{"id":"https://openalex.org/W4292070579","doi":"https://doi.org/10.1109/newcas52662.2022.9842174","title":"High-performance Multi-function HMAC-SHA2 FPGA Implementation","display_name":"High-performance Multi-function HMAC-SHA2 FPGA Implementation","publication_year":2022,"publication_date":"2022-06-19","ids":{"openalex":"https://openalex.org/W4292070579","doi":"https://doi.org/10.1109/newcas52662.2022.9842174"},"language":"en","primary_location":{"id":"doi:10.1109/newcas52662.2022.9842174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/newcas52662.2022.9842174","pdf_url":null,"source":{"id":"https://openalex.org/S4363608492","display_name":"2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052625146","display_name":"Binh Kieu-Do-Nguyen","orcid":"https://orcid.org/0000-0001-7240-7203"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Binh Kieu-Do-Nguyen","raw_affiliation_strings":["University of Electro-Communications (UEC),Tokyo,Japan,182-8585"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025387024","display_name":"Trong-Thuc Hoang","orcid":"https://orcid.org/0000-0002-4078-0836"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Trong-Thuc Hoang","raw_affiliation_strings":["University of Electro-Communications (UEC),Tokyo,Japan,182-8585"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102897632","display_name":"Akira Tsukamoto","orcid":"https://orcid.org/0000-0002-3339-7177"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akira Tsukamoto","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064","institution_ids":["https://openalex.org/I73613424"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067274985","display_name":"Kuniyasu Suzaki","orcid":"https://orcid.org/0000-0003-0912-0087"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kuniyasu Suzaki","raw_affiliation_strings":["National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064","Tech. Research Asso. of Secure IoT Edge Appl. based on RISC-V Open Arch. (TRASIO), Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Tech. Research Asso. of Secure IoT Edge Appl. based on RISC-V Open Arch. (TRASIO), Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042912660","display_name":"Cong\u2010Kha Pham","orcid":"https://orcid.org/0000-0001-5255-4919"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Cong-Kha Pham","raw_affiliation_strings":["University of Electro-Communications (UEC),Tokyo,Japan,182-8585"],"affiliations":[{"raw_affiliation_string":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585","institution_ids":["https://openalex.org/I20529979"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052625146"],"corresponding_institution_ids":["https://openalex.org/I20529979"],"apc_list":null,"apc_paid":null,"fwci":1.2473,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.8160418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"30","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-based-message-authentication-code","display_name":"Hash-based message authentication code","score":0.9236892461776733},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7939618825912476},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6853920221328735},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.6210587024688721},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5396900177001953},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5025300979614258},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4689471423625946},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.46713924407958984},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4617616534233093},{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.4616808295249939},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.45859044790267944},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.43478891253471375},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.4295107126235962},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.3621378540992737},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3374830484390259},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.33604100346565247},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.28181713819503784},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.2738479971885681},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20712324976921082},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16847220063209534},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10479539632797241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10441279411315918}],"concepts":[{"id":"https://openalex.org/C100485629","wikidata":"https://www.wikidata.org/wiki/Q1669397","display_name":"Hash-based message authentication