{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T19:03:01Z","timestamp":1771527781247,"version":"3.50.1"},"reference-count":56,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Circuit Theory &amp;amp; Apps"],"published-print":{"date-parts":[[2024,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Smart door locks pose a large number of threats such as network attacks. Its storage area and power of cipher are severely limited because the wireless nodes of smart door locks are mostly battery\u2010powered. Therefore, effective security solutions are urgently needed. In this paper, a new lightweight block cipher with low power named LPHD is proposed to ensure the security of the master control chip of the smart door lock terminal. We design a scheme of low power S\u2010box and construct the two\u2010stage permutation layer (TP structure) suitable for LPHD by filtering the sets of 8\u2010bit permutations. LPHD proposes a variant of the 8\u2010branch generalized Feistel structure (GFS) to realize that the bits of all branches are affected in one encryption round. The problem of slow diffusion in the standard Feistel structure is solved. The key schedule adopts the nonlinear design and reuses the encryption process of LPHD. It improves the security of the cipher and reduces hardware overhead. Moreover, we evaluate the hardware implementation and security of LPHD. The results show that LPHD for the unified encryption and decryption circuits requires only 1276 Gate Equivalents (GEs) and 1.914 \nW on UMC 0.18 \nm, which is better than other lightweight block ciphers such as SKINNY, PRESENT, and IVLBC. In summary, LPHD provides sufficient security for the master control chip of the smart door lock terminal.<\/jats:p>","DOI":"10.1002\/cta.4072","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T02:25:55Z","timestamp":1715826355000},"page":"6424-6447","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["LPHD: A low power and high diffusion lightweight block cipher"],"prefix":"10.1002","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4778-1359","authenticated-orcid":false,"given":"Ruihan","family":"Xu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology Hengyang Normal University  Hengyang China"},{"name":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University  Hengyang China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4832-4499","authenticated-orcid":false,"given":"Lang","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Hengyang Normal University  Hengyang China"},{"name":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University  Hengyang China"}]},{"given":"Xiantong","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology Hengyang Normal University  Hengyang China"},{"name":"Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University  Hengyang China"}]}],"member":"311","published-online":{"date-parts":[[2024,5,15]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS\u2010189624"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.003"},{"key":"e_1_2_11_4_1","unstructured":"BogdanovA KnudsenLR LeanderG et al.PRESENT: an ultra\u2010lightweight block cipher. In: Cryptographic Hardware and Embedded Systems \u2010 CHES 2007 9th International Workshop Vienna Austria September 10\u201013 2007 ProceedingsPaillierP VerbauwhedeI eds.Lecture Notes in Computer Science vol.\u00a04727.Springer;2007:450\u2010466. doi:10.1007\/978\u20103\u2010540\u201074735\u20102_31"},{"key":"e_1_2_11_5_1","unstructured":"ShibutaniK IsobeT HiwatariH MitsudaA AkishitaT ShiraiT.Piccolo: an ultra\u2010lightweight blockcipher. In: Cryptographic Hardware and Embedded Systems \u2010 CHES 2011 \u2010 13th International Workshop Nara Japan September 28 \u2010 October 1 2011. ProceedingsPreneelB TakagiT eds.Lecture Notes in Computer Science vol.\u00a06917.Springer;2011:342\u2010357. doi:10.1007\/978\u20103\u2010642\u201023951\u20109_23"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3227951"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2023.102090"},{"key":"e_1_2_11_8_1","doi-asserted-by":"crossref","unstructured":"BeierleC JeanJ K\u00f6lblS et al.The SKINNY family of block ciphers and its low\u2010latency variant MANTIS. In: Advances in Cryptology \u2010 CRYPTO 2016 \u2010 36th Annual International Cryptology Conference Santa Barbara CA USA August 14\u201018 2016 Proceedings Part IIRobshawM KatzJ eds.Lecture Notes in Computer Science vol.