{"id":"https://openalex.org/W2494741169","doi":"https://doi.org/10.1109/asicon.2015.7517001","title":"Parallel implementation of AES on 2.5D multicore platform with hardware and software co-design","display_name":"Parallel implementation of AES on 2.5D multicore platform with hardware and software co-design","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2494741169","doi":"https://doi.org/10.1109/asicon.2015.7517001","mag":"2494741169"},"language":"en","primary_location":{"id":"doi:10.1109/asicon.2015.7517001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asicon.2015.7517001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 11th International Conference on ASIC (ASICON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007019880","display_name":"Wang Jie-Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jielin Wang","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048862455","display_name":"Wang Wei-zhen","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhen Wang","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101814984","display_name":"Jianwei Yang","orcid":"https://orcid.org/0000-0002-8329-968X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Yang","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109151274","display_name":"Zhiyi Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyi Yu","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066674438","display_name":"Jun Han","orcid":"https://orcid.org/0000-0002-5245-0754"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Han","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100656792","display_name":"Xiaoyang Zeng","orcid":"https://orcid.org/0000-0003-3986-137X"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyang Zeng","raw_affiliation_strings":["State Key Laboratory of ASIC & System, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of ASIC & System, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5007019880"],"corresponding_institution_ids":["https://openalex.org/I24943067"],"apc_list":null,"apc_paid":null,"fwci":0.8629,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.84073995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"46","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805924117565155},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.7371786832809448},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6459956169128418},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.6428365707397461},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.6222813129425049},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.6179114580154419},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5989583730697632},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5496165156364441},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5292077660560608},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5036608576774597},{"id":"https://openalex.org/keywords/hardware-architecture","display_name":"Hardware architecture","score":0.4374355375766754},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.42217007279396057},{"id":"https://openalex.org/keywords/hardware-acceleration","display_name":"Hardware acceleration","score":0.41524314880371094},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.40661367774009705},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.33358293771743774},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27884671092033386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805924117565155},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.7371786832809448},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6459956169128418},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.6428365707397461},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.6222813129425049},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.6179114580154419},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5989583730697632},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5496165156364441},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5292077660560608},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5036608576774597},{"id":"https://openalex.org/C65232700","wikidata":"https://www.wikidata.org/wiki/Q5656403","display_name":"Hardware architecture","level":3,"score":0.4374355375766754},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.42217007279396057},{"id":"https://openalex.org/C13164978","wikidata":"https://www.wikidata.org/wiki/Q600158","display_name":"Hardware acceleration","level":3,"score":0.41524314880371094},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.40661367774009705},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.33358293771743774},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27884671092033386},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asicon.2015.7517001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asicon.2015.7517001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 11th International Conference on ASIC (ASICON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332195","display_name":"Samsung","ror":"https://ror.org/04w3jy968"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2040879203","https://openalex.org/W2047642791","https://openalex.org/W2125546870","https://openalex.org/W2141225058","https://openalex.org/W2162136091","https://openalex.org/W2174444600","https://openalex.org/W2355550369","https://openalex.org/W6662364431"],"related_works":["https://openalex.org/W2161048573","https://openalex.org/W4248712873","https://openalex.org/W1703859826","https://openalex.org/W2392288291","https://openalex.org/W2393941228","https://openalex.org/W3208859339","https://openalex.org/W3121248233","https://openalex.org/W2348789984","https://openalex.org/W1982350175","https://openalex.org/W2385743990"],"abstract_inverted_index":{"Advanced":[0],"Encryption":[1],"Standard":[2],"(AES)":[3],"plays":[4],"an":[5],"important":[6],"role":[7],"in":[8,27],"modern":[9],"cryptographic":[10],"applications.":[11],"High":[12],"performance":[13,79],"implementation":[14,47,52],"of":[15],"AES":[16,41],"are":[17,25,58],"required":[18],"for":[19,86],"many":[20],"application":[21],"scenarios.":[22],"Parallelization":[23],"techniques":[24],"popular":[26],"recent":[28],"years":[29],"to":[30],"improve":[31],"the":[32],"performance.":[33],"In":[34],"this":[35],"paper":[36],"we":[37],"propose":[38],"two":[39,61,87],"parallel":[40,74],"schemes,":[42],"one":[43],"is":[44,50],"full":[45],"software":[46,51],"and":[48,84,91],"another":[49],"with":[53,64,81],"hardware":[54,101],"accelerator.":[55,102],"These":[56],"schemes":[57,75,88],"implemented":[59],"on":[60],"4-core":[62],"clusters":[63],"shared":[65],"memory":[66],"architecture.":[67],"The":[68,94],"experimental":[69],"results":[70],"show":[71],"that":[72],"our":[73],"have":[76],"a":[77],"good":[78],"compared":[80],"related":[82],"works":[83],"speedup":[85],"achieves":[89,96],"4.92":[90],"9.78,":[92],"respectively.":[93],"throughput":[95],"176.48":[97],"Mbps":[98],"when":[99],"using":[100]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
