{"id":"https://openalex.org/W2082925545","doi":"https://doi.org/10.1109/asap.2013.6567552","title":"Efficient implementation of cryptographic primitives on the GA144 multi-core architecture","display_name":"Efficient implementation of cryptographic primitives on the GA144 multi-core architecture","publication_year":2013,"publication_date":"2013-06-01","ids":{"openalex":"https://openalex.org/W2082925545","doi":"https://doi.org/10.1109/asap.2013.6567552","mag":"2082925545"},"language":"en","primary_location":{"id":"doi:10.1109/asap.2013.6567552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2013.6567552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 24th International Conference on Application-Specific Systems, Architectures and Processors","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101961426","display_name":"Tobias Schneider","orcid":"https://orcid.org/0000-0002-6849-5949"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tobias Schneider","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041459871","display_name":"Ingo von Maurich","orcid":"https://orcid.org/0000-0002-8461-9657"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ingo von Maurich","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076453092","display_name":"Tim G\u00fcneysu","orcid":"https://orcid.org/0000-0002-3293-4989"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tim Guneysu","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr University Bochum, Bochum, Germany#TAB#","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101961426"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":0.4942,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77171672,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"44","issue":null,"first_page":"67","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.807479739189148},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7918105125427246},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.6000503301620483},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5301265120506287},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5144839286804199},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.4758160710334778},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4574337601661682},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.43696972727775574},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.421236515045166},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.41821861267089844},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4040552079677582},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.38207459449768066},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36074894666671753},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3131951093673706},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.23857340216636658},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22305098176002502},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14177915453910828},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09074056148529053}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807479739189148},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7918105125427246},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.6000503301620483},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5301265120506287},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5144839286804199},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.4758160710334778},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4574337601661682},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.43696972727775574},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.421236515045166},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.41821861267089844},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4040552079677582},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.38207459449768066},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36074894666671753},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3131951093673706},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.23857340216636658},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22305098176002502},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14177915453910828},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09074056148529053},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/asap.2013.6567552","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2013.6567552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 24th International Conference on Application-Specific Systems, Architectures and Processors","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.702.9402","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.9402","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.emsec.rub.de/media/sh/veroeffentlichungen/2013/05/07/GA144_crypto.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8999999761581421,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321469","display_name":"Bundesministerium f\u00fcr Wirtschaft und Technologie","ror":"https://ror.org/02vgg2808"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1511189048","https://openalex.org/W1567573409","https://openalex.org/W1660562555","https://openalex.org/W1692612036","https://openalex.org/W1956043843","https://openalex.org/W1964845253","https://openalex.org/W2059866937","https://openalex.org/W2133328948","https://openalex.org/W2141225058","https://openalex.org/W2163354454","https://openalex.org/W2164387888","https://openalex.org/W4289127653","https://openalex.org/W6630632796","https://openalex.org/W6633996066"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W2141019415","https://openalex.org/W2126560026","https://openalex.org/W4205636420"],"abstract_inverted_index":{"With":[0,145],"myriads":[1],"of":[2,13,24,73,162],"small":[3],"and":[4,15,35,95,98,127,133,142,154,165,170],"pervasive":[5],"devices":[6,27],"in":[7,37],"our":[8],"digital":[9],"age,":[10],"the":[11,50,64,68,120],"availability":[12],"low-power":[14],"energy-efficient":[16],"processing":[17],"technology":[18],"has":[19],"become":[20],"absolutely":[21],"essential.":[22],"Most":[23],"these":[25],"constrained":[26,69],"need":[28],"to":[29,39,62],"incorporate":[30],"security":[31,78],"services":[32],"for":[33,79,92],"confidentiality":[34],"privacy":[36],"addition":[38],"their":[40],"primary":[41],"tasks":[42],"-":[43],"typically":[44],"involving":[45],"computationally":[46],"expensive":[47],"cryptography.":[48],"In":[49,87],"last":[51],"years,":[52],"many":[53,186],"researchers":[54],"have":[55],"worked":[56],"on":[57,67,101,138],"novel":[58],"lightweight":[59,106,187],"cryptographic":[60],"constructions":[61,76],"minimize":[63],"computational":[65],"burden":[66],"devices.":[70],"However,":[71],"most":[72],"those":[74],"alternative":[75],"sacrificed":[77],"simplicity,":[80],"potentially":[81],"enabling":[82],"just":[83],"as":[84,131,149,151,177,179],"simple":[85],"attacks.":[86],"this":[88,157],"work,":[89],"we":[90,123],"aim":[91],"another":[93],"approach":[94],"implement":[96],"standardized":[97],"well-established":[99],"cryptography":[100,129],"a":[102,140,160],"special":[103],"but":[104],"very":[105],"platform,":[107],"namely":[108],"an":[109],"asynchronous":[110],"GA144":[111],"ultra-low-powered":[112],"multicore":[113],"processor":[114],"with":[115],"144":[116],"simplistic":[117],"cores.":[118],"For":[119],"first":[121],"time,":[122],"demonstrate":[124],"that":[125],"symmetric":[126],"asymmetric":[128],"such":[130,139],"AES":[132,169],"RSA":[134,171],"is":[135],"even":[136],"feasible":[137],"low-end":[141],"unclocked":[143],"device.":[144],"energy":[146,175],"consumption":[147,176],"being":[148],"low":[150],"0.63":[152],"\u03bcJ":[153],"22.3":[155],"mJ,":[156],"platform":[158],"achieves":[159],"performance":[161],"38":[163],"\u03bcs":[164],"462.9":[166],"ms":[167],"per":[168],"operation,":[172],"respectively.":[173],"Both":[174],"well":[178],"computation":[180],"time":[181],"are":[182],"significantly":[183],"lower":[184],"than":[185],"implementations":[188],"reported":[189],"so":[190],"far.":[191]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
