{"id":"https://openalex.org/W1967781821","doi":"https://doi.org/10.1093/comjnl/bxm023","title":"Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs","display_name":"Analysis and Detection Of Errors In Implementation Of SHA-512 Algorithms On FPGAs","publication_year":2007,"publication_date":"2007-06-03","ids":{"openalex":"https://openalex.org/W1967781821","doi":"https://doi.org/10.1093/comjnl/bxm023","mag":"1967781821"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxm023","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxm023","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077897203","display_name":"Imtiaz Ahmad","orcid":"https://orcid.org/0000-0002-0673-7324"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"I. Ahmad","raw_affiliation_strings":["Department of Computer Engineering, Kuwait University, PO Box 5969, Safat 13060, Kuwait"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Kuwait University, PO Box 5969, Safat 13060, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038685942","display_name":"Amarendra Das","orcid":"https://orcid.org/0000-0002-8727-325X"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"A. S. Das","raw_affiliation_strings":["Department of Computer Engineering, Kuwait University, PO Box 5969, Safat 13060, Kuwait"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Kuwait University, PO Box 5969, Safat 13060, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077897203"],"corresponding_institution_ids":["https://openalex.org/I36721946"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":2.3462,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.89226631,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"50","issue":"6","first_page":"728","last_page":"738"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.823204517364502},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6973710060119629},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6907902956008911},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.6400285363197327},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5681666135787964},{"id":"https://openalex.org/keywords/cyclic-redundancy-check","display_name":"Cyclic redundancy check","score":0.5271608233451843},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5061542391777039},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49471160769462585},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49317067861557007},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.4828248918056488},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.46746399998664856},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4371870160102844},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.43497946858406067},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.37414443492889404},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.32851871848106384},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.2942565679550171},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11358848214149475}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.823204517364502},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6973710060119629},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6907902956008911},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6400285363197327},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5681666135787964},{"id":"https://openalex.org/C137627569","wikidata":"https://www.wikidata.org/wiki/Q245471","display_name":"Cyclic redundancy check","level":3,"score":0.5271608233451843},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5061542391777039},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49471160769462585},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49317067861557007},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.4828248918056488},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.46746399998664856},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4371870160102844},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.43497946858406067},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.37414443492889404},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.32851871848106384},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.2942565679550171},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11358848214149475},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxm023","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxm023","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322668","display_name":"Kuwait University","ror":"https://ror.org/021e5j056"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1503405832","https://openalex.org/W1523087909","https://openalex.org/W1566296806","https://openalex.org/W1572352527","https://openalex.org/W1601843450","https://openalex.org/W1716861721","https://openalex.org/W1733713784","https://openalex.org/W1838691944","https://openalex.org/W1914732238","https://openalex.org/W1927577445","https://openalex.org/W1997084193","https://openalex.org/W2098784703","https://openalex.org/W2099959439","https://openalex.org/W2104003712","https://openalex.org/W2111725598","https://openalex.org/W2121142504","https://openalex.org/W2122742911","https://openalex.org/W2126252444","https://openalex.org/W2128838689","https://openalex.org/W2131483653","https://openalex.org/W2134887864","https://openalex.org/W2137211463","https://openalex.org/W2139777941","https://openalex.org/W2140049648","https://openalex.org/W2148158786","https://openalex.org/W2154667225"],"related_works":["https://openalex.org/W2384732292","https://openalex.org/W2099057647","https://openalex.org/W2109945377","https://openalex.org/W2785118141","https://openalex.org/W2004229053","https://openalex.org/W2158382780","https://openalex.org/W4387475406","https://openalex.org/W2160515113","https://openalex.org/W2522558906","https://openalex.org/W2532632059"],"abstract_inverted_index":{"The":[0],"Secure":[1],"Hash":[2],"Algorithm":[3],"SHA-512":[4,163],"is":[5],"a":[6,36,56,85,94,192],"dedicated":[7],"cryptographic":[8,45],"hash":[9,46,65,78,131],"function":[10],"widely":[11],"considered":[12],"for":[13,42,159],"use":[14],"in":[15,70,75,105,112,178],"data":[16,20],"integrity":[17],"assurance":[18],"and":[19,38,145,157,190],"origin":[21],"authentication":[22],"security":[23],"services.":[24],"Reconfigurable":[25],"hardware":[26,107,146],"devices":[27],"such":[28,153],"as":[29,118,120,154],"Field":[30],"Programmable":[31],"Gate":[32],"Arrays":[33],"(FPGAs)":[34],"offer":[35],"flexible":[37],"easily":[39],"upgradeable":[40],"platform":[41],"implementation":[43,108,161],"of":[44,53,63,73,82,97,100,109,129,162,171,181,188,195],"functions.":[47],"Owing":[48],"to":[49,102],"the":[50,64,76,98,103,106,130,150,160,179,198],"iterative":[51],"structure":[52],"SHA-512,":[54],"even":[55],"single":[57,182],"transient":[58,117],"error":[59,138,165,199],"at":[60,126],"any":[61,127],"stage":[62,128],"value":[66,132],"computation":[67],"will":[68],"result":[69],"large":[71],"number":[72],"errors":[74,83,101],"final":[77],"value.":[79],"Hence,":[80],"detection":[81,139,166,200],"becomes":[84],"key":[86],"design":[87],"issue.":[88],"In":[89],"this":[90,113],"paper,":[91],"we":[92],"present":[93],"detailed":[95],"analysis":[96,114],"propagation":[99],"output":[104],"SHA-512.":[110],"Included":[111],"are":[115],"single,":[116],"well":[119],"permanent":[121],"faults":[122,183],"that":[123],"may":[124],"appear":[125],"computation.":[133],"We":[134,148,173],"then":[135],"propose":[136],"an":[137,169,185],"scheme":[140],"based":[141],"on":[142,168],"parity":[143],"codes":[144],"redundancy.":[147],"report":[149],"performance":[151],"metrics":[152],"area,":[155],"memory,":[156],"throughput":[158,194],"with":[164,184,191,197],"capability":[167],"FPGA":[170],"ALTERA.":[172],"achieved":[174],"100%":[175],"fault":[176],"coverage":[177],"case":[180],"area":[186],"overhead":[187],"21%":[189],"reduced":[193],"11.6%":[196],"circuit.":[201]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
