{"id":"https://openalex.org/W4388937564","doi":"https://doi.org/10.1109/icccnt56998.2023.10307798","title":"Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers","display_name":"Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388937564","doi":"https://doi.org/10.1109/icccnt56998.2023.10307798"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10307798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113007015","display_name":"Kavin Kumar K","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kavin Kumar K","raw_affiliation_strings":["Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India","Department of Electronics and Communication Engineering, Kongu Engineering Collage, Erode, India"],"affiliations":[{"raw_affiliation_string":"Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Kongu Engineering Collage, Erode, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072597410","display_name":"V D Nandhini","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nandhini V D","raw_affiliation_strings":["K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India","Department of Biomedical Engineering, K S R Institute for Engineering and Technology, Tiruchengode, India"],"affiliations":[{"raw_affiliation_string":"K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India","institution_ids":[]},{"raw_affiliation_string":"Department of Biomedical Engineering, K S R Institute for Engineering and Technology, Tiruchengode, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091862763","display_name":"M. Kowsalya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kowsalya M","raw_affiliation_strings":["Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057"],"affiliations":[{"raw_affiliation_string":"Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083156966","display_name":"P J Ragu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ragu P J","raw_affiliation_strings":["K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India","Department of Biomedical Engineering, K S R Institute for Engineering and Technology, Tiruchengode, India"],"affiliations":[{"raw_affiliation_string":"K S R Institute for Engineering and Technology,Department of Biomedical Engineering,Tiruchengode,India","institution_ids":[]},{"raw_affiliation_string":"Department of Biomedical Engineering, K S R Institute for Engineering and Technology, Tiruchengode, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092613126","display_name":"N R Raghapriya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raghapriya N R","raw_affiliation_strings":["Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057"],"affiliations":[{"raw_affiliation_string":"Erode Sengunthar Engineering College,Department of Computer Science and Engineering,Thuduppathi,638057","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110734755","display_name":"S Maheswaran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maheswaran S","raw_affiliation_strings":["Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India","Department of Electronics and Communication Engineering, Kongu Engineering Collage, Erode, India"],"affiliations":[{"raw_affiliation_string":"Kongu Engineering Collage,Department of Electronics and Communication Engineering,Erode,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Kongu Engineering Collage, Erode, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5113007015"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.4641,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.93802817,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/md5","display_name":"MD5","score":0.9197282791137695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8405382633209229},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7906993627548218},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5813964009284973},{"id":"https://openalex.org/keywords/functional-verification","display_name":"Functional verification","score":0.5503498911857605},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5248724818229675},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5167157053947449},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5064312219619751},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4529877305030823},{"id":"https://openalex.org/keywords/intelligent-verification","display_name":"Intelligent verification","score":0.4520131051540375},{"id":"https://openalex.org/keywords/high-level-verification","display_name":"High-level verification","score":0.45036765933036804},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.40092068910598755},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35434800386428833},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.3010721802711487},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1897197961807251},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.1547280251979828},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12841099500656128},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1121092140674591},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.06707558035850525}],"concepts":[{"id":"https://openalex.org/C157172786","wikidata":"https://www.wikidata.org/wiki/Q185235","display_name":"MD5","level":3,"score":0.9197282791137695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8405382633209229},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7906993627548218},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5813964009284973},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.5503498911857605},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5248724818229675},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5167157053947449},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5064312219619751},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4529877305030823},{"id":"https://openalex.org/C3406870","wikidata":"https://www.wikidata.org/wiki/Q6044160","display_name":"Intelligent verification","level":5,"score":0.4520131051540375},{"id":"https://openalex.org/C187250869","wikidata":"https://www.wikidata.org/wiki/Q5754573","display_name":"High-level verification","level":5,"score":0.45036765933036804},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.40092068910598755},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35434800386428833},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.3010721802711487},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1897197961807251},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.1547280251979828},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12841099500656128},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1121092140674591},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.06707558035850525},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10307798","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307798","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1583031633","https://openalex.org/W1966811787","https://openalex.org/W2013486114","https://openalex.org/W2040266304","https://openalex.org/W2053272622","https://openalex.org/W2078249145","https://openalex.org/W2104633167","https://openalex.org/W2104927807","https://openalex.org/W2117006807","https://openalex.org/W2134023402","https://openalex.org/W2140308918","https://openalex.org/W2146470149","https://openalex.org/W2169692300","https://openalex.org/W2789495404","https://openalex.org/W2902466377","https://openalex.org/W2911402032","https://openalex.org/W2944570854","https://openalex.org/W2969993933","https://openalex.org/W2999134213","https://openalex.org/W3115397912","https://openalex.org/W3138711048","https://openalex.org/W3156443653","https://openalex.org/W3178798070","https://openalex.org/W3196966592","https://openalex.org/W4252251132","https://openalex.org/W4285156748","https://openalex.org/W4312284885","https://openalex.org/W4319659866","https://openalex.org/W4380238159","https://openalex.org/W6681910218","https://openalex.org/W6792333337"],"related_works":["https://openalex.org/W2361881307","https://openalex.org/W2392047570","https://openalex.org/W4205300843","https://openalex.org/W2929969821","https://openalex.org/W3155012083","https://openalex.org/W2354470518","https://openalex.org/W3120172095","https://openalex.org/W2059150015","https://openalex.org/W2357142578","https://openalex.org/W2035244079"],"abstract_inverted_index":{"The":[0,33],"MD5":[1,17,61,75,101,136],"algorithm":[2,138],"is":[3],"widely":[4],"employed":[5],"for":[6,60],"generating":[7],"fixed-size":[8],"hash":[9,87,137],"values":[10],"to":[11,127],"ensure":[12],"data":[13],"integrity.":[14,99],"By":[15],"incorporating":[16],"into":[18,102],"the":[19,27,49,66,70,74,85,90,97,103,110,130,135],"UVM":[20,34,57,104],"verification":[21,52,62,67,95,105,111,125],"framework,":[22],"designers":[23,123],"can":[24],"efficiently":[25],"verify":[26],"algorithm's":[28,98],"functionality":[29],"within":[30],"digital":[31,140],"designs.":[32,55,141],"framework":[35,106],"provides":[36],"a":[37],"structured":[38],"environment":[39],"with":[40,89,107],"standardized":[41],"components,":[42],"including":[43],"agents,":[44],"sequences,":[45],"and":[46,51,64,81,117,124,132],"checkers,":[47],"facilitating":[48],"development":[50],"of":[53,73,96,134],"complex":[54],"Dedicated":[56],"checkers":[58,78,108],"designed":[59],"automate":[63],"streamline":[65],"process,":[68],"ensuring":[69],"accurate":[71],"operation":[72],"algorithm.":[76],"These":[77],"monitor":[79],"input":[80],"output":[82],"data,":[83],"comparing":[84],"generated":[86],"value":[88],"expected":[91],"outcome,":[92],"enabling":[93],"thorough":[94],"Integrating":[100],"improves":[109],"process's":[112],"efficiency,":[113],"reducing":[114],"manual":[115],"efforts":[116],"enhancing":[118],"reliability.":[119],"This":[120],"integration":[121],"allows":[122],"engineers":[126],"effectively":[128],"validate":[129],"implementation":[131],"accuracy":[133],"in":[139]},"counts_by_year":[{"year":2024,"cited_by_count":17}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
