{"id":"https://openalex.org/W2137303003","doi":"https://doi.org/10.1109/emeit.2011.6024111","title":"FPGA implementation of dynamic key management for DES encryption algorithm","display_name":"FPGA implementation of dynamic key management for DES encryption algorithm","publication_year":2011,"publication_date":"2011-08-01","ids":{"openalex":"https://openalex.org/W2137303003","doi":"https://doi.org/10.1109/emeit.2011.6024111","mag":"2137303003"},"language":"en","primary_location":{"id":"doi:10.1109/emeit.2011.6024111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/emeit.2011.6024111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104142091","display_name":"Ji Yao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ji Yao","raw_affiliation_strings":["School of Automation, Xi'an University of Posts and Telecommunication, Xi'an Shannxi, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Xi'an University of Posts and Telecommunication, Xi'an Shannxi, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076129557","display_name":"Hongbo Kang","orcid":"https://orcid.org/0009-0009-9672-6490"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongbo Kang","raw_affiliation_strings":["School of Automation, Xi'an University of Posts and Telecommunication, Xi'an Shannxi, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Xi'an University of Posts and Telecommunication, Xi'an Shannxi, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104142091"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.8552,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.80570124,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"4795","last_page":"4798"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.5939000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.5939000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12941","display_name":"Embedded Systems and FPGA Design","score":0.5685999989509583,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7845488786697388},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7309092879295349},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7208528518676758},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.6480329632759094},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6323078870773315},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.567589521408081},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47235307097435},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4567777216434479},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.45350009202957153},{"id":"https://openalex.org/keywords/algorithm-design","display_name":"Algorithm design","score":0.44364726543426514},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.346652090549469},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09672975540161133}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7845488786697388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7309092879295349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7208528518676758},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.6480329632759094},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6323078870773315},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.567589521408081},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47235307097435},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4567777216434479},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.45350009202957153},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.44364726543426514},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.346652090549469},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09672975540161133},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/emeit.2011.6024111","is_oa":false,"landing_page_url":"https://doi.org/10.1109/emeit.2011.6024111","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1499050268","https://openalex.org/W2365564502","https://openalex.org/W6707820623"],"related_works":["https://openalex.org/W2808484818","https://openalex.org/W2810427553","https://openalex.org/W2135053878","https://openalex.org/W2941434274","https://openalex.org/W2340647897","https://openalex.org/W4249632163","https://openalex.org/W1760305469","https://openalex.org/W2797161794","https://openalex.org/W2073075351","https://openalex.org/W2096938998"],"abstract_inverted_index":{"A":[0],"hardware":[1,58],"design":[2,104,117],"with":[3],"the":[4,12,17,27,30,36,39,44,50,56,60,68,70,77,93,102,116,121],"dynamic":[5],"key":[6,51,87],"management":[7],"is":[8,20,47,65,73,118,123],"proposed":[9],"based":[10,114],"on":[11,26,115],"conventional":[13],"DES":[14,33,106],"algorithm,":[15,35],"and":[16,43,86,111,120],"FPGA":[18,57,82],"implementation":[19],"presented":[21],"in":[22],"this":[23],"paper.":[24],"Based":[25],"analysis":[28,113],"of":[29,32,41,62,84,96,105],"principle":[31],"encryption":[34],"relativity":[37],"between":[38],"generation":[40],"sub-key":[42],"critical":[45],"arithmetic":[46],"weak.":[48],"So":[49],"can":[52,89],"be":[53],"reconfigured.":[54],"During":[55],"design,":[59],"methodology":[61],"preferential":[63],"resources":[64],"adopted.":[66],"For":[67],"round-function,":[69],"pipeline":[71,98],"technology":[72],"used":[74],"to":[75],"increase":[76],"maximum":[78],"frequency.":[79],"The":[80,108],"independent":[81],"implementations":[83],"round-function":[85],"generator":[88],"not":[90],"only":[91],"reduce":[92],"logic":[94],"complication":[95],"adjacent":[97],"but":[99],"also":[100],"realize":[101],"reconfiguration":[103],"algorithm.":[107],"function":[109],"simulation":[110],"test":[112],"verified,":[119],"result":[122],"satisfied.":[124]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
