{"id":"https://openalex.org/W2918305041","doi":"https://doi.org/10.1109/tencon.2018.8650352","title":"A Survey on Lightweight Cryptographic Algorithms","display_name":"A Survey on Lightweight Cryptographic Algorithms","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2918305041","doi":"https://doi.org/10.1109/tencon.2018.8650352","mag":"2918305041"},"language":"en","primary_location":{"id":"doi:10.1109/tencon.2018.8650352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069946310","display_name":"Suzan Sallam","orcid":"https://orcid.org/0000-0003-0144-3084"},"institutions":[{"id":"https://openalex.org/I26604189","display_name":"Shiv Nadar University","ror":"https://ror.org/05aqahr97","country_code":"IN","type":"education","lineage":["https://openalex.org/I26604189"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Suzan Sallam","raw_affiliation_strings":["Electrical Engineering Department, Shiv Nadar University, Greater Moods, UP, India"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Shiv Nadar University, Greater Moods, UP, India","institution_ids":["https://openalex.org/I26604189"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074754932","display_name":"Babak D. Beheshti","orcid":null},"institutions":[{"id":"https://openalex.org/I2802194831","display_name":"Samsung Medical Center","ror":"https://ror.org/05a15z872","country_code":"KR","type":"healthcare","lineage":["https://openalex.org/I2250650973","https://openalex.org/I2802194831"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Babak D. Beheshti","raw_affiliation_strings":["Medical Science Research Institute, Samsung Medical Center, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Medical Science Research Institute, Samsung Medical Center, Seoul, South Korea","institution_ids":["https://openalex.org/I2802194831"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069946310"],"corresponding_institution_ids":["https://openalex.org/I26604189"],"apc_list":null,"apc_paid":null,"fwci":2.9274,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.93049597,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1784","last_page":"1789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8203094005584717},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.729873538017273},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6233041286468506},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5517128705978394},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5220134854316711},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5140934586524963},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.42281949520111084},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4161857068538666},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.33883535861968994},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3222953677177429},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.263666033744812}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8203094005584717},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.729873538017273},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6233041286468506},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5517128705978394},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5220134854316711},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5140934586524963},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.42281949520111084},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4161857068538666},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.33883535861968994},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3222953677177429},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.263666033744812},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tencon.2018.8650352","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tencon.2018.8650352","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"TENCON 2018 - 2018 IEEE Region 10 Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.7099999785423279,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W97949831","https://openalex.org/W1502608166","https://openalex.org/W1514141030","https://openalex.org/W1522919234","https://openalex.org/W1535060573","https://openalex.org/W1569252980","https://openalex.org/W1575062508","https://openalex.org/W1577114801","https://openalex.org/W1588259322","https://openalex.org/W1768104815","https://openalex.org/W1887479902","https://openalex.org/W1894646615","https://openalex.org/W1944544385","https://openalex.org/W2007151319","https://openalex.org/W2010885951","https://openalex.org/W2022499506","https://openalex.org/W2033509971","https://openalex.org/W2040121304","https://openalex.org/W2076397729","https://openalex.org/W2078553675","https://openalex.org/W2096333427","https://openalex.org/W2116723762","https://openalex.org/W2120611165","https://openalex.org/W2120694370","https://openalex.org/W2130585055","https://openalex.org/W2132271754","https://openalex.org/W2136357748","https://openalex.org/W2153946919","https://openalex.org/W2159682369","https://openalex.org/W2164455525","https://openalex.org/W2183529040","https://openalex.org/W2184421340","https://openalex.org/W2315646428","https://openalex.org/W2318603281","https://openalex.org/W2340898402","https://openalex.org/W2518426978","https://openalex.org/W2594570269","https://openalex.org/W2604140404","https://openalex.org/W2606231755","https://openalex.org/W2615409614","https://openalex.org/W2621049407","https://openalex.org/W2756729278","https://openalex.org/W2760589008","https://openalex.org/W2806044281","https://openalex.org/W2994777388","https://openalex.org/W4243812556","https://openalex.org/W4285719527","https://openalex.org/W6603952376","https://openalex.org/W6631414318","https://openalex.org/W6631904817","https://openalex.org/W6634042143","https://openalex.org/W6634504867","https://openalex.org/W6634779231","https://openalex.org/W6635096620","https://openalex.org/W6639448010","https://openalex.org/W6639565960","https://openalex.org/W6678011936","https://openalex.org/W6686447220","https://openalex.org/W6704161709","https://openalex.org/W6726945962","https://openalex.org/W6734623912","https://openalex.org/W6735971738","https://openalex.org/W6772096943","https://openalex.org/W6881790436"],"related_works":["https://openalex.org/W2402794349","https://openalex.org/W4281963727","https://openalex.org/W2183790483","https://openalex.org/W3208402582","https://openalex.org/W2998997824","https://openalex.org/W3194244812","https://openalex.org/W3189651157","https://openalex.org/W2583600037","https://openalex.org/W2471797013","https://openalex.org/W4233054201"],"abstract_inverted_index":{"The":[0,84],"emergence":[1],"of":[2,4,29,95,105,117,173,195],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7,31,59,101,109,139],"is":[8,160],"challenging":[9],"the":[10,26,49,78,89,93,99],"conventional":[11],"design":[12,40,94],"targets":[13,41],"for":[14,38,98,135],"integrated":[15],"systems":[16],"such":[17,140],"as":[18,75,141,151,178],"energy":[19],"efficiency,":[20],"cost,":[21],"noise,":[22],"and":[23,53,130,146,181,193],"performance.":[24],"With":[25],"prospected":[27],"proliferation":[28],"IoT":[30,58,100,108],"with":[32,88],"5G":[33],"networks,":[34],"ensuring":[35],"safe":[36],"margins":[37],"these":[39,106],"will":[42],"become":[43],"even":[44],"more":[45,70],"crucial":[46],"due":[47],"to":[48,63,72,77,112,132,162],"limited":[50],"battery":[51],"life":[52],"significant":[54],"physical":[55],"constraints.":[56],"Additionally,":[57],"are":[60,68,170,185,198],"quite":[61,102],"vulnerable":[62],"hardware":[64,196],"attacks":[65],"since":[66],"they":[67],"typically":[69],"accessible":[71],"an":[73],"attacker":[74],"compared":[76],"other":[79],"general":[80],"purpose":[81],"computing":[82],"devices.":[83],"limitations,":[85],"when":[86],"combined":[87],"cost":[90],"constraints":[91],"make":[92],"security":[96,191],"measures":[97],"challenging.":[103],"Regardless":[104],"constraints,":[107],"still":[110],"need":[111],"perform":[113],"a":[114,158],"certain":[115],"level":[116],"secure":[118],"computation":[119],"by":[120],"utilizing":[121],"encryption":[122],"algorithms.":[123,154,168],"Subsequently,":[124],"new":[125],"specific":[126],"cryptographic":[127,153,167],"algorithms":[128,176],"designed":[129],"developed":[131],"be":[133],"adequate":[134],"implementation":[136],"in":[137,187],"resource-constrained":[138],"RFID":[142],"systems,":[143],"smart":[144],"card,":[145],"wireless":[147],"sensor":[148],"networks":[149],"known":[150],"lightweight":[152,166,174],"In":[155],"this":[156,188],"paper,":[157],"survey":[159],"conducted":[161],"compare":[163],"between":[164],"selected":[165],"There":[169],"two":[171],"types":[172],"cryptography":[175],"know":[177],"block":[179],"ciphers":[180],"stream":[182],"ciphers,":[183],"both":[184],"presented":[186],"paper.":[189],"Their":[190],"features":[192],"performances":[194],"implementations":[197],"also":[199],"analyzed.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":3}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
