{"id":"https://openalex.org/W4387327760","doi":"https://doi.org/10.1186/s42400-023-00174-9","title":"An efficient permutation approach for SbPN-based symmetric block ciphers","display_name":"An efficient permutation approach for SbPN-based symmetric block ciphers","publication_year":2023,"publication_date":"2023-10-05","ids":{"openalex":"https://openalex.org/W4387327760","doi":"https://doi.org/10.1186/s42400-023-00174-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-023-00174-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00174-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00174-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00174-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031080425","display_name":"Mir Nazish","orcid":"https://orcid.org/0000-0003-2488-9054"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Mir Nazish","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052041451","display_name":"M. Tariq Banday","orcid":"https://orcid.org/0000-0001-8504-5061"},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Tariq Banday","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091509432","display_name":"Insha Syed","orcid":null},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Insha Syed","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051590191","display_name":"Sheena Banday","orcid":null},"institutions":[{"id":"https://openalex.org/I135388327","display_name":"University of Kashmir","ror":"https://ror.org/032xfst36","country_code":"IN","type":"education","lineage":["https://openalex.org/I135388327"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sheena Banday","raw_affiliation_strings":["Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, 190006, India","institution_ids":["https://openalex.org/I135388327"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5031080425"],"corresponding_institution_ids":["https://openalex.org/I135388327"],"apc_list":null,"apc_paid":null,"fwci":1.2098,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83507291,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7684522867202759},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5898944735527039},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5103928446769714},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47924235463142395},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47045934200286865},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46557849645614624},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.37626224756240845},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3585943281650543},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35631322860717773},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3322848081588745},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12183201313018799}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7684522867202759},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5898944735527039},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5103928446769714},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47924235463142395},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47045934200286865},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46557849645614624},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37626224756240845},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3585943281650543},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35631322860717773},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3322848081588745},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12183201313018799},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-023-00174-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00174-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00174-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6dcdc2e3b4954b629eeec763891d353e","is_oa":true,"landing_page_url":"https://doaj.org/article/6dcdc2e3b4954b629eeec763891d353e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 6, Iss 1, Pp 1-18 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-023-00174-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-023-00174-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-023-00174-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G627799882","display_name":null,"funder_award_id":"Junior","funder_id":"https://openalex.org/F4320320767","funder_display_name":"University Grants Commission"},{"id":"https://openalex.org/G7460481564","display_name":null,"funder_award_id":"190520461818","funder_id":"https://openalex.org/F4320320767","funder_display_name":"University Grants Commission"},{"id":"https://openalex.org/G8355436068","display_name":null,"funder_award_id":"India","funder_id":"https://openalex.org/F4320320767","funder_display_name":"University Grants Commission"}],"funders":[{"id":"https://openalex.org/F4320320767","display_name":"University Grants Commission","ror":"https://ror.org/04p800546"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387327760.