\u00a09815.Springer;2016:123\u2010153. doi:10.1007\/978\u20103\u2010662\u201053008\u20105_5","DOI":"10.1007\/978-3-662-53008-5_5"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432\u2010015\u20105459\u20107"},{"key":"e_1_2_11_10_1","doi-asserted-by":"crossref","unstructured":"BorghoffJ CanteautA G\u00fcneysuT et al.PRINCE\u2013a low\u2010latency block cipher for pervasive computing applications. In: Advances in Cryptology\u2013ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security Beijing China December 2\u20106 2012. Proceedings 18;2012:208\u2010225.","DOI":"10.1007\/978-3-642-34961-4_14"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2017.i1.4\u201044"},{"key":"e_1_2_11_12_1","doi-asserted-by":"crossref","unstructured":"CantoAC KermaniMM AzarderakhshR GajK.CRC\u2010oriented error detection architectures of post\u2010quantum cryptography niederreiter key generator on FPGA. In:NurmiJ WislandDT AunetS KjelgaardK eds.IEEE Nordic Circuits and Systems Conference NORCAS 2022 Oslo Norway October 25\u201026 2022.IEEE;2022:1\u20107. doi:10.1109\/NorCAS57515.2022.9934378","DOI":"10.1109\/NorCAS57515.2022.9934378"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3217006"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"KermaniMM SarmadiSB AckieA\u2010BE AzarderakhshR.High\u2010performance fault diagnosis schemes for efficient hash algorithm BLAKE. In: 10th IEEE Latin American Symposium on Circuits & Systems LASCAS 2019 Armenia Colombia February 24\u201027 2019MurphyRS ed.IEEE;2019:201\u2010204. doi:10.1109\/LASCAS.2019.8667597","DOI":"10.1109\/LASCAS.2019.8667597"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3338108"},{"key":"e_1_2_11_16_1","unstructured":"KermaniMM.Fault detection schemes for high performance vlsi implementations of the advanced encryption standard.Ph.D. Thesis. Faculty of Graduate Studies University of Western Ontario;2007."},{"key":"e_1_2_11_17_1","unstructured":"KermaniMM AzarderakhshR MirakhorliM.Education and research integration of emerging multidisciplinary medical devices security. American Society for Engineering Education (ASEE);2016."},{"key":"e_1_2_11_18_1","unstructured":"Mozaffari\u00a0KermaniM AzarderakhshR MirakhorliM.Multidisciplinary approaches and challenges in integrating emerging medical devices security research and education;2016."},{"key":"e_1_2_11_19_1","doi-asserted-by":"crossref","unstructured":"Paveli\u0107M Lon\u010dari\u0107Z Vukovi\u0107M Ku\u0161ekM.Internet of things cyber security: smart door lock system. In: 2018 International Conference on Smart Systems and Technologies (SST);2018:227\u2010232.","DOI":"10.1109\/SST.2018.8564647"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145\u2010012\u20109124\u20107"},{"key":"e_1_2_11_21_1","unstructured":"BanikS BogdanovA IsobeT et al.Midori: a block cipher for low energy. In: Advances in Cryptology \u2010 ASIACRYPT 2015 \u2010 21st International Conference on the Theory and Application of Cryptology and Information Security Auckland New Zealand November 29 \u2010 December 3 2015 Proceedings Part IIIwataT CheonJH eds.Lecture Notes in Computer Science vol.\u00a09453.Springer;2015:411\u2010436. doi:10.1007\/978\u20103\u2010662\u201048800\u20103_17"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1500415"},{"key":"e_1_2_11_23_1","unstructured":"GuoJ PeyrinT PoschmannA RobshawMJB.The LED block cipher. In: Cryptographic Hardware and Embedded Systems \u2010 CHES 2011 \u2010 13th International Workshop Nara Japan September 28 \u2010 October 1 2011. ProceedingsPreneelB TakagiT eds.Lecture Notes in Computer Science vol.\u00a06917.Springer;2011:326\u2010341. doi:10.1007\/978\u20103\u2010642\u201023951\u20109_22"},{"key":"e_1_2_11_24_1","unstructured":"SuzakiT MinematsuK.Improving the generalized feistel. In: Fast Software Encryption 17th International Workshop FSE 2010 Seoul Korea February 7\u201010 2010 Revised Selected PapersHongS IwataT eds.Lecture Notes in Computer Science vol.\u00a06147.Springer;2010:19\u201039. doi:10.1007\/978\u20103\u2010642\u201013858\u20104_2"},{"key":"e_1_2_11_25_1","unstructured":"SasakiY TodoY.New algorithm for modeling S\u2010box in MILP based differential and division trail search. In: Innovative Security Solutions for Information Technology and Communications \u2010 10th International Conference SecITC 2017 Bucharest Romania June 8\u20109 2017 Revised Selected PapersFarshimP SimionE eds.Lecture Notes in Computer Science vol.