1. [1] H. Imai and J. Shikata: “Development of cryptology in the nineties,” IEICE Trans. Fundamentals 84-A (2001) 61.
2. [2] A. Karati, et al.: “Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices,” IEEE Internet Things J. 6 (2019) 10431 (DOI: 10.1109/JIOT.2019.2939204).
3. [3] K. Sowjanya, et al.: “An efficient elliptic curve cryptography-based without pairing KPABE for internet of things,” IEEE Syst. J. 14 (2019) 2154 (DOI: 10.1109/JSYST.2019.2944240).
4. [4] S. Atiewi, et al.: “Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography,” IEEE Access 8 (2020) 113498 (DOI: 10.1109/ACCESS.2020.3002815).
5. [5] E.B. Barker and N.W. Mouha: “Recommendation for the triple data encryption algorithm (TDEA) block cipher,” NIST Special Publication (2017) (SP) 800-67 Rev. 2 (Draft) (DOI: 10.6028/nist.sp.800-67r2).