{"id":"https://openalex.org/W2741058426","doi":"https://doi.org/10.1109/icc.2017.7996731","title":"SHIPHER: A new family of light-weight block ciphers based on dynamic operators","display_name":"SHIPHER: A new family of light-weight block ciphers based on dynamic operators","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2741058426","doi":"https://doi.org/10.1109/icc.2017.7996731","mag":"2741058426"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2017.7996731","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7996731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007411047","display_name":"Xiali Hei","orcid":"https://orcid.org/0000-0002-2438-5430"},"institutions":[{"id":"https://openalex.org/I126548940","display_name":"Delaware State University","ror":"https://ror.org/03g35dg18","country_code":"US","type":"education","lineage":["https://openalex.org/I126548940"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiali Hei","raw_affiliation_strings":["Department of Computer and Information Sciences, Delaware State University, Dover, DE, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Delaware State University, Dover, DE, USA","institution_ids":["https://openalex.org/I126548940"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066803244","display_name":"Binheng Song","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I3131625388","display_name":"University Town of Shenzhen","ror":"https://ror.org/05f5j6225","country_code":"CN","type":"education","lineage":["https://openalex.org/I3131625388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binheng Song","raw_affiliation_strings":["Graduate School at Shenzhen, Tsinghua University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Graduate School at Shenzhen, Tsinghua University, Shenzhen, China","institution_ids":["https://openalex.org/I3131625388","https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020303638","display_name":"Caijin Ling","orcid":"https://orcid.org/0000-0002-4574-886X"},"institutions":[{"id":"https://openalex.org/I4210088744","display_name":"Ya'an Polytechnic College","ror":"https://ror.org/00a43vs85","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210088744"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Caijin Ling","raw_affiliation_strings":["School of EIE, Heyuan Polytechnic, Heyuan, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"School of EIE, Heyuan Polytechnic, Heyuan, Guangdong, China","institution_ids":["https://openalex.org/I4210088744"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007411047"],"corresponding_institution_ids":["https://openalex.org/I126548940"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61448316,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5473","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6946693658828735},{"id":"https://openalex.org/keywords/block-size","display_name":"Block size","score":0.663513720035553},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6611133217811584},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6481688618659973},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5628120303153992},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.544849157333374},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5158526301383972},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.5012972354888916},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48256224393844604},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.4680081903934479},{"id":"https://openalex.org/keywords/key-schedule","display_name":"Key schedule","score":0.4677109122276306},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46046918630599976},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.43974947929382324},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.43849658966064453},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.329675555229187},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2856088876724243},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20394739508628845},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.1676633656024933},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10170045495033264},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09375116229057312}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6946693658828735},{"id":"https://openalex.org/C41431624","wikidata":"https://www.wikidata.org/wiki/Q1053357","display_name":"Block size","level":3,"score":0.663513720035553},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6611133217811584},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6481688618659973},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5628120303153992},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.544849157333374},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5158526301383972},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.5012972354888916},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48256224393844604},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.4680081903934479},{"id":"https://openalex.org/C112145980","wikidata":"https://www.wikidata.org/wiki/Q2569509","display_name":"Key schedule","level":5,"score":0.4677109122276306},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46046918630599976},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.43974947929382324},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.43849658966064453},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.329675555229187},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2856088876724243},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20394739508628845},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.1676633656024933},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10170045495033264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09375116229057312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2017.7996731","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2017.7996731","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W52191336","https://openalex.org/W197313453","https://openalex.org/W377307689","https://openalex.org/W1496741827","https://openalex.org/W1514715287","https://openalex.org/W1518716055","https://openalex.org/W1554072239","https://openalex.org/W1572300106","https://openalex.org/W1577065692","https://openalex.org/W1597936869","https://openalex.org/W1607874478","https://openalex.org/W1613874182","https://openalex.org/W1670558497","https://openalex.org/W1734967783","https://openalex.org/W1827311732","https://openalex.org/W1894646615","https://openalex.org/W1904699185","https://openalex.org/W1979282282","https://openalex.org/W2071804597","https://openalex.org/W2101479224","https://openalex.org/W2109394932","https://openalex.org/W2136471217","https://openalex.org/W2188014630","https://openalex.org/W2188114602","https://openalex.org/W2399567127","https://openalex.org/W2725380599","https://openalex.org/W3030624396","https://openalex.org/W4394380219","https://openalex.org/W4394440019","https://openalex.org/W6607960735","https://openalex.org/W6613134101","https://openalex.org/W6635839501","https://openalex.org/W6636388380","https://openalex.org/W6639606277","https://openalex.org/W6686443057","https://openalex.org/W6712597305","https://openalex.org/W6778727884"],"related_works":["https://openalex.org/W2298331565","https://openalex.org/W1539170589","https://openalex.org/W2156908834","https://openalex.org/W4381855654","https://openalex.org/W2734623998","https://openalex.org/W4243188035","https://openalex.org/W2134038088","https://openalex.org/W2027151447","https://openalex.org/W2176792445","https://openalex.org/W3159642460"],"abstract_inverted_index":{"In":[0,146],"this":[1,59,62,124,147],"paper,":[2,148],"we":[3,149],"describe":[4],"a":[5,14,20,120,138],"family":[6],"of":[7,86,140,160],"block":[8,91,94,115],"ciphers":[9],"named":[10],"SHIPHER.":[11],"We":[12,99,106],"present":[13],"symmetric":[15],"encryption":[16,104],"framework":[17,60,82,125],"based":[18],"on":[19,142],"cryptographic":[21],"hash":[22,121],"function":[23,69],"and":[24,47,61,75,89,119,129,133,156],"dynamic":[25,33,144,162],"operators":[26],"controlled":[27],"by":[28,113],"small":[29],"random":[30],"numbers.":[31],"This":[32,81],"operator":[34],"mixes":[35],"operations":[36],"from":[37],"different":[38,143],"algebraic":[39],"groups":[40],"like":[41],"IDEA":[42,46,49],"[1].":[43],"However,":[44],"unlike":[45],"extended":[48],"([2],":[50],"[3]),":[51],"modular":[52],"addition":[53],"is":[54,131],"the":[55,110],"only":[56],"calculation":[57],"in":[58],"makes":[63],"SHIPHER":[64],"highly":[65],"efficient.":[66],"The":[67],"round":[68],"was":[70],"chosen":[71],"to":[72,77,136],"provide":[73,84,150],"confusion":[74],"diffusion":[76],"facilitate":[78],"hardware":[79],"implementations.":[80],"can":[83,96,107],"families":[85],"secure,":[87],"flexible,":[88],"variable-key-length":[90],"ciphers.":[92],"Anny":[93],"size":[95],"be":[97],"achieved.":[98],"have":[100],"extensively":[101],"investigated":[102],"our":[103],"framework.":[105],"easily":[108],"control":[109],"computational":[111],"cost":[112],"selecting":[114],"size,":[116],"implementation":[117],"method,":[118],"function.":[122],"Also,":[123],"offers":[126],"excellent":[127],"performance":[128],"it":[130],"flexible":[132],"generic":[134],"enough":[135],"admit":[137],"variety":[139],"implementations":[141],"operators.":[145,163],"one":[151],"implementation,":[152],"show":[153],"its":[154],"performance,":[155],"discuss":[157],"possible":[158],"extensions":[159],"similar":[161]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