code","level":4,"score":0.9236892461776733},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7939618825912476},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6853920221328735},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.6210587024688721},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5396900177001953},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5025300979614258},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4689471423625946},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.46713924407958984},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4617616534233093},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.4616808295249939},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.45859044790267944},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.43478891253471375},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.4295107126235962},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3621378540992737},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3374830484390259},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.33604100346565247},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.28181713819503784},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.2738479971885681},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20712324976921082},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16847220063209534},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10479539632797241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10441279411315918},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/newcas52662.2022.9842174","is_oa":false,"landing_page_url":"https://doi.org/10.1109/newcas52662.2022.9842174","pdf_url":null,"source":{"id":"https://openalex.org/S4363608492","display_name":"2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.44999998807907104,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321034","display_name":"New Energy and Industrial Technology Development Organization","ror":"https://ror.org/0055k7a87"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W73882846","https://openalex.org/W110195509","https://openalex.org/W1545656271","https://openalex.org/W1560798398","https://openalex.org/W1600401946","https://openalex.org/W1656678770","https://openalex.org/W1966982213","https://openalex.org/W2068333279","https://openalex.org/W2083774801","https://openalex.org/W2098875331","https://openalex.org/W2109900013","https://openalex.org/W2115169761","https://openalex.org/W2121448889","https://openalex.org/W2127034079","https://openalex.org/W2141569810","https://openalex.org/W2146923862","https://openalex.org/W2162853544","https://openalex.org/W2169692300","https://openalex.org/W2245321047","https://openalex.org/W2245908696","https://openalex.org/W2248958493","https://openalex.org/W2266218113","https://openalex.org/W2538079512","https://openalex.org/W2539966325","https://openalex.org/W2604745103","https://openalex.org/W2794768126","https://openalex.org/W2892186387","https://openalex.org/W2910704120","https://openalex.org/W2916086000","https://openalex.org/W2925807647","https://openalex.org/W2942988080","https://openalex.org/W2991710998","https://openalex.org/W3020468439","https://openalex.org/W3102038269","https://openalex.org/W3103322989","https://openalex.org/W3134712601","https://openalex.org/W4210531213","https://openalex.org/W4230377664","https://openalex.org/W4232271737","https://openalex.org/W4244181811","https://openalex.org/W4246356347","https://openalex.org/W6632682725","https://openalex.org/W6652772941","https://openalex.org/W6728586019"],"related_works":["https://openalex.org/W1989379795","https://openalex.org/W2139378575","https://openalex.org/W2280933377","https://openalex.org/W2538079512","https://openalex.org/W1511774205","https://openalex.org/W2121212096","https://openalex.org/W2783731972","https://openalex.org/W2139220327","https://openalex.org/W2771872416","https://openalex.org/W2543951870"],"abstract_inverted_index":{"Today,":[0],"Hash-based":[1],"Message":[2],"Authentication":[3],"Code":[4],"with":[5,109,129],"Secure":[6],"Hash":[7],"Algorithm":[8],"2":[9],"(HMAC-SHA2)":[10],"is":[11,92],"widely":[12],"used":[13],"in":[14,19],"modern":[15],"protocols,":[16],"such":[17,65],"as":[18,66],"Internet":[20],"Protocol":[21],"Security":[22,27],"(IPSec)":[23],"and":[24,72],"Transport":[25],"Layer":[26],"(TLS).":[28],"Many":[29],"authors":[30],"proposed":[31,93,104],"their":[32],"HMAC-SHA2":[33,99],"hardware":[34],"implementations.":[35],"Some":[36],"targeted":[37],"a":[38,110],"high-performance":[39],"design,":[40],"while":[41],"others":[42],"aimed":[43],"to":[44,122,133],"satisfy":[45,83],"an":[46,78,89],"area":[47],"constraint.":[48],"Those":[49],"implementations":[50],"are":[51],"acceptable":[52],"for":[53],"applications":[54],"that":[55,81,94,117],"require":[56],"only":[57],"low-cost":[58,111],"or":[59],"high":[60,107],"throughput.":[61],"However,":[62],"some":[63],"applications,":[64],"Software-Defined":[67],"Networking":[68],"(SDN),":[69],"Internet-of-Thing":[70],"(IoT),":[71],"Wireless":[73],"Sensor":[74],"Network":[75],"(WSN),":[76],"need":[77],"efficient":[79],"design":[80],"can":[82,95,119],"both":[84],"merits.":[85],"In":[86],"this":[87],"paper,":[88],"FPGA":[90],"implementation":[91],"operate":[96],"on":[97],"multiple":[98],"variants":[100],"without":[101],"re-synthesize.":[102],"The":[103,113],"architecture":[105],"achieves":[106],"performance":[108],"area.":[112],"experimental":[114],"results":[115],"show":[116],"it":[118],"run":[120],"up":[121],"380-MHz,":[123],"more":[124],"than":[125],"4.8":[126],"Giga-bit-per-second":[127],"(Gbps),":[128],"fewer":[130],"resources":[131],"compared":[132],"other":[134],"similar":[135],"designs.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