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W69707633","https://openalex.org/W1499906440","https://openalex.org/W1518029257","https://openalex.org/W1548516269","https://openalex.org/W1599175145","https://openalex.org/W1603169531","https://openalex.org/W1894646615","https://openalex.org/W2114621263","https://openalex.org/W2185521131","https://openalex.org/W2259028591","https://openalex.org/W2281317404","https://openalex.org/W2294452557","https://openalex.org/W2506374507","https://openalex.org/W2574539584","https://openalex.org/W2741840250","https://openalex.org/W2746746438","https://openalex.org/W2883185786","https://openalex.org/W2888945855","https://openalex.org/W2890396832","https://openalex.org/W2935738138","https://openalex.org/W3046879246","https://openalex.org/W3082530243","https://openalex.org/W3089944233","https://openalex.org/W3202178272","https://openalex.org/W4283768456","https://openalex.org/W4316021330"],"related_works":["https://openalex.org/W2921933689","https://openalex.org/W1965071774","https://openalex.org/W2022465938","https://openalex.org/W2274979005","https://openalex.org/W1652154026","https://openalex.org/W2735819958","https://openalex.org/W2780340867","https://openalex.org/W2564198540","https://openalex.org/W2390965452","https://openalex.org/W2350961105"],"abstract_inverted_index":{"Abstract":[0],"It":[1],"is":[2,93,99,114],"challenging":[3],"to":[4,23,102],"devise":[5],"lightweight":[6,67],"cryptographic":[7,68],"primitives":[8],"efficient":[9,36,49],"in":[10,52,104,107,117,142,199],"both":[11,239],"hardware":[12,37,44,69],"and":[13,63,76,87,159,167,171,195,207,216,223,235,241],"software":[14],"that":[15,40],"can":[16],"provide":[17],"an":[18,35,185],"optimum":[19],"level":[20],"of":[21,26,201,248],"security":[22],"diverse":[24],"Internet":[25],"Things":[27],"applications":[28],"running":[29],"on":[30,174],"low-end":[31],"constrained":[32],"devices.":[33],"Therefore,":[34],"design":[38,70,137],"approach":[39,138,162,229],"requires":[41],"some":[42],"specific":[43],"resource":[45],"may":[46],"not":[47],"be":[48],"if":[50],"implemented":[51],"software.":[53],"Substitution":[54,143,253],"bit":[55,88,144,157,254],"Permutation":[56,145,255],"Network":[57,146,256],"based":[58,147,257],"ciphers":[59,73,148,173],"such":[60],"as":[61,184],"PRESENT":[62,172,240],"GIFT":[64,170,242],"are":[65],"efficient,":[66],"approaches.":[71],"These":[72],"introduce":[74],"confusion":[75],"diffusion":[77],"by":[78,95],"employing":[79],"a":[80,134,150],"4":[81,83],"\u00d7":[82],"static":[84],"substitution":[85],"box":[86],"permutations.":[89],"The":[90,153,189,227],"bit-wise":[91],"permutation":[92,127,140,155],"realised":[94],"simple":[96],"rerouting,":[97],"which":[98],"most":[100],"cost-effective":[101],"implement":[103],"hardware,":[105],"resulting":[106],"negligible":[108],"power":[109,236],"consumption.":[110],"However,":[111],"this":[112],"method":[113,251],"highly":[115],"resource-consuming":[116],"software,":[118],"particularly":[119],"for":[120,139,169,220,238,252],"large":[121],"block-sized":[122],"ciphers,":[123,243],"with":[124,180],"each":[125],"single-bit":[126],"requiring":[128],"multiple":[129],"sub-operations.":[130],"This":[131],"paper":[132],"proposes":[133],"novel":[135],"software-based":[136],"operation":[141],"using":[149,156,214],"bit-banding":[151],"feature.":[152],"conventional":[154,194],"rotation":[158],"the":[160,196,246,249],"proposed":[161,197,228,250],"have":[163],"been":[164,211],"implemented,":[165],"analysed":[166],"compared":[168],"ARM":[175],"Cortex-M3-based":[176],"LPC1768":[177],"development":[178],"platform":[179],"KEIL":[181],"MDK":[182],"used":[183],"Integrated":[186],"Development":[187],"Environment.":[188],"real-time":[190],"performance":[191],"comparison":[192],"between":[193],"approaches":[198],"terms":[200],"memory":[202],"(RAM/ROM)":[203],"footprint,":[204],"power,":[205],"energy":[206,234],"execution":[208,232],"time":[209],"has":[210],"carried":[212],"out":[213],"ULINKpro":[215],"ULINKplus":[217],"debug":[218],"adapters":[219],"various":[221],"code":[222],"speed":[224],"optimisation":[225],"scenarios.":[226],"substantially":[230],"reduces":[231],"time,":[233],"consumption":[237],"thus":[244],"demonstrating":[245],"efficiency":[247],"symmetric":[258],"block":[259],"ciphers.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