\u00a010543.Springer;2017:150\u2010165. doi:10.1007\/978\u20103\u2010319\u201069284\u20105_11"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2020.i1.144\u2010184"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2019.i1.330\u2010394"},{"key":"e_1_2_11_28_1","first-page":"1189","article-title":"Invariant subspace attack against full Midori64","volume":"2015","author":"Guo J","year":"2015","journal-title":"IACR Cryptol ePrint Arch"},{"key":"e_1_2_11_29_1","first-page":"404","article-title":"The SIMON and SPECK families of lightweight block ciphers","author":"Beaulieu R","year":"2013","journal-title":"IACR Cryptol ePrint Arch"},{"key":"e_1_2_11_30_1","doi-asserted-by":"crossref","unstructured":"YangG ZhuB SuderV AagaardMD GongG.The Simeck family of lightweight block ciphers. In: Cryptographic Hardware and Embedded Systems \u2010 CHES 2015 \u2010 17th International Workshop Saint\u2010Malo France September 13\u201016 2015 ProceedingsG\u00fcneysuT HandschuhH eds.Lecture Notes in Computer Science vol.\u00a09293.Springer;2015:307\u2010329. doi:10.1007\/978\u20103\u2010662\u201048324\u20104_16","DOI":"10.1007\/978-3-662-48324-4_16"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623\u2010021\u201000970\u20109"},{"key":"e_1_2_11_32_1","unstructured":"ZhangL WuR ZhangY ZhengY WuW.LLLWBC: a new low\u2010latency light\u2010weight block cipher. In: Information Security and Cryptology \u2010 18th International Conference Inscrypt 2022 Beijing China December 11\u201013 2022 Revised Selected PapersDengY YungM eds.Lecture Notes in Computer Science vol.\u00a013837.Springer;2022:23\u201042. doi:10.1007\/978\u20103\u2010031\u201026553\u20102_2"},{"key":"e_1_2_11_33_1","doi-asserted-by":"crossref","unstructured":"HongD SungJ HongS et al.HIGHT: a new block cipher suitable for low\u2010resource device. In: Cryptographic Hardware and Embedded Systems \u2010 CHES 2006 8th International Workshop Yokohama Japan October 10\u201013 2006 ProceedingsGoubinL MatsuiM eds.Lecture Notes in Computer Science vol.\u00a04249.Springer;2006:46\u201059. doi:10.1007\/11894063_4","DOI":"10.1007\/11894063_4"},{"key":"e_1_2_11_34_1","unstructured":"SuzakiT MinematsuK MoriokaS KobayashiE.TWINE: a lightweight block cipher for multiple platforms. In: Selected Areas in Cryptography 19th International Conference SAC 2012 Windsor ON Canada August 15\u201016 2012 Revised Selected PapersKnudsenLR WuH eds.Lecture Notes in Computer Science vol.\u00a07707.Springer;2012:339\u2010354. doi:10.1007\/978\u20103\u2010642\u201035999\u20106_22"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.03.011"},{"key":"e_1_2_11_36_1","unstructured":"WebsterAF TavaresSE.On the design of S\u2010boxes. In: Advances in Cryptology \u2010 CRYPTO '85 Santa Barbara California USA August 18\u201022 1985 ProceedingsWilliamsHC ed. Lecture Notes in Computer Science vol.\u00a0218.Springer;1985:523\u2010534. doi:10.1007\/3\u2010540\u201039799\u2010X_41"},{"key":"e_1_2_11_37_1","unstructured":"MouhaN WangQ GuD PreneelB.Differential and linear cryptanalysis using mixed\u2010integer linear programming. In: Information Security and Cryptology \u2010 7th International Conference Inscrypt 2011 Beijing China November 30 \u2010 December 3 2011. Revised Selected PapersWuC YungM LinD eds.Lecture Notes in Computer Science vol.\u00a07537.Springer;2011:57\u201076. doi:10.1007\/978\u20103\u2010642\u201034704\u20107_5"},{"key":"e_1_2_11_38_1","doi-asserted-by":"crossref","unstructured":"TolbaM AbdelkhalekA YoussefAM.Impossible differential cryptanalysis of reduced\u2010round SKINNY. In: Progress in Cryptology \u2010 AFRICACRYPT 2017 \u2010 9th International Conference on Cryptology in Africa Dakar Senegal May 24\u201026 2017 ProceedingsJoyeM NitajA eds.Lecture Notes in Computer Science vol.\u00a010239;2017:117\u2010134. doi:10.1007\/978\u20103\u2010319\u201057339\u20107_7","DOI":"10.1007\/978-3-319-57339-7_7"},{"key":"e_1_2_11_39_1","doi-asserted-by":"crossref","unstructured":"CourtoisNT MeierW.Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology \u2010 EUROCRYPT 2003 International Conference on the Theory and Applications of Cryptographic Techniques Warsaw Poland May 4\u20108 2003 ProceedingsBihamE ed. Lecture Notes in Computer Science vol.\u00a02656.Springer;2003:345\u2010359. doi:10.1007\/3\u2010540\u201039200\u20109_21","DOI":"10.1007\/3-540-39200-9_21"},{"key":"e_1_2_11_40_1","unstructured":"GongZ NikovaS LawYW.KLEIN: a new family of lightweight block ciphers. In: RFID. Security and Privacy \u2010 7th International Workshop RFIDSec 2011 Amherst USA June 26\u201028 2011 Revised Selected PapersJuelsA PaarC eds.Lecture Notes in Computer Science vol.