{"id":"https://openalex.org/W3012004683","doi":"https://doi.org/10.1145/3374664.3379531","title":"A Performance Study on Cryptographic Algorithms for IoT Devices","display_name":"A Performance Study on Cryptographic Algorithms for IoT Devices","publication_year":2020,"publication_date":"2020-03-13","ids":{"openalex":"https://openalex.org/W3012004683","doi":"https://doi.org/10.1145/3374664.3379531","mag":"3012004683"},"language":"en","primary_location":{"id":"doi:10.1145/3374664.3379531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3379531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028202558","display_name":"Eduardo Anaya","orcid":"https://orcid.org/0000-0002-7184-1814"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eduardo Anaya","raw_affiliation_strings":["California State University, Sacramento, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Sacramento, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024699847","display_name":"Jimil Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jimil Patel","raw_affiliation_strings":["California State University, Sacramento, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Sacramento, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009284515","display_name":"Prerak Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prerak Shah","raw_affiliation_strings":["California State University, Sacramento, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Sacramento, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057557055","display_name":"Vrushank Shah","orcid":"https://orcid.org/0000-0002-5619-7100"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vrushank Shah","raw_affiliation_strings":["California State University, Sacramento, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Sacramento, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071262001","display_name":"Yuan Cheng","orcid":"https://orcid.org/0000-0001-7176-3951"},"institutions":[{"id":"https://openalex.org/I43522216","display_name":"California State University, Sacramento","ror":"https://ror.org/03e26wv14","country_code":"US","type":"education","lineage":["https://openalex.org/I43522216"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Cheng","raw_affiliation_strings":["California State University, Sacramento, Sacramento, CA, USA"],"affiliations":[{"raw_affiliation_string":"California State University, Sacramento, Sacramento, CA, USA","institution_ids":["https://openalex.org/I43522216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028202558"],"corresponding_institution_ids":["https://openalex.org/I43522216"],"apc_list":null,"apc_paid":null,"fwci":0.6167,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69755614,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9039000272750854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8087847232818604},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.8026890754699707},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.6937437057495117},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6577056646347046},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5246137380599976},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5049300789833069},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.48091503977775574},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.453019380569458},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.4169849157333374},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4035578966140747},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3294399678707123},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14927273988723755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8087847232818604},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.8026890754699707},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.6937437057495117},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6577056646347046},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5246137380599976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5049300789833069},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.48091503977775574},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.453019380569458},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.4169849157333374},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4035578966140747},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3294399678707123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14927273988723755},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3374664.3379531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3374664.3379531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6299999952316284,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2793234226"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2913264063","https://openalex.org/W1968560271","https://openalex.org/W2904314268","https://openalex.org/W87530933","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Internet":[0],"of":[1,42],"Things":[2],"(IoT)":[3],"devices":[4,16],"have":[5],"grown":[6],"in":[7],"popularity":[8],"over":[9],"the":[10,40,103,109],"past":[11],"few":[12],"years.":[13],"These":[14,46],"inter-connected":[15],"collect":[17],"and":[18,52,79,85],"share":[19],"data":[20,69],"for":[21,113],"automating":[22],"industrial":[23],"or":[24],"household":[25],"tasks.":[26],"Despite":[27],"its":[28],"unprecedented":[29],"growth,":[30],"this":[31],"paradigm":[32],"currently":[33],"faces":[34],"many":[35],"challenges":[36,47],"that":[37,67,99],"could":[38],"hinder":[39],"deployment":[41],"such":[43,74],"a":[44],"system.":[45],"include":[48],"power,":[49],"processing":[50],"capabilities,":[51],"security,":[53],"etc.":[54],"Our":[55,96],"project":[56],"aims":[57],"to":[58],"explore":[59],"these":[60,90],"areas":[61],"by":[62],"studying":[63],"an":[64],"IoT":[65,94,114],"network":[66],"secures":[68],"using":[70],"common":[71],"cryptographic":[72,91],"algorithms,":[73],"as":[75],"AES,":[76],"ChaCha20,":[77],"RSA,":[78],"Twofish.":[80],"We":[81],"measure":[82],"computational":[83],"time":[84],"power":[86],"usage":[87],"while":[88,100],"running":[89],"algorithms":[92],"on":[93],"devices.":[95,115],"findings":[97],"show":[98],"Twofish":[101],"is":[102,107],"most":[104,110],"power-efficient,":[105],"Chacha20":[106],"overall":[108],"suitable":[111],"one":[112]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
