{"id":"https://openalex.org/W2248959894","doi":"https://doi.org/10.1109/tc.2015.2435775","title":"Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes","display_name":"Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes","publication_year":2015,"publication_date":"2015-05-20","ids":{"openalex":"https://openalex.org/W2248959894","doi":"https://doi.org/10.1109/tc.2015.2435775","mag":"2248959894"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2015.2435775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2015.2435775","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026354959","display_name":"Goutam Paul","orcid":"https://orcid.org/0000-0002-5160-6032"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Goutam Paul","raw_affiliation_strings":["Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Cryptology and Security Research Unit (CSRU), R. C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["School of Computer Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026354959"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":null,"apc_paid":null,"fwci":0.8629,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83040492,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"65","issue":"2","first_page":"640","last_page":"653"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7875794172286987},{"id":"https://openalex.org/keywords/serpent","display_name":"Serpent (symbolism)","score":0.7460423111915588},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.6066950559616089},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5774690508842468},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5770182609558105},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5460054278373718},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5426450371742249},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.518191397190094},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.514288604259491},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.443445086479187},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.320917546749115},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17084968090057373},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13542985916137695},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11803784966468811}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7875794172286987},{"id":"https://openalex.org/C64001112","wikidata":"https://www.wikidata.org/wiki/Q721221","display_name":"Serpent (symbolism)","level":2,"score":0.7460423111915588},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.6066950559616089},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5774690508842468},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5770182609558105},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5460054278373718},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5426450371742249},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.518191397190094},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.514288604259491},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.443445086479187},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.320917546749115},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17084968090057373},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13542985916137695},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11803784966468811},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2015.2435775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2015.2435775","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W34647140","https://openalex.org/W37323913","https://openalex.org/W183251289","https://openalex.org/W342080779","https://openalex.org/W1511450442","https://openalex.org/W1518029257","https://openalex.org/W1529674521","https://openalex.org/W1557742477","https://openalex.org/W1570741313","https://openalex.org/W1585255405","https://openalex.org/W1607684240","https://openalex.org/W1719766253","https://openalex.org/W1857402953","https://openalex.org/W1883830449","https://openalex.org/W1997424675","https://openalex.org/W2013746303","https://openalex.org/W2017633437","https://openalex.org/W2025516544","https://openalex.org/W2053238222","https://openalex.org/W2070666012","https://openalex.org/W2102137911","https://openalex.org/W2121082877","https://openalex.org/W2132166328","https://openalex.org/W2133809426","https://openalex.org/W2134511057","https://openalex.org/W2151463795","https://openalex.org/W2162268408","https://openalex.org/W2162683892","https://openalex.org/W2163835931","https://openalex.org/W2172632525","https://openalex.org/W2351941136","https://openalex.org/W2519659463","https://openalex.org/W2538285036","https://openalex.org/W2587941876","https://openalex.org/W3147184567","https://openalex.org/W3203992401","https://openalex.org/W6601414465","https://openalex.org/W6607345009","https://openalex.org/W6631047641","https://openalex.org/W6636205847","https://openalex.org/W6637472934","https://openalex.org/W6639184749","https://openalex.org/W6675093155","https://openalex.org/W6679578540","https://openalex.org/W6683700302","https://openalex.org/W6685291968"],"related_works":["https://openalex.org/W1558609276","https://openalex.org/W2094482463","https://openalex.org/W2614647605","https://openalex.org/W2950447949","https://openalex.org/W3159283027","https://openalex.org/W1784733384","https://openalex.org/W2615464719","https://openalex.org/W2157451614","https://openalex.org/W2483202600","https://openalex.org/W2903451324"],"abstract_inverted_index":{"With":[0],"increasing":[1],"usage":[2],"of":[3,23,32,57,60,76,99,116,128,166,175],"hardware":[4,14,30,51,160],"accelerators":[5],"in":[6,66],"modern":[7],"heterogeneous":[8],"System-on-Chips":[9],"(SoCs),":[10],"the":[11,44,58,61,67,73,77,82,94,105,125,137],"distinction":[12],"between":[13],"and":[15,28,81,101,112,150,170],"software":[16,34,68],"is":[17,25,140],"no":[18,26],"longer":[19],"rigid.":[20],"The":[21,132],"domain":[22],"cryptography":[24],"exception":[27],"efficient":[29,50],"design":[31,53,74,90,110,130,139,156],"so-called":[33],"ciphers":[35],"are":[36],"becoming":[37],"increasingly":[38],"popular.":[39],"In":[40,104],"this":[41],"paper,":[42],"for":[43,54,96,124,143,147,153],"first":[45],"time":[46],"we":[47,87,107],"propose":[48],"an":[49],"accelerator":[52],"SOSEMANUK,":[55,144,171],"one":[56],"finalists":[59],"eSTREAM":[62,178],"stream":[63,83],"cipher":[64,79,84],"competition":[65],"category.":[69],"Since":[70],"SOSEMANUK":[71],"combines":[72],"principles":[75],"block":[78],"Serpent":[80,100],"SNOW":[85,102,148,168],"2.0,":[86],"make":[88],"our":[89],"flexible":[91],"to":[92],"accommodate":[93],"option":[95],"independent":[97],"execution":[98],"2.0.":[103],"process,":[106],"identify":[108],"interesting":[109],"points":[111],"explore":[113],"different":[114],"levels":[115],"optimizations.":[117],"We":[118],"perform":[119],"a":[120],"detailed":[121],"experimental":[122],"evaluation":[123],"performance":[126],"figures":[127],"each":[129],"point.":[131],"best":[133],"throughput":[134],"achieved":[135],"by":[136],"combined":[138],"67.84":[141],"Gbps":[142,146,152],"33.92":[145],"2.0":[149,169],"2.12":[151],"Serpent.":[154],"Our":[155],"outperforms":[157],"all":[158,176],"existing":[159],"(as":[161],"well":[162],"as":[163],"software)":[164],"designs":[165],"Serpent,":[167],"along":[172],"with":[173],"those":[174],"other":[177],"candidates.":[179]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