\u00a07055.Springer;2011:1\u201018. doi:10.1007\/978\u20103\u2010642\u201025286\u20100_1"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.13154\/tosc.v2019.i1.5\u201045"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940330"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3064203"},{"key":"e_1_2_11_44_1","doi-asserted-by":"crossref","unstructured":"KaramRA KatkooriS KermaniMM.Work\u2010in\u2010progress: hyflex hands\u2010on hardware security education during Covid\u201019. In: 2022 IEEE World Engineering Education Conference (EDUNINE);2022:1\u20104.","DOI":"10.1109\/EDUNINE53672.2022.9782346"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2016.2518874"},{"key":"e_1_2_11_46_1","first-page":"1338","article-title":"Optimized architectures for elliptic curve cryptography over curve448","author":"Bisheh\u2010Niasar M","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"e_1_2_11_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3224357"},{"key":"e_1_2_11_48_1","doi-asserted-by":"crossref","unstructured":"AnastasovaM AzarderakhshR KermaniMM.Time\u2010optimal design of finite field arithmetic for SIKE on cortex\u2010m4. In: Information Security Applications \u2010 23rd International Conference WISA 2022 Jeju Island South Korea August 24\u201026 2022 Revised Selected PapersYouI YounT\u2010Y eds.Lecture Notes in Computer Science vol.\u00a013720.Springer;2022:265\u2010276. doi:10.1007\/978\u20103\u2010031\u201025659\u20102_19","DOI":"10.1007\/978-3-031-25659-2_19"},{"key":"e_1_2_11_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2021.3077885"},{"key":"e_1_2_11_50_1","doi-asserted-by":"crossref","unstructured":"AnastasovaM AzarderakhshR KermaniMM BeshajL.Time\u2010efficient finite field microarchitecture design for curve448 and ed448 on cortex\u2010m4. In: Information security and cryptology \u2010 ICISC 2022 \u2010 25th international conference ICISC 2022 seoul south korea november 30 \u2010 december 2 2022 revised selected papersSeoS\u2010H SeoH eds.Lecture Notes in Computer Science vol.\u00a013849.Springer;2022:292\u2010314. doi:10.1007\/978\u20103\u2010031\u201029371\u20109_15","DOI":"10.1007\/978-3-031-29371-9_15"},{"key":"e_1_2_11_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2021.3096916"},{"key":"e_1_2_11_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2723891"},{"key":"e_1_2_11_53_1","doi-asserted-by":"crossref","unstructured":"SanalP KaragozE SeoH AzarderakhshR KermaniMM.Kyber on ARM64: compact implementations of kyber on 64\u2010bit ARM cortex\u2010a processors. In: Security and privacy in communication networks \u2010 17th EAI international conference securecomm 2021 virtual event september 6\u20109 2021 proceedings part IIGarc\u00eda\u2010AlfaroJ LiS PoovendranR DebarH YungM eds.Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering vol.\u00a0399.Springer;2021:424\u2010440. doi:10.1007\/978\u20103\u2010030\u201090022\u20109_23","DOI":"10.1007\/978-3-030-90022-9_23"},{"key":"e_1_2_11_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2633412"},{"key":"e_1_2_11_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3073163"},{"key":"e_1_2_11_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3027789"},{"key":"e_1_2_11_57_1","doi-asserted-by":"crossref","unstructured":"KermaniMM AzarderakhshR XieJ.Error detection reliable architectures of camellia block cipher applicable to different variants of its substitution boxes. In: 2016 IEEE Asian Hardware\u2010oriented Security and Trust Asianhost 2016 Yilan Taiwan December 19\u201020 2016.IEEE Computer Society;2016:1\u20106. doi:10.1109\/AsianHOST.2016.7835560","DOI":"10.1109\/AsianHOST.2016.7835560"}],"container-title":["International Journal of Circuit Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cta.4072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T02:57:17Z","timestamp":1757300237000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cta.4072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":56,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10.1002\/cta.4072"],"URL":"https:\/\/doi.org\/10.1002\/cta.4072","archive":["Portico"],"relation":{},"ISSN":["0098-9886","1097-007X"],"issn-type":[{"value":"0098-9886","type":"print"},{"value":"1097-007X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,15]]},"assertion":[{"value":"2023-12-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}