{"id":"https://openalex.org/W3126894297","doi":"https://doi.org/10.1109/isocc50952.2020.9333008","title":"High Throughput and Secure Authentication-Encryption on Asynchronous Multicore Processor for Edge Computing IoT Applications","display_name":"High Throughput and Secure Authentication-Encryption on Asynchronous Multicore Processor for Edge Computing IoT Applications","publication_year":2020,"publication_date":"2020-10-21","ids":{"openalex":"https://openalex.org/W3126894297","doi":"https://doi.org/10.1109/isocc50952.2020.9333008","mag":"3126894297"},"language":"en","primary_location":{"id":"doi:10.1109/isocc50952.2020.9333008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isocc50952.2020.9333008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International SoC Design Conference (ISOCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014926180","display_name":"Weng\u2010Geng Ho","orcid":"https://orcid.org/0000-0002-0589-3480"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Weng-Geng Ho","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072823589","display_name":"Ali Akbar Pammu","orcid":"https://orcid.org/0000-0001-9857-5096"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ali Akbar Pammu","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088626085","display_name":"Ne Kyaw Zwa Lwin","orcid":"https://orcid.org/0000-0001-7506-0380"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ne Kyaw Zwa Lwin","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073268696","display_name":"Kwen\u2010Siong Chong","orcid":"https://orcid.org/0000-0003-1512-2003"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kwen-Siong Chong","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000314679","display_name":"Bah\u2010Hwee Gwee","orcid":"https://orcid.org/0000-0002-3222-2885"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Bah-Hwee Gwee","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014926180"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.19791233,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"26","issue":null,"first_page":"173","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7662755250930786},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7251309156417847},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.6544408798217773},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.5928873419761658},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.562673807144165},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.5133392214775085},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.49338093400001526},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4772246181964874},{"id":"https://openalex.org/keywords/chaining","display_name":"Chaining","score":0.4216195046901703},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39106935262680054},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.2892916798591614},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2677758038043976},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12868592143058777},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10711517930030823}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7662755250930786},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7251309156417847},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.6544408798217773},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.5928873419761658},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.562673807144165},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.5133392214775085},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.49338093400001526},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4772246181964874},{"id":"https://openalex.org/C49020025","wikidata":"https://www.wikidata.org/wiki/Q1059099","display_name":"Chaining","level":2,"score":0.4216195046901703},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39106935262680054},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.2892916798591614},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2677758038043976},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12868592143058777},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10711517930030823},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isocc50952.2020.9333008","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isocc50952.2020.9333008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International SoC Design Conference (ISOCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3777170825","display_name":null,"funder_award_id":"NRF2018NCR-NCR002-0001","funder_id":"https://openalex.org/F4320320709","funder_display_name":"National Research Foundation Singapore"}],"funders":[{"id":"https://openalex.org/F4320320709","display_name":"National Research Foundation Singapore","ror":"https://ror.org/03cpyc314"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W77145383","https://openalex.org/W1596478631","https://openalex.org/W1988980919","https://openalex.org/W2167381843","https://openalex.org/W2549480215","https://openalex.org/W2592784234","https://openalex.org/W2751904527","https://openalex.org/W2889579243","https://openalex.org/W2962901003","https://openalex.org/W6729718278"],"related_works":["https://openalex.org/W2161048573","https://openalex.org/W1703859826","https://openalex.org/W2392288291","https://openalex.org/W2393941228","https://openalex.org/W4248712873","https://openalex.org/W2541639725","https://openalex.org/W3208859339","https://openalex.org/W3121248233","https://openalex.org/W2348789984","https://openalex.org/W1982350175"],"abstract_inverted_index":{"We":[0],"describe":[1],"an":[2,11,38],"Authentication":[3],"based":[4,26,44],"Matrix-transformation":[5],"cum":[6],"Parallel-encryption":[7],"(AMP-MP)":[8],"implemented":[9],"on":[10,27,37,45,84,90],"Asynchronous":[12],"Multicore":[13],"Processor":[14],"to":[15],"achieve":[16],"a":[17],"high":[18],"throughput":[19,55,63],"and":[20,67,75,87],"yet":[21],"secure":[22],"Advanced":[23],"Encryption":[24],"Standard":[25],"Counter":[28],"with":[29],"Chaining":[30],"Mode":[31],"(AES-CCM).":[32],"Our":[33],"AMP-MP":[34],"is":[35,59,70,96,105],"realized":[36],"8-bit":[39],"asynchronous":[40],"9-core":[41],"processor":[42],"fabricated":[43],"65nm":[46],"CMOS":[47],"process.":[48],"The":[49],"experimental":[50],"results":[51],"show":[52],"that":[53],"the":[54,57,62,79,93,111],"of":[56],"authentication":[58,66],"13.54Gbps":[60],"while":[61],"for":[64],"both":[65],"encryption":[68],"collectively":[69],"8.32Gbps,":[71],"which":[72,104],"are":[73],"17\u00d7":[74,107],"70\u00d7":[76],"faster":[77],"than":[78,110],"reported":[80],"counterparty":[81],"respectively.":[82],"Based":[83],"power":[85],"dissipation":[86],"EM":[88],"SCA":[89],"our":[91],"AMP-MP,":[92],"secret":[94],"key":[95],"unrevealed":[97],"at":[98],"5\u00d710":[99],"<sup":[100],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">5</sup>":[102],"traces,":[103],"~":[106],"more":[108],"secured":[109],"standard":[112],"ASIC":[113],"AES-CCM":[114],"implementation.":[115]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
