{"id":"https://openalex.org/W2413807687","doi":"https://doi.org/10.1109/iccsce.2015.7482148","title":"FPGA implementation of 64 bit Secure Force algorithm using full loop-unroll architecture","display_name":"FPGA implementation of 64 bit Secure Force algorithm using full loop-unroll architecture","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2413807687","doi":"https://doi.org/10.1109/iccsce.2015.7482148","mag":"2413807687"},"language":"en","primary_location":{"id":"doi:10.1109/iccsce.2015.7482148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce.2015.7482148","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026671975","display_name":"Shujaat Khan","orcid":"https://orcid.org/0000-0001-9676-6817"},"institutions":[{"id":"https://openalex.org/I188771183","display_name":"Iqra University","ror":"https://ror.org/00thhhw55","country_code":"PK","type":"education","lineage":["https://openalex.org/I188771183"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Shujaat Khan","raw_affiliation_strings":["Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan","institution_ids":["https://openalex.org/I188771183"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081353572","display_name":"Muhammad Sohail Ibrahim","orcid":"https://orcid.org/0000-0002-1387-0879"},"institutions":[{"id":"https://openalex.org/I188771183","display_name":"Iqra University","ror":"https://ror.org/00thhhw55","country_code":"PK","type":"education","lineage":["https://openalex.org/I188771183"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"M. Sohail Ibrahim","raw_affiliation_strings":["Iqra University, Karachi, PK"],"affiliations":[{"raw_affiliation_string":"Iqra University, Karachi, PK","institution_ids":["https://openalex.org/I188771183"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110918874","display_name":"Haseeb Amjad","orcid":null},"institutions":[{"id":"https://openalex.org/I188771183","display_name":"Iqra University","ror":"https://ror.org/00thhhw55","country_code":"PK","type":"education","lineage":["https://openalex.org/I188771183"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Haseeb Amjad","raw_affiliation_strings":["Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan","institution_ids":["https://openalex.org/I188771183"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020662566","display_name":"Kafeel Ahmed Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I188771183","display_name":"Iqra University","ror":"https://ror.org/00thhhw55","country_code":"PK","type":"education","lineage":["https://openalex.org/I188771183"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Kafeel Ahmed Khan","raw_affiliation_strings":["Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Science & Technology, Iqra University, Karachi, Pakistan","institution_ids":["https://openalex.org/I188771183"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040715682","display_name":"Mansoor Ebrahim","orcid":"https://orcid.org/0000-0002-2000-8398"},"institutions":[{"id":"https://openalex.org/I84339108","display_name":"Sunway University","ror":"https://ror.org/04mjt7f73","country_code":"MY","type":"education","lineage":["https://openalex.org/I84339108"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Mansoor Ebrahim","raw_affiliation_strings":["Faculty of Science & Technology, Sunway University, Selangor, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Science & Technology, Sunway University, Selangor, Malaysia","institution_ids":["https://openalex.org/I84339108"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026671975"],"corresponding_institution_ids":["https://openalex.org/I188771183"],"apc_list":null,"apc_paid":null,"fwci":1.2943,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.87024502,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"49","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.8611859679222107},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922415733337402},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.7468922734260559},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6352401375770569},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5841905474662781},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5005321502685547},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4924956262111664},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.48713943362236023},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4654698371887207},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.43927866220474243},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.4146583378314972},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3826335668563843},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37886568903923035},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28803664445877075},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08590039610862732}],"concepts":[{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.8611859679222107},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922415733337402},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.7468922734260559},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6352401375770569},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5841905474662781},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5005321502685547},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4924956262111664},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.48713943362236023},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4654698371887207},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.43927866220474243},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.4146583378314972},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3826335668563843},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37886568903923035},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28803664445877075},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08590039610862732},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccsce.2015.7482148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccsce.2015.7482148","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W41193951","https://openalex.org/W1562434331","https://openalex.org/W1568970091","https://openalex.org/W1581096142","https://openalex.org/W1698058651","https://openalex.org/W1719766253","https://openalex.org/W1836039892","https://openalex.org/W1964579813","https://openalex.org/W1992436973","https://openalex.org/W2048402311","https://openalex.org/W2068590323","https://openalex.org/W2091125587","https://openalex.org/W2092806672","https://openalex.org/W2102550826","https://openalex.org/W2147973911","https://openalex.org/W2159682369","https://openalex.org/W2163354454","https://openalex.org/W2318084675","https://openalex.org/W4241413379"],"related_works":["https://openalex.org/W2125214861","https://openalex.org/W2161048573","https://openalex.org/W2522069694","https://openalex.org/W4248712873","https://openalex.org/W1703859826","https://openalex.org/W2392288291","https://openalex.org/W2059218952","https://openalex.org/W3214586009","https://openalex.org/W1998454494","https://openalex.org/W612677566"],"abstract_inverted_index":{"Field-Programmable":[0],"Gate":[1],"Arrays":[2],"(FPGAs)":[3],"have":[4],"turned":[5],"out":[6],"to":[7],"be":[8],"a":[9,46],"well-liked":[10],"target":[11],"for":[12,51,55,60,75,96],"implementing":[13],"cryptographic":[14],"block":[15],"ciphers.":[16],"In":[17],"this":[18],"research":[19],"work,":[20],"recently":[21],"proposed":[22,39,98,110],"64":[23],"bit":[24],"Secure":[25,43],"Force":[26,44],"(SF)":[27],"algorithm":[28],"is":[29,100],"implemented":[30],"on":[31],"an":[32],"FPGA":[33,40,104],"based":[34],"full":[35],"loop-unroll":[36],"architecture.":[37],"The":[38,82,109],"implementation":[41,99],"of":[42,48,66,106],"yields":[45],"throughput":[47,91],"2.3":[49],"Gbps":[50,54,59],"encryption,":[52,76],"2.6":[53],"decryption,":[56,77],"and":[57,72,78],"3.43":[58],"key":[61,79],"expansion":[62,80],"at":[63],"the":[64,90,97],"cost":[65],"as":[67,69],"low":[68],"476,":[70],"400,":[71],"160":[73],"slices":[74],"respectively.":[81],"results":[83],"obtained":[84],"after":[85],"extensive":[86],"testing":[87],"indicate":[88],"that":[89],"per":[92],"unit":[93],"area":[94],"(throughput/slice)":[95],"comparable":[101],"with":[102],"many":[103],"implementations":[105],"AES":[107],"algorithm.":[108],"design":[111],"consumes":[112],"117.18":[113],"milli":[114],"Watts":[115],"thermal":[116],"power.":[117]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
