32],"is":[33],"used":[34],"to":[35,51],"determine":[36],"randomness":[38],"output":[40,54],"sequence":[41],"produced":[42],"by":[43],"all":[44,63],"algorithms.":[45],"Nine":[46],"data":[47],"categories":[48],"are":[49,66],"applied":[50],"generate":[52],"sequence.":[55],"From":[56],"our":[57],"analysis,":[58],"found":[60],"out":[61],"that":[62],"not":[67],"random":[68],"based":[69],"1%":[72],"significance":[73],"level.":[74]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
