{"id":"https://openalex.org/W2165655512","doi":"https://doi.org/10.1109/asap.2010.5540976","title":"General-purpose FPGA platform for efficient encryption and hashing","display_name":"General-purpose FPGA platform for efficient encryption and hashing","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2165655512","doi":"https://doi.org/10.1109/asap.2010.5540976","mag":"2165655512"},"language":"en","primary_location":{"id":"doi:10.1109/asap.2010.5540976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2010.5540976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044387689","display_name":"Jakub Szefer","orcid":"https://orcid.org/0000-0001-9721-3640"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jakub Szefer","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071964645","display_name":"Yu-Yuan Chen","orcid":"https://orcid.org/0000-0001-7827-6857"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu-Yuan Chen","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035657440","display_name":"Ruby B. Lee","orcid":"https://orcid.org/0000-0001-9497-0777"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ruby B. Lee","raw_affiliation_strings":["Department of Electrical Engineering, Princeton University, Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044387689"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":0.9021,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.81640025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"0","issue":null,"first_page":"309","last_page":"312"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8216363191604614},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6319811940193176},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6172652840614319},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5873004198074341},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5694654583930969},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5639387369155884},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5378645062446594},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.5145813822746277},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.49962615966796875},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.468900591135025},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.415913462638855},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.37169572710990906},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26284778118133545},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2614706754684448},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.2598876357078552},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22644349932670593},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11004060506820679}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216363191604614},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6319811940193176},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6172652840614319},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5873004198074341},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5694654583930969},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5639387369155884},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5378645062446594},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5145813822746277},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.49962615966796875},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.468900591135025},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.415913462638855},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.37169572710990906},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26284778118133545},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2614706754684448},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.2598876357078552},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22644349932670593},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11004060506820679}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asap.2010.5540976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2010.5540976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W170974838","https://openalex.org/W1556212265","https://openalex.org/W1572300106","https://openalex.org/W1605654092","https://openalex.org/W1698058651","https://openalex.org/W2009582397","https://openalex.org/W2075400099","https://openalex.org/W2124095839","https://openalex.org/W2128528543","https://openalex.org/W2134316164","https://openalex.org/W2139054684","https://openalex.org/W2150243807","https://openalex.org/W2164100802","https://openalex.org/W3143985718","https://openalex.org/W4243070643","https://openalex.org/W6606900769"],"related_works":["https://openalex.org/W1663728611","https://openalex.org/W4289821808","https://openalex.org/W1773180899","https://openalex.org/W275246813","https://openalex.org/W4387225862","https://openalex.org/W2006897953","https://openalex.org/W2227130482","https://openalex.org/W2141288318","https://openalex.org/W1590262417","https://openalex.org/W3196739495"],"abstract_inverted_index":{"Many":[0],"applications":[1,14,203],"require":[2],"protection":[3,91],"of":[4,21,34,64,71,84,89,103,117,157],"secret":[5],"or":[6,124,178],"sensitive":[7],"information,":[8],"from":[9],"sensor":[10,122],"nodes":[11],"and":[12,31,66,160,165,211],"embedded":[13],"to":[15,46,86,169],"large":[16],"distributed":[17],"systems.":[18],"The":[19,69],"confidentiality":[20],"data":[22,36,90],"can":[23,37,109,197],"be":[24,38,110,198],"protected":[25],"by":[26,40],"encryption":[27,159],"using":[28,41],"symmetric-key":[29],"ciphers,":[30],"the":[32,35,131,183,191],"integrity":[33],"ensured":[39],"a":[42,48,100,118,121,125,175],"cryptographic":[43,65,140,212],"hash":[44,141,179,213],"function":[45],"calculate":[47],"\"digital":[49],"fingerprint.\"":[50],"In":[51],"this":[52],"paper,":[53],"we":[54,97,194],"propose":[55],"reconfigurable":[56],"FPGA":[57,105,171],"hardware":[58,73,155],"components":[59,74,192],"that":[60,193],"enable":[61],"rapid":[62],"deployment":[63],"other":[67,114,202],"algorithms.":[68],"novelty":[70],"our":[72,107,148],"is":[75],"in":[76,186],"their":[77],"general-purpose":[78,149],"design":[79,108],"which":[80],"enables":[81],"easy":[82,154],"mappings":[83],"algorithms":[85,142],"allow":[87],"customizations":[88],"for":[92,188,200,207],"different":[93],"usage":[94],"scenarios.":[95],"Since":[96],"utilize":[98],"only":[99],"small":[101],"part":[102],"an":[104],"chip,":[106],"readily":[111],"integrated":[112],"with":[113,163],"processing":[115],"needs":[116],"mobile":[119],"device,":[120],"node":[123],"System-on-Chip.":[126],"Important":[127],"block":[128,209],"ciphers":[129,210],"like":[130,143],"Advanced":[132],"Encryption":[133],"Standard":[134],"(AES)":[135],"as":[136,138],"well":[137,146],"advanced":[139],"Whirlpool":[144],"map":[145],"onto":[147],"components.":[150],"Our":[151],"solution":[152],"facilitates":[153],"implementation":[156],"customizable":[158],"hashing":[161],"solutions,":[162],"area":[164],"speed":[166],"performance":[167],"comparable":[168],"custom":[170],"implementations":[172],"targeted":[173],"at":[174],"specific":[176],"cipher":[177],"algorithm.":[180],"We":[181],"achieve":[182],"best":[184],"efficiency":[185],"Mbps/slice":[187],"Whirlpool.":[189],"Furthermore,":[190],"have":[195],"proposed":[196],"used":[199],"many":[201],"-":[204],"not":[205],"just":[206],"implementing":[208],"functions.":[214]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
