{"id":"https://openalex.org/W3093837422","doi":"https://doi.org/10.1109/iscc50000.2020.9219582","title":"K-Cipher: A Low Latency, Bit Length Parameterizable Cipher","display_name":"K-Cipher: A Low Latency, Bit Length Parameterizable Cipher","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3093837422","doi":"https://doi.org/10.1109/iscc50000.2020.9219582","mag":"3093837422"},"language":"en","primary_location":{"id":"doi:10.1109/iscc50000.2020.9219582","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219582","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063555801","display_name":"Michael E. Kounavis","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Kounavis","raw_affiliation_strings":["Intel Labs, Intel Corporation, Hillsboro, OR"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Intel Corporation, Hillsboro, OR","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090151761","display_name":"Sergej Deutsch","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sergej Deutsch","raw_affiliation_strings":["Intel Labs, Intel Corporation, Hillsboro, OR"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Intel Corporation, Hillsboro, OR","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078467758","display_name":"Santosh Ghosh","orcid":"https://orcid.org/0000-0003-0069-7971"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santosh Ghosh","raw_affiliation_strings":["Intel Labs, Intel Corporation, Hillsboro, OR"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Intel Corporation, Hillsboro, OR","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042631292","display_name":"David Durham","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Durham","raw_affiliation_strings":["Intel Labs, Intel Corporation, Hillsboro, OR"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Intel Corporation, Hillsboro, OR","institution_ids":["https://openalex.org/I1343180700"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063555801"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":0.6628,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76319196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.8016493916511536},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7073583006858826},{"id":"https://openalex.org/keywords/triple-des","display_name":"Triple DES","score":0.6010290384292603},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5847135186195374},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5640642642974854},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5522074699401855},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.5111938118934631},{"id":"https://openalex.org/keywords/cbc-mac","display_name":"CBC-MAC","score":0.46855029463768005},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.438879132270813},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.4324715733528137},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.4279228746891022},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4079234004020691},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3640517592430115},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21354657411575317},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18546032905578613},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16255781054496765}],"concepts":[{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.8016493916511536},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7073583006858826},{"id":"https://openalex.org/C90897222","wikidata":"https://www.wikidata.org/wiki/Q134983","display_name":"Triple DES","level":4,"score":0.6010290384292603},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5847135186195374},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5640642642974854},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5522074699401855},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.5111938118934631},{"id":"https://openalex.org/C156529985","wikidata":"https://www.wikidata.org/wiki/Q2736227","display_name":"CBC-MAC","level":4,"score":0.46855029463768005},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.438879132270813},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.4324715733528137},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4279228746891022},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4079234004020691},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3640517592430115},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21354657411575317},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18546032905578613},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16255781054496765}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc50000.2020.9219582","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc50000.2020.9219582","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1599175145","https://openalex.org/W3030624396","https://openalex.org/W6778727884"],"related_works":["https://openalex.org/W2531227589","https://openalex.org/W2780660191","https://openalex.org/W2532209479","https://openalex.org/W2373660491","https://openalex.org/W3097084064","https://openalex.org/W2354856341","https://openalex.org/W3005443245","https://openalex.org/W2150486630","https://openalex.org/W4283121791","https://openalex.org/W3022854131"],"abstract_inverted_index":{"We":[0,34,109],"present":[1,101,111,136],"the":[2,14,98,102,130,159],"design":[3,104],"of":[4,37,40,185],"a":[5,38,181],"novel":[6],"low":[7,27],"latency,":[8],"bit":[9],"length":[10],"parameterizable":[11],"cipher,":[12],"called":[13],"\"K-Cipher\".":[15],"K-Cipher":[16,89,103,144],"is":[17,74],"particularly":[18],"useful":[19],"to":[20,24,61,77,86,93,123,128],"applications":[21,45],"that":[22,46,120,158],"need":[23],"support":[25],"ultra":[26],"latency":[28],"encryption":[29,73],"at":[30,51],"arbitrary":[31],"ciphertext":[32],"lengths.":[33],"can":[35,162],"think":[36],"range":[39],"networking,":[41],"gaming":[42],"and":[43,105,142,177],"computing":[44],"may":[47],"require":[48],"encrypting":[49],"data":[50],"unusual":[52],"block":[53],"lengths":[54],"for":[55,64],"many":[56],"different":[57],"reasons,":[58],"such":[59],"as":[60],"make":[62,129],"space":[63],"other":[65],"unencrypted":[66],"state":[67],"values.":[68],"Furthermore,":[69],"in":[70,83,164,173],"modern":[71],"applications,":[72],"typically":[75],"required":[76],"complete":[78,163],"inside":[79],"stringent":[80],"time":[81],"frames":[82],"order":[84],"not":[85],"affect":[87],"performance.":[88],"has":[90],"been":[91],"designed":[92],"meet":[94],"these":[95],"requirements.":[96],"In":[97],"paper":[99],"we":[100,135],"discuss":[106],"its":[107],"rationale.":[108],"also":[110],"results":[112,138,156],"from":[113,139],"our":[114],"ongoing":[115],"security":[116],"analysis":[117],"which":[118],"suggest":[119],"only":[121],"2":[122],"4":[124],"rounds":[125],"are":[126,178],"sufficient":[127],"cipher":[131],"operate":[132],"securely.":[133],"Finally,":[134],"synthesis":[137],"2-round":[140],"32-bit":[141],"64-bit":[143],"encrypt":[145,160],"datapaths,":[146],"produced":[147],"using":[148],"Intel\u2019s":[149],"\u00ae":[150],"10":[151],"nm":[152],"process":[153],"technology.":[154],"Our":[155],"show":[157],"datapaths":[161],"no":[165],"more":[166],"than":[167],"767":[168],"psec,":[169],"or":[170],"3":[171],"clocks":[172],"3.9-4.9":[174],"GHz":[175],"frequencies,":[176],"associated":[179],"with":[180],"maximum":[182],"area":[183],"requirement":[184],"1875":[186],"m":[187],"<sup":[188],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[189],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[190],".":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
