{"id":"https://openalex.org/W2762340727","doi":"https://doi.org/10.1109/isvdat.2016.8064877","title":"Hardware optimizations for crypto implementations (Invited paper)","display_name":"Hardware optimizations for crypto implementations (Invited paper)","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2762340727","doi":"https://doi.org/10.1109/isvdat.2016.8064877","mag":"2762340727"},"language":"en","primary_location":{"id":"doi:10.1109/isvdat.2016.8064877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvdat.2016.8064877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 20th International Symposium on VLSI Design and Test (VDAT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035027224","display_name":"M. Mohamed Asan Basiri","orcid":"https://orcid.org/0000-0002-1898-1690"},"institutions":[{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M Mohamed Asan Basiri","raw_affiliation_strings":["Indian Institute of Technology Delhi, New Delhi, Delhi, IN"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Delhi, New Delhi, Delhi, IN","institution_ids":["https://openalex.org/I68891433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021517996","display_name":"Sandeep K. Shukla","orcid":"https://orcid.org/0000-0001-5525-7426"},"institutions":[{"id":"https://openalex.org/I94234084","display_name":"Indian Institute of Technology Kanpur","ror":"https://ror.org/05pjsgx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I94234084"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sandeep K. Shukla","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur, India","institution_ids":["https://openalex.org/I94234084"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035027224"],"corresponding_institution_ids":["https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":0.946,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7638706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"25","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7933892011642456},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6268532276153564},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.5602855086326599},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5513286590576172},{"id":"https://openalex.org/keywords/multiplexer","display_name":"Multiplexer","score":0.5163246989250183},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5097724795341492},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.5090615153312683},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4948391318321228},{"id":"https://openalex.org/keywords/loop-unrolling","display_name":"Loop unrolling","score":0.49363911151885986},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4625299572944641},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.45089343190193176},{"id":"https://openalex.org/keywords/very-large-scale-integration","display_name":"Very-large-scale integration","score":0.45068612694740295},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.350861132144928},{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.2400496006011963},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16173741221427917},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.15771707892417908},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.1407710313796997},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13806363940238953}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7933892011642456},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6268532276153564},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.5602855086326599},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5513286590576172},{"id":"https://openalex.org/C70970002","wikidata":"https://www.wikidata.org/wiki/Q189434","display_name":"Multiplexer","level":3,"score":0.5163246989250183},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5097724795341492},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.5090615153312683},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4948391318321228},{"id":"https://openalex.org/C76970557","wikidata":"https://www.wikidata.org/wiki/Q1869750","display_name":"Loop unrolling","level":3,"score":0.49363911151885986},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4625299572944641},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.45089343190193176},{"id":"https://openalex.org/C14580979","wikidata":"https://www.wikidata.org/wiki/Q876049","display_name":"Very-large-scale integration","level":2,"score":0.45068612694740295},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.350861132144928},{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.2400496006011963},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16173741221427917},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.15771707892417908},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.1407710313796997},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13806363940238953},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isvdat.2016.8064877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isvdat.2016.8064877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 20th International Symposium on VLSI Design and Test (VDAT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W82064772","https://openalex.org/W1581073174","https://openalex.org/W1972112182","https://openalex.org/W1990933466","https://openalex.org/W1991993305","https://openalex.org/W2020754854","https://openalex.org/W2078731783","https://openalex.org/W2125329961","https://openalex.org/W2149009819","https://openalex.org/W2165186177","https://openalex.org/W2166286113","https://openalex.org/W2181803494","https://openalex.org/W2311565262","https://openalex.org/W2322479853","https://openalex.org/W2535872946","https://openalex.org/W2542022920","https://openalex.org/W2549775107","https://openalex.org/W2555495333"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W4323268213","https://openalex.org/W3210347767","https://openalex.org/W2148967747","https://openalex.org/W4256534760","https://openalex.org/W2101047079","https://openalex.org/W2043381979","https://openalex.org/W98994209","https://openalex.org/W3008658471","https://openalex.org/W67940504"],"abstract_inverted_index":{"Latency,":[0],"Area,":[1],"and":[2,60,82,109,145],"Power":[3],"are":[4,73,148],"three":[5,68],"important":[6],"metrics":[7],"that":[8],"a":[9,55,62,104],"VLSI":[10],"designer":[11],"wants":[12],"to":[13,22,43,117,128,132],"optimize.":[14],"However,":[15],"often":[16],"one":[17],"of":[18,28,40,54,57,64,70,111,125,130],"these":[19],"may":[20],"have":[21],"be":[23],"optimized":[24],"at":[25],"the":[26,31,36,41,122,139,143],"cost":[27],"another":[29],"or":[30],"other":[32],"two.":[33],"Depending":[34],"on":[35,138],"application":[37],"scenario,":[38],"choice":[39],"metric":[42],"optimize":[44],"is":[45],"made.":[46],"In":[47],"this":[48],"paper,":[49],"we":[50,90],"consider":[51,67],"hardware":[52,106,126],"implementations":[53,116],"number":[56,63],"cryptographic":[58],"primitives":[59],"present":[61],"optimizations.":[65],"We":[66],"areas":[69],"crypto-engineering.":[71],"They":[72],"building":[74],"physical":[75],"unclonable":[76],"functions":[77],"(PUFs),":[78],"implementing":[79],"encryption/decryption":[80],"algorithms,":[81,113],"side":[83],"channel":[84],"proof":[85],"crypto":[86,140],"implementations.":[87],"The":[88],"techniques":[89,129],"employ":[91],"range":[92],"from":[93],"area":[94],"optimization":[95],"through":[96],"customized":[97],"multiplexer":[98],"design,":[99],"fusing":[100],"multiple":[101,119],"operations":[102,120],"into":[103],"single":[105],"element,":[107],"folding":[108],"unrolling":[110],"iterative":[112],"creating":[114],"reconfigurable":[115],"achieve":[118],"with":[121,150],"same":[123],"set":[124],"elements,":[127],"obfuscation":[131],"defeat":[133],"fault":[134],"injection":[135],"based":[136],"attacks":[137],"implementation.":[141],"All":[142],"proposed":[144],"existing":[146],"designs":[147],"implemented":[149],"45":[151],"nm":[152],"CMOS":[153],"library.":[154]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
