{"id":"https://openalex.org/W4310480262","doi":"https://doi.org/10.46586/tches.v2023.i1.326-368","title":"BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions","display_name":"BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions","publication_year":2022,"publication_date":"2022-11-29","ids":{"openalex":"https://openalex.org/W4310480262","doi":"https://doi.org/10.46586/tches.v2023.i1.326-368"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2023.i1.326-368","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i1.326-368","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9955/9458","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/9955/9458","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079919844","display_name":"Yanis Belkheyar","orcid":"https://orcid.org/0009-0004-0314-9385"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Yanis Belkheyar","raw_affiliation_strings":["Digital Security Group, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055847285","display_name":"Joan Daemen","orcid":"https://orcid.org/0000-0002-4102-0775"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Joan Daemen","raw_affiliation_strings":["Digital Security Group, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071870475","display_name":"Christoph Dobraunig","orcid":"https://orcid.org/0000-0002-3816-0187"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christoph Dobraunig","raw_affiliation_strings":["Intel Labs, Hillsboro, USA"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Hillsboro, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078467758","display_name":"Santosh Ghosh","orcid":"https://orcid.org/0000-0003-0069-7971"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Santosh Ghosh","raw_affiliation_strings":["Intel Labs, Hillsboro, USA"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Hillsboro, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078438173","display_name":"Shahram Rasoolzadeh","orcid":"https://orcid.org/0000-0001-6848-2227"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Shahram Rasoolzadeh","raw_affiliation_strings":["Digital Security Group, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security Group, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5079919844"],"corresponding_institution_ids":["https://openalex.org/I145872427"],"apc_list":null,"apc_paid":null,"fwci":3.8864,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.94274596,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"326","last_page":"368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.8106155395507812},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7213185429573059},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.526340126991272},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5020232200622559},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4647746682167053},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4612293541431427},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4333551526069641},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4118145704269409},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4041454792022705},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.33220210671424866},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2244926393032074},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.08427178859710693},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08009675145149231}],"concepts":[{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.8106155395507812},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7213185429573059},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.526340126991272},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5020232200622559},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4647746682167053},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4612293541431427},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4333551526069641},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4118145704269409},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4041454792022705},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.33220210671424866},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2244926393032074},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.08427178859710693},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08009675145149231}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.46586/tches.v2023.i1.326-368","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i1.326-368","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9955/9458","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/286006","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/286006","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/286006/286006.