[1. Thakor, V. A., M. A. Razzaque, M. R. A. Khandaker. Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities. – IEEE Access: Practical Innovations, Open Solutions, Vol. 9, 2021, pp. 28177-28193.]Search in Google Scholar
[2. Hatzivasilis, G., K. Fysarakis, I. Papaefstathiou, C. Manifavas. A Review of Lightweight Block Ciphers. – Journal of Cryptographic Engineering, Vol. 8, 2018, No 2, pp. 141-184.]Search in Google Scholar
[3. Dhanda, S. S., B. Singh, P. Jindal. Lightweight Cryptography: A Solution to Secure IoT. – Wireless Personal Communications. 2020, pp. 1947-1980.]Search in Google Scholar
[4. Alazzam, H., O. AbuAlghanam, Q. M. Al-zoubi, A. Alsmady, E. Alhenawi. A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 146-160.]Search in Google Scholar
[5. Khan, M. N., A. Rao, S. Camtepe. Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey. – IEEE Internet of Things Journal, Vol. 8, 2021, No 6, pp. 4132-4156.]Search in Google Scholar
[6. Sallam, S., B. D. Beheshti. A Survey on Lightweight Cryptographic Algorithms. – In: Proc. of IEEE Region 10 Conference (TENCON’18), IEEE, 2018.]Search in Google Scholar
[7. Julian Okello, W., Q. Liu, F. Ali Siddiqui, C. Zhang. A Survey of the Current State of Lightweight Cryptography for the Internet of Things. – In: Proc. of International Conference on Computer, Information and Telecommunication Systems (CITS’17), 2017, pp. 292-296.]Search in Google Scholar
[8. Nayancy, D. S., S. Chakraborty. A Survey on Implementation of Lightweight Block Ciphers for Resource Constraints Devices. – Journal of Discrete Mathematical Sciences & Cryptography, Vol. 2020, pp. 1-22.]Search in Google Scholar
[9. Singh, S., P. K. Sharma, S. Y. Moon, J. H. Park. Advanced Lightweight Encryption Algorithms for IoT Devices: Survey, Challenges and Solutions. – Journal of Ambient Intelligence and Humanized Computing, 2017.]Search in Google Scholar
[10. Mousavi, S. K., A. Ghaffari, S. Besharat, H. Afshari. Security of Internet of Things Based on Cryptographic Algorithms: A Survey. – Wireless Networks, Vol. 27, 2021, No 2, pp. 1515-1555.]Search in Google Scholar
[11. Mustafa, G., R. Ashraf, M. Mirza, A. Jamil, A. Muhammad. A Review of Data Security and Cryptographic Techniques in IoT Based Devices. – In: Proc. of 2nd International Conference on Future Networks and Distributed Systems, ACM, New York, NY, USA, 2018.]Search in Google Scholar
[12. Fotovvat, A., G. M. E. Rahman, S. S. Vedaei, K. A. Wahid. Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes. – IEEE Internet of Things Journal, Vol. 8, 2021, No 10, pp. 8279-8290.]Search in Google Scholar
[13. Sudha, K. S., N. Jeyanthi. A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT). – Cybernetics and Information Technologies, Vol. 21, 2021, No 3, pp. 50-72.]Search in Google Scholar
[14. Bhardwaj, I., A. Kumar, M. Bansal. A Review on Lightweight Cryptography Algorithms for Data Security and Authentication in IoTs. – In: Proc. of 4th International Conference on Signal Processing, Computing and Control (ISPCC’17), IEEE, 2017.]Search in Google Scholar
[15. Surendran, S., A. Nassef, B. D. Beheshti. A Survey of Cryptographic Algorithms for IoT Devices. – In: Proc. of IEEE Long Island Systems, Applications, and Technology Conference (LISAT’18), IEEE, 2018.]Search in Google Scholar
