{"id":"https://openalex.org/W3084108613","doi":"https://doi.org/10.1109/hpcs48598.2019.9188113","title":"Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms","display_name":"Reducing Energy Consumption of HMAC Applications on Heterogeneous Platforms","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W3084108613","doi":"https://doi.org/10.1109/hpcs48598.2019.9188113","mag":"3084108613"},"language":"en","primary_location":{"id":"doi:10.1109/hpcs48598.2019.9188113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs48598.2019.9188113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077524073","display_name":"Sebastian Litzinger","orcid":"https://orcid.org/0000-0003-2200-7337"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Litzinger","raw_affiliation_strings":["Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045604584","display_name":"Oliver Korber","orcid":null},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Oliver Korber","raw_affiliation_strings":["Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018765427","display_name":"J\u00f6rg Keller","orcid":"https://orcid.org/0000-0003-0303-6140"},"institutions":[{"id":"https://openalex.org/I120691247","display_name":"University of Hagen","ror":"https://ror.org/04tkkr536","country_code":"DE","type":"education","lineage":["https://openalex.org/I120691247"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jorg Keller","raw_affiliation_strings":["Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Mathematics and Computer Science, Fern Universit\u00e4t in Hagen, Hagen, Germany","institution_ids":["https://openalex.org/I120691247"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077524073"],"corresponding_institution_ids":["https://openalex.org/I120691247"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61359926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":null,"first_page":"152","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.9278064966201782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7691823244094849},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7443517446517944},{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.5995742082595825},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5405773520469666},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5358473062515259},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.4246300756931305},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3817877769470215},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3695390224456787},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.36180704832077026},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3325059413909912},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24157676100730896},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14376842975616455}],"concepts":[{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.9278064966201782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7691823244094849},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7443517446517944},{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.5995742082595825},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5405773520469666},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5358473062515259},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.4246300756931305},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3817877769470215},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3695390224456787},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.36180704832077026},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3325059413909912},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24157676100730896},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14376842975616455},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcs48598.2019.9188113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcs48598.2019.9188113","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on High Performance Computing &amp; Simulation (HPCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.9100000262260437}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W50116563","https://openalex.org/W103427359","https://openalex.org/W645942869","https://openalex.org/W1608011130","https://openalex.org/W1660562555","https://openalex.org/W1956810607","https://openalex.org/W2002659035","https://openalex.org/W2015951678","https://openalex.org/W2049359614","https://openalex.org/W2057146499","https://openalex.org/W2077355162","https://openalex.org/W2103605435","https://openalex.org/W2122984309","https://openalex.org/W2131300413","https://openalex.org/W2136211500","https://openalex.org/W2157432502","https://openalex.org/W2170220539","https://openalex.org/W2238866705","https://openalex.org/W2266218113","https://openalex.org/W2400552030","https://openalex.org/W2732787791","https://openalex.org/W2744764018","https://openalex.org/W2779269988","https://openalex.org/W2889273330","https://openalex.org/W3007996584","https://openalex.org/W4205948809","https://openalex.org/W4234582748","https://openalex.org/W4250359923","https://openalex.org/W4285719527","https://openalex.org/W6604171925","https://openalex.org/W6608218161","https://openalex.org/W6621216722","https://openalex.org/W6654404078","https://openalex.org/W6679265533","https://openalex.org/W6742671368"],"related_works":["https://openalex.org/W1511774205","https://openalex.org/W2771872416","https://openalex.org/W2280933377","https://openalex.org/W2783731972","https://openalex.org/W2157901542","https://openalex.org/W203964163","https://openalex.org/W4248541521","https://openalex.org/W4312776354","https://openalex.org/W2525619314","https://openalex.org/W2139378575"],"abstract_inverted_index":{"Hash-based":[0],"message":[1,139],"authentication":[2],"code":[3],"(HMAC)":[4],"is":[5,12,54],"a":[6,37,41,48,106,114,128,169],"form":[7],"of":[8,39,78,93],"cryptographic":[9],"checksum":[10,28],"which":[11],"frequently":[13],"used":[14],"in":[15,96],"SSL/TLS.":[16],"The":[17],"IETF":[18],"standard":[19],"permits":[20],"several":[21,26],"hash":[22,80,142],"function":[23],"families":[24],"with":[25,66,90,181,186],"possible":[27],"lengths.":[29],"Thus,":[30,127],"if":[31,47],"checksums":[32],"must":[33],"be":[34,103,121,131],"computed":[35,132],"for":[36,110,117,144],"number":[38],"messages,":[40],"multi-dimensional":[42],"optimization":[43,59,100],"problem":[44,60,65,101,109,119],"arises,":[45],"especially":[46],"heterogeneous":[49],"platform":[50],"like":[51],"ARM":[52],"big.LITTLE":[53],"used.":[55],"We":[56,160],"formulate":[57],"the":[58,72,91,145,152,158,162,175],"as":[61,136,138],"an":[62,166],"energy":[63,149,184],"minimization":[64],"constraints":[67],"given":[68,134],"by":[69],"deadlines":[70],"and":[71,75,141,154,168,172],"different":[73,79,83],"power":[74],"performance":[76],"profiles":[77],"functions":[81,143],"on":[82,151,177],"core":[84],"types.":[85],"Furthermore,":[86],"we":[87],"show":[88],"that":[89,113,118,174],"help":[92],"measurements":[94],"done":[95],"previous":[97],"work":[98],"this":[99],"can":[102,120,130],"mapped":[104],"to":[105,123],"known":[107],"scheduling":[108,115,125,163],"big.LITTLE,":[111,153],"i.e.,":[112],"algorithm":[116],"adapted":[122],"our":[124],"problem.":[126],"solution":[129],"that,":[133],"deadline":[135],"well":[137],"sizes":[140],"HMAC":[146],"computations,":[147],"minimizes":[148],"consumption":[150],"takes":[155],"profit":[156],"from":[157,165],"heterogeneity.":[159],"compare":[161],"results":[164],"optimal":[167],"heuristic":[170,176],"scheduler":[171],"find":[173],"average":[178],"produces":[179],"schedules":[180],"4%":[182],"higher":[183],"consumption,":[185],"small":[187],"variance.":[188]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
