{"id":"https://openalex.org/W2789275941","doi":"https://doi.org/10.1109/access.2018.2799802","title":"Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3","display_name":"Multi-Core Dataflow Design and Implementation of Secure Hash Algorithm-3","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2789275941","doi":"https://doi.org/10.1109/access.2018.2799802","mag":"2789275941"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2799802","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799802","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2799802","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071401140","display_name":"Ali Alzahrani","orcid":"https://orcid.org/0000-0001-9501-8331"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ali Alzahrani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014237424","display_name":"Fayez Gebali","orcid":"https://orcid.org/0000-0001-5189-3409"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Fayez Gebali","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071401140"],"corresponding_institution_ids":["https://openalex.org/I212119943"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.8144,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.78718116,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"6","issue":null,"first_page":"6092","last_page":"6102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dataflow","display_name":"Dataflow","score":0.9268721342086792},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8871956467628479},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6211572289466858},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5521515607833862},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.46531012654304504},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45188108086586},{"id":"https://openalex.org/keywords/dataflow-architecture","display_name":"Dataflow architecture","score":0.44492414593696594},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.43580305576324463},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.40921318531036377},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3926979601383209},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1796875298023224}],"concepts":[{"id":"https://openalex.org/C96324660","wikidata":"https://www.wikidata.org/wiki/Q205446","display_name":"Dataflow","level":2,"score":0.9268721342086792},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8871956467628479},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6211572289466858},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5521515607833862},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.46531012654304504},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45188108086586},{"id":"https://openalex.org/C176727019","wikidata":"https://www.wikidata.org/wiki/Q1172415","display_name":"Dataflow architecture","level":3,"score":0.44492414593696594},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.43580305576324463},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.40921318531036377},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3926979601383209},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1796875298023224}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2799802","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799802","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c199b8b932044f03b709ed2e87794129","is_oa":true,"landing_page_url":"https://doaj.org/article/c199b8b932044f03b709ed2e87794129","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 6092-6102 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2799802","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2799802","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W56827125","https://openalex.org/W1517875064","https://openalex.org/W1545705789","https://openalex.org/W1565369953","https://openalex.org/W1582830241","https://openalex.org/W1594155875","https://openalex.org/W1772067890","https://openalex.org/W1843285382","https://openalex.org/W1965648925","https://openalex.org/W1975505618","https://openalex.org/W1991556879","https://openalex.org/W2030252755","https://openalex.org/W2049114987","https://openalex.org/W2099854998","https://openalex.org/W2152385473","https://openalex.org/W2185342914","https://openalex.org/W2338344188","https://openalex.org/W2395956876","https://openalex.org/W2504694240","https://openalex.org/W2514303232","https://openalex.org/W2527572152","https://openalex.org/W2588201809","https://openalex.org/W2604132899","https://openalex.org/W2605953901","https://openalex.org/W2619630761","https://openalex.org/W3005831531","https://openalex.org/W4231286867","https://openalex.org/W4234193034","https://openalex.org/W4301960584","https://openalex.org/W6773846976"],"related_works":["https://openalex.org/W2968111836","https://openalex.org/W2100229967","https://openalex.org/W3092708771","https://openalex.org/W2317032522","https://openalex.org/W2769956906","https://openalex.org/W2368301563","https://openalex.org/W2054126032","https://openalex.org/W2031745718","https://openalex.org/W2074626480","https://openalex.org/W1025757893"],"abstract_inverted_index":{"Embedded":[0],"multi-core":[1,79,112],"systems":[2,16,51],"are":[3,26,173],"implemented":[4,124],"as":[5,87,142,154,156],"systems-on-chip":[6],"that":[7],"rely":[8],"on":[9,69,93],"packet":[10],"storeand-forward":[11],"networks-on-chip":[12],"for":[13,66,115,205],"communications.":[14],"These":[15],"do":[17],"not":[18],"use":[19],"buses":[20],"or":[21,81],"global":[22],"clock.":[23,41],"Instead":[24],"routers":[25],"used":[27],"to":[28,77,107,129,186,191,197],"move":[29],"data":[30],"between":[31],"the":[32,100,104,116,131,199],"cores,":[33],"and":[34,158,168],"each":[35],"core":[36],"uses":[37],"its":[38],"own":[39],"local":[40],"This":[42,89,201],"implies":[43],"concurrent":[44],"asynchronous":[45],"computing.":[46],"Implementing":[47],"algorithms":[48,68],"in":[49,125,146,175],"such":[50,141],"is":[52,91,184],"very":[53],"much":[54],"facilitated":[55],"using":[56],"dataflow":[57,70,96,111],"concepts.":[58],"In":[59,163],"this":[60,176,182],"paper,":[61],"we":[62],"propose":[63],"a":[64,82,94,109],"methodology":[65,73,90,106],"implementing":[67],"platforms.":[71],"The":[72,120,134,178],"can":[74],"be":[75],"applied":[76,103],"multi-threaded,":[78],"platforms":[80,86],"combination":[83],"of":[84,99,137,148,152,170,181],"these":[85],"well.":[88],"based":[92],"novel":[95,110],"graph":[97],"representation":[98],"algorithm.":[101],"We":[102],"proposed":[105,135],"obtain":[108],"computing":[113],"model":[114,136],"secure":[117],"hash":[118],"algorithm-3.":[119],"resulting":[121],"hardware":[122],"was":[123],"field-programmable":[126],"gate":[127],"array":[128],"verify":[130],"performance":[132],"parameters.":[133],"computation":[138],"has":[139,202],"advantages,":[140],"flexible":[143],"I/O":[144,166],"timing":[145,167],"term":[147],"scheduling":[149],"policy,":[150],"execution":[151],"tasks":[153],"soon":[155],"possible,":[157],"self-timed":[159],"event":[160],"driven":[161],"system.":[162,200],"other":[164],"words,":[165],"correctness":[169],"algorithm":[171,189],"evaluation":[172,190],"dissociated":[174],"paper.":[177],"main":[179],"advantage":[180],"proposal":[183],"ability":[185],"dynamically":[187],"obfuscate":[188],"thwart":[192],"side-channel":[193],"attacks":[194],"without":[195],"having":[196],"redesign":[198],"important":[203],"implications":[204],"cryptographic":[206],"applications.":[207]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