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"},{"id":"pmh:oai:doaj.org/article:00cfa76d954748be849216d2e395934c","is_oa":true,"landing_page_url":"https://doaj.org/article/00cfa76d954748be849216d2e395934c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 1 (2022)","raw_type":"article"},{"id":"pmh:ru:oai:repository.ubn.ru.nl:2066/286006","is_oa":true,"landing_page_url":"http://hdl.handle.net/2066/286006","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 326 - 368","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2023.i1.326-368","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i1.326-368","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/9955/9458","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.5400000214576721,"display_name":"Affordable and clean energy"}],"awards":[{"id":"https://openalex.org/G629491556","display_name":null,"funder_award_id":"(NWO)","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4310480262.pdf","grobid_xml":"https://content.openalex.org/works/W4310480262.grobid-xml"},"referenced_works_count":63,"referenced_works":["https://openalex.org/W4976521","https://openalex.org/W37385681","https://openalex.org/W83473285","https://openalex.org/W85295516","https://openalex.org/W100113061","https://openalex.org/W1487353416","https://openalex.org/W1503638523","https://openalex.org/W1520961854","https://openalex.org/W1548656471","https://openalex.org/W1556727271","https://openalex.org/W1564684997","https://openalex.org/W1571067952","https://openalex.org/W1607874478","https://openalex.org/W1629301835","https://openalex.org/W1801417685","https://openalex.org/W1853704432","https://openalex.org/W1897761346","https://openalex.org/W1901931695","https://openalex.org/W1958084802","https://openalex.org/W1964723977","https://openalex.org/W1978695162","https://openalex.org/W2045479946","https://openalex.org/W2090921898","https://openalex.org/W2101800793","https://openalex.org/W2119874003","https://openalex.org/W2160494425","https://openalex.org/W2166473670","https://openalex.org/W2185342914","https://openalex.org/W2398238754","https://openalex.org/W2407726675","https://openalex.org/W2504919933","https://openalex.org/W2538419163","https://openalex.org/W2576980242","https://openalex.org/W2599205485","https://openalex.org/W2728494734","https://openalex.org/W2729912967","https://openalex.org/W2794866029","https://openalex.org/W2810443602","https://openalex.org/W2912272895","https://openalex.org/W2953015727","https://openalex.org/W3041137691","https://openalex.org/W3045281960","https://openalex.org/W3088704016","https://openalex.org/W3091007029","https://openalex.org/W3094658778","https://openalex.org/W3110113452","https://openalex.org/W3112251563","https://openalex.org/W3139965805","https://openalex.org/W3169109595","https://openalex.org/W3186390156","https://openalex.org/W3196583119","https://openalex.org/W3205730643","https://openalex.org/W3214161206","https://openalex.org/W4213335922","https://openalex.org/W4232988949","https://openalex.org/W4238851087","https://openalex.org/W4241072010","https://openalex.org/W4248135912","https://openalex.org/W4251810237","https://openalex.org/W4295066811","https://openalex.org/W4308288844","https://openalex.org/W4388804419","https://openalex.org/W6829346327"],"related_works":["https://openalex.org/W18954787","https://openalex.org/W3138083505","https://openalex.org/W1638546798","https://openalex.org/W4254460476","https://openalex.org/W2783353176","https://openalex.org/W2117179505","https://openalex.org/W4390979909","https://openalex.org/W4390962791","https://openalex.org/W2339543721","https://openalex.org/W1829339118"],"abstract_inverted_index":{"Recently,":[0],"a":[1,42,72,78,101,104,116,121,127,136,142,148],"memory":[2,17],"safety":[3,18],"concept":[4],"called":[5],"Cryptographic":[6],"Capability":[7],"Computing":[8],"(C3)":[9],"has":[10,30],"been":[11],"proposed.":[12],"C3":[13,49,63],"is":[14,81,94],"the":[15,31,36,57],"first":[16],"mechanism":[19],"that":[20,130],"works":[21],"without":[22],"requiring":[23],"extra":[24],"storage":[25],"for":[26,132],"metadata":[27],"and":[28],"hence,":[29],"potential":[32],"to":[33],"significantly":[34],"enhance":[35],"security":[37],"of":[38,138],"modern":[39,149],"IT-systems":[40],"at":[41,141],"rather":[43],"low":[44],"cost.":[45],"To":[46,67],"achieve":[47],"this,":[48],"heavily":[50],"relies":[51],"on":[52,85,111,147],"ultra-low-latency":[53],"cryptographic":[54],"primitives.":[55],"However,":[56],"most":[58],"crucial":[59],"primitive":[60],"required":[61],"by":[62],"demands":[64],"uncommon":[65],"dimensions.":[66],"partially":[68],"encrypt":[69],"64-bit":[70],"pointers,":[71],"24-bit":[73,122],"tweakable":[74,87,123],"block":[75,88,124],"cipher":[76,102,125],"with":[77,90,112,126,135],"40-bit":[79,128],"tweak":[80,129],"needed.":[82],"The":[83],"research":[84,106],"low-latency":[86],"ciphers":[89],"such":[91,100],"small":[92],"dimensions":[93],"not":[95],"very":[96],"mature.":[97],"Therefore,":[98],"designing":[99],"provides":[103],"great":[105],"challenge,":[107],"which":[108],"we":[109,118],"take":[110],"this":[113],"paper.":[114],"As":[115],"result,":[117],"present":[119],"BipBip,":[120],"allows":[131],"ASIC":[133],"implementations":[134],"latency":[137],"3":[139],"cycles":[140],"4.5":[143],"GHz":[144],"clock":[145],"frequency":[146],"10":[150],"nm":[151],"CMOS":[152],"technology.":[153]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