[16. Goyal, T. K., V. Sahula, D. Kumawat. Energy Efficient Lightweight Cryptography Algorithms for IoT Devices. – IETE Journal of Research, Vol. 2019, pp. 1-14.]Search in Google Scholar
[17. Dutta, I. K., B. Ghosh, M. Bayoumi. Lightweight Cryptography for Internet of Insecure Things: A Survey. – In: Proc. of 9th IEEE Annual Computing and Communication Workshop and Conference (CCWC’19), IEEE, 2019.]Search in Google Scholar
[18. Gunathilake, N. A., W. J. Buchanan, R. Asif. Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. – In: Proc. of 5th IEEE World Forum on Internet of Things (WF-IoT’19), IEEE, 2019.]Search in Google Scholar
[19. Gunathilake, N. A., A. Al-Dubai, W. J. Buchana. Recent Advances and Trends in Lightweight Cryptography for IoT Security. – In: Proc. of 16th International Conference on Network and Service Management (CNSM’20), IEEE, 2020.]Search in Google Scholar
[20. Dai, Y., S. Chen. Cryptanalysis of Full PRIDE Block Cipher. – Science China Information Sciences, Vol. 60, 2017, No 5.]Search in Google Scholar
[21. Zhao, J., X. Wang, M. Wang, X. Dong. Differential Analysis on Block Cipher PRIDE. – In: Cryptology ePrint Archive. Vol. 2014.]Search in Google Scholar
[22. Yang, Q., L. Hu, S. Sun, K. Qiao, L. Song, J. Shan, X. Ma. Improved Differential Analysis of Block Cipher PRIDE. Information Security Practice and Experience. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2015, pp. 209-219.]Search in Google Scholar
[23. Lallemand, V., S. Rasoolzadeh. Differential Cryptanalysis of 18-Round PRIDE. Lecture Notes in Computer Science. – In: Lecture Notes in Computer Science. Cham, Springer International Publishing, 2017, pp. 126-146.]Search in Google Scholar
[24. Hou, X., J. Breier, F. Zhang, Y. Liu. Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. – In: IACR Transactions on Cryptographic Hardware and Embedded Systems. Vol. 2019. pp. 1-29.]Search in Google Scholar
[25. Soleimany, H. Self-Similarity Cryptanalysis of the Block Cipher ITUbee. – IET Information Security, Vol. 9, 2015, No 3, pp. 179-184.]Search in Google Scholar
[26. Fu, S., G. Xu, J. Pan, Z. Wang, A. Wang. Differential Fault Attack on ITUbee Block Cipher. – ACM Transactions on Embedded Computing Systems, Vol. 16, 2017, No 2, pp. 1-10.]Search in Google Scholar
[27. Kang, Y., Q. Yu, L. Qin, G. Zhang. Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher. – Symmetry, Vol. 15, 2023, No 6, p. 1196.]Search in Google Scholar
[28. Meier, W. On the Security of the IDEA Block Cipher. Advances in Cryptology. – In: EUROCRYPT 1993. Berlin, Heidelberg, Springer, 2007, pp. 371-385.]Search in Google Scholar
[29. Biham, E., O. Dunkelman, N. Keller. A New Attack on 6-Round IDEA. Fast Software Encryption. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2007, pp. 211-224.]Search in Google Scholar
[30. Biham, E., O. Dunkelman, N. Keller. New Cryptanalytic Results on IDEA. Advances in Cryptology – ASIACRYPT 2006. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2006, pp. 412-427.]Search in Google Scholar
[31. Clavier, C., B. Gierlichs, I. Verbauwhede. Fault Analysis Study of IDEA. Topics in Cryptology – CT-RSA 2008. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2008, pp. 274-287.]Search in Google Scholar
[32.Biryukov, A., J. Nakahara, B. J. Preneel, J. Vandewalle. New Weak-Key Classes of IDEA. Information and Communications Security. – In: Lecture Notes in Computer Science. Berlin, Heidelberg, Springer, 2002, pp. 315-326.]Search in Google Scholar