{"id":"https://openalex.org/W7125917628","doi":"https://doi.org/10.1109/smc58881.2025.11342903","title":"ScalaCrypt: A Secure Multi-Core Parallel System Architecture for High-Throughput Encrypted Data Transmission","display_name":"ScalaCrypt: A Secure Multi-Core Parallel System Architecture for High-Throughput Encrypted Data Transmission","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125917628","doi":"https://doi.org/10.1109/smc58881.2025.11342903"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11342903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124083921","display_name":"Anbang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Anbang Li","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124062695","display_name":"Yixin Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yixin Qin","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124083104","display_name":"Xiaojuan Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojuan Meng","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124090750","display_name":"Yunbo Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunbo Yan","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiaxiang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110931","display_name":"Jinan Institute of Quantum Technology","ror":"https://ror.org/02557nd11","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210110931"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaxiang Wang","raw_affiliation_strings":["Jinan Institute of Supercomputing Technology,Jinan,P. R. China,250103"],"affiliations":[{"raw_affiliation_string":"Jinan Institute of Supercomputing Technology,Jinan,P. R. China,250103","institution_ids":["https://openalex.org/I4210110931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045785170","display_name":"Meng Guo","orcid":"https://orcid.org/0000-0003-3316-1815"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Guo","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013","institution_ids":["https://openalex.org/I152269853"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5124083921"],"corresponding_institution_ids":["https://openalex.org/I152269853"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85033591,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"7358","last_page":"7364"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9297000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9297000169754028,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.025200000032782555,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.01209999993443489,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7924000024795532},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.47540000081062317},{"id":"https://openalex.org/keywords/disk-encryption-hardware","display_name":"Disk encryption hardware","score":0.4065999984741211},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.3937000036239624},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.38350000977516174},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.375},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.3700000047683716},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.3239000141620636},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3188999891281128}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7924000024795532},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7825000286102295},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5587999820709229},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47540000081062317},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.4065999984741211},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.3937000036239624},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.38350000977516174},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38260000944137573},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.375},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.3700000047683716},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32690000534057617},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.3239000141620636},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3188999891281128},{"id":"https://openalex.org/C130795937","wikidata":"https://www.wikidata.org/wiki/Q2561570","display_name":"Remote direct memory access","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.29170000553131104},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.28189998865127563},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.2806999981403351},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.2632000148296356},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.26010000705718994},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.25850000977516174},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.257099986076355},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.25699999928474426},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.25099998712539673},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11342903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11342903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.6154174208641052}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2071634873","https://openalex.org/W2185409408","https://openalex.org/W2355550369","https://openalex.org/W2726914369","https://openalex.org/W2808484818","https://openalex.org/W2987295702","https://openalex.org/W3011310216","https://openalex.org/W3200501407","https://openalex.org/W3212211654","https://openalex.org/W4214815449","https://openalex.org/W4224948008","https://openalex.org/W4238341678","https://openalex.org/W4243090697","https://openalex.org/W4283656503","https://openalex.org/W4312951592","https://openalex.org/W4400723844","https://openalex.org/W4402568947","https://openalex.org/W4404041238","https://openalex.org/W4404771643","https://openalex.org/W4405320666","https://openalex.org/W4405974277","https://openalex.org/W4406805529","https://openalex.org/W4407230247","https://openalex.org/W4409120508","https://openalex.org/W4409247740"],"related_works":[],"abstract_inverted_index":{"Long-distance":[0],"RDMA":[1,173],"technology":[2],"leverages":[3],"FPGA-accelerated":[4],"protocol":[5],"conversion":[6],"to":[7,67,141],"achieve":[8],"low-latency,":[9],"high-bandwidth":[10],"transmission":[11,25],"across":[12],"data":[13,20,161],"centers.":[14],"However,":[15],"end-to-end":[16],"security":[17,162],"for":[18],"encrypted":[19],"requires":[21],"tight":[22],"coordination":[23],"with":[24,106],"efficiency.":[26],"RDMA\u2019s":[27],"reliance":[28],"on":[29,111,143],"lossless":[30],"networks":[31],"and":[32,50,81,94,138,146,154],"microsecond-level":[33],"latency":[34],"demands":[35],"hardware-level":[36],"encryption":[37,42,46,75,104],"implementation,":[38],"as":[39],"traditional":[40,73],"software-based":[41],"or":[43],"single-core":[44],"hardware":[45,74],"cannot":[47],"meet":[48],"real-time":[49],"low-latency":[51],"requirements.":[52],"To":[53],"address":[54],"this,":[55],"this":[56],"paper":[57],"proposes":[58],"an":[59],"FPGA-based":[60],"high-throughput":[61],"scalable":[62],"AES-GCM":[63],"system":[64],"architecture":[65,100,131],"designed":[66],"overcome":[68],"the":[69,99,130,169],"core":[70,90],"bottlenecks":[71],"of":[72,120,171],"solutions":[76],"in":[77,163],"throughput,":[78],"resource":[79,134],"efficiency,":[80],"dynamic":[82,95],"scalability.By":[83],"integrating":[84],"multi-core":[85],"parallel":[86],"processing,":[87],"a":[88,107,117],"master-slave":[89],"collaborative":[91],"scheduling":[92],"mechanism,":[93],"channel":[96],"scaling":[97],"technology,":[98],"achieves":[101],"12.6":[102],"Gbps":[103],"throughput":[105],"single":[108],"16-core":[109],"module":[110],"Xilinx":[112],"Kintex":[113],"UltraScale":[114],"FPGAs,":[115,149],"delivering":[116],"power":[118],"efficiency":[119],"6.3":[121],"Gbps/W\u2014a":[122],"34x":[123],"improvement":[124],"over":[125,174],"CPU/GPU":[126],"heterogeneous":[127],"solutions.":[128],"Furthermore,":[129],"reduces":[132],"LUT":[133],"consumption":[135],"by":[136],"20.54%":[137],"28.46%":[139],"compared":[140],"implementations":[142],"Microchip":[144],"PolarFire":[145],"Lattice":[147],"ECP5":[148],"respectively.":[150],"Through":[151],"physical":[152],"isolation":[153],"zero-copy":[155],"key":[156],"distribution":[157],"techniques,":[158],"it":[159],"ensures":[160],"multi-tenant":[164],"environments":[165],"while":[166],"significantly":[167],"enhancing":[168],"safety":[170],"long-distance":[172],"10Gbps":[175],"links.":[176]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-29T00:00:00"}
