{"id":"https://openalex.org/W3158975875","doi":"https://doi.org/10.1109/iscas51556.2021.9401197","title":"Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL","display_name":"Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL","publication_year":2021,"publication_date":"2021-04-27","ids":{"openalex":"https://openalex.org/W3158975875","doi":"https://doi.org/10.1109/iscas51556.2021.9401197","mag":"3158975875"},"language":"en","primary_location":{"id":"doi:10.1109/iscas51556.2021.9401197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023126187","display_name":"Hachem Bensalem","orcid":"https://orcid.org/0000-0001-9713-2410"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Hachem Bensalem","raw_affiliation_strings":["Department of Electrical Engineering, \u00c9cole de Technologie Sup\u00e9rieure, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, \u00c9cole de Technologie Sup\u00e9rieure, Montreal, Canada","institution_ids":["https://openalex.org/I9736820"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071840145","display_name":"Yves Blaqui\u00e8re","orcid":"https://orcid.org/0000-0001-6204-7427"},"institutions":[{"id":"https://openalex.org/I9736820","display_name":"\u00c9cole de Technologie Sup\u00e9rieure","ror":"https://ror.org/0020snb74","country_code":"CA","type":"education","lineage":["https://openalex.org/I49663120","https://openalex.org/I9736820"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yves Blaquiere","raw_affiliation_strings":["\u00c9cole de Technologie Sup\u00e9rieure, Montreal, QC, Canada"],"affiliations":[{"raw_affiliation_string":"\u00c9cole de Technologie Sup\u00e9rieure, Montreal, QC, Canada","institution_ids":["https://openalex.org/I9736820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038488044","display_name":"Yvon Savaria","orcid":"https://orcid.org/0000-0002-3404-9959"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Yvon Savaria","raw_affiliation_strings":["Department of Electrical Engineering, \u00c9cole Polytechnique, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, \u00c9cole Polytechnique, Montreal, Canada","institution_ids":["https://openalex.org/I45683168"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023126187"],"corresponding_institution_ids":["https://openalex.org/I9736820"],"apc_list":null,"apc_paid":null,"fwci":1.8198,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87602171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8993327617645264},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.678124189376831},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6472083330154419},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.6187194585800171},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.589663028717041},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.5431863069534302},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5226302146911621},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.47060641646385193},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.431018590927124},{"id":"https://openalex.org/keywords/ranging","display_name":"Ranging","score":0.41661331057548523},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4076417088508606},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.29981642961502075},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29613935947418213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17553886771202087},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10981729626655579},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07809418439865112}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8993327617645264},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.678124189376831},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6472083330154419},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6187194585800171},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.589663028717041},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.5431863069534302},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5226302146911621},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.47060641646385193},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.431018590927124},{"id":"https://openalex.org/C115051666","wikidata":"https://www.wikidata.org/wiki/Q6522493","display_name":"Ranging","level":2,"score":0.41661331057548523},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4076417088508606},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.29981642961502075},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29613935947418213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17553886771202087},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10981729626655579},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07809418439865112},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iscas51556.2021.9401197","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas51556.2021.9401197","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Circuits and Systems (ISCAS)","raw_type":"proceedings-article"},{"id":"pmh:oai:espace2.etsmtl.ca:22807","is_oa":false,"landing_page_url":"http://espace2.etsmtl.ca/id/eprint/22807/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402392","display_name":"Espace \u00c9TS (ETS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1341030882","host_organization_name":"Educational Testing Service","host_organization_lineage":["https://openalex.org/I1341030882"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Compte rendu de conf\u00e9rence"},{"id":"pmh:oai:publications.polymtl.ca:49489","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/49489/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320310709","display_name":"CMC Microsystems","ror":"https://ror.org/03k70ea39"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W780656674","https://openalex.org/W1907293129","https://openalex.org/W2001529179","https://openalex.org/W2095930258","https://openalex.org/W2109900013","https://openalex.org/W2183606400","https://openalex.org/W2245856381","https://openalex.org/W2524556139","https://openalex.org/W2547278127","https://openalex.org/W2747947924","https://openalex.org/W2789829526","https://openalex.org/W2792648677","https://openalex.org/W2793723077","https://openalex.org/W2795590040","https://openalex.org/W2903294440","https://openalex.org/W2917674333","https://openalex.org/W2920148004","https://openalex.org/W2942818097","https://openalex.org/W2990811988","https://openalex.org/W3004864693","https://openalex.org/W3011960780","https://openalex.org/W3015238260","https://openalex.org/W3016180458","https://openalex.org/W3039294851","https://openalex.org/W3089462693","https://openalex.org/W3089874657","https://openalex.org/W3090225545","https://openalex.org/W3101501182","https://openalex.org/W3108305429"],"related_works":["https://openalex.org/W2031332375","https://openalex.org/W2142358564","https://openalex.org/W2054960299","https://openalex.org/W1853743837","https://openalex.org/W4251738463","https://openalex.org/W4200497776","https://openalex.org/W2103190493","https://openalex.org/W34390312","https://openalex.org/W2613610283","https://openalex.org/W2087509157"],"abstract_inverted_index":{"The":[0],"Secure":[1],"Hash":[2],"Algorithm-256":[3],"(SHA-256)":[4],"is":[5,97,127],"a":[6,11,28,36,63,74,91,118],"cryptographic":[7],"function":[8],"used":[9],"in":[10],"wide":[12],"variety":[13],"of":[14,19,30,32,65,93,136],"applications":[15],"ranging":[16],"from":[17],"Internet":[18],"Things":[20],"micro-devices":[21],"to":[22,54,79],"highperformance":[23],"systems.":[24],"This":[25],"paper":[26],"studies":[27],"set":[29],"implementations":[31,49,116],"the":[33,43,85,102,113,128],"SHA-256":[34,107,137],"on":[35],"field-programmable":[37],"gate":[38],"array":[39],"(FPGA)":[40],"elaborated":[41],"using":[42,117],"Open":[44],"Computing":[45],"Language":[46],"(OpenCL).":[47],"These":[48],"apply":[50],"several":[51],"optimization":[52,67,141],"techniques":[53,68],"improve":[55],"their":[56],"respective":[57],"throughputs.":[58],"Reported":[59],"results":[60],"show":[61],"that":[62,130],"combination":[64],"OpenCL":[66,82],"allows":[69],"obtaining":[70],"an":[71,80,132],"implementation":[72,89,108,135],"offering":[73],"90x":[75],"speed-up":[76],"when":[77],"compared":[78],"unoptimized":[81],"implementation.":[83],"Moreover,":[84],"best":[86,103],"reported":[87],"optimized":[88],"achieves":[90],"throughput":[92],"3973":[94],"Mbps,":[95],"which":[96],"4.3":[98],"times":[99],"higher":[100,111],"than":[101,112],"previously":[104,114],"published":[105,115],"HLS-based":[106],"and":[109,138],"even":[110],"hardware":[119],"description":[120],"language.":[121],"To":[122],"our":[123],"knowledge,":[124],"this":[125],"work":[126],"first":[129],"proposes":[131],"OpenCL-based":[133,140],"FPGA":[134],"its":[139],"methodology.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
