{"id":"https://openalex.org/W2067311797","doi":"https://doi.org/10.1109/vlsisoc.2007.4402513","title":"High speed SOC design for blowfish cryptographic algorithm","display_name":"High speed SOC design for blowfish cryptographic algorithm","publication_year":2007,"publication_date":"2007-10-01","ids":{"openalex":"https://openalex.org/W2067311797","doi":"https://doi.org/10.1109/vlsisoc.2007.4402513","mag":"2067311797"},"language":"en","primary_location":{"id":"doi:10.1109/vlsisoc.2007.4402513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsisoc.2007.4402513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IFIP International Conference on Very Large Scale Integration","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091196466","display_name":"Brian Cody","orcid":"https://orcid.org/0000-0001-7715-4575"},"institutions":[{"id":"https://openalex.org/I4210117968","display_name":"Kulicke & Soffa (United States)","ror":"https://ror.org/02mxd1a54","country_code":"US","type":"company","lineage":["https://openalex.org/I4210117968","https://openalex.org/I4210144559"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Brian Cody","raw_affiliation_strings":["Kulicke & Soffa Industries, USA"],"affiliations":[{"raw_affiliation_string":"Kulicke & Soffa Industries, USA","institution_ids":["https://openalex.org/I4210117968"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085106568","display_name":"Justin Madigan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Justin Madigan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022500109","display_name":"Spencer MacDonald","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133587","display_name":"Discovery Air (Canada)","ror":"https://ror.org/030tp6t18","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210133587"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Spencer MacDonald","raw_affiliation_strings":["DAE Systems","DAE Systems, USA"],"affiliations":[{"raw_affiliation_string":"DAE Systems","institution_ids":["https://openalex.org/I4210133587"]},{"raw_affiliation_string":"DAE Systems, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111916590","display_name":"Kenneth Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kenneth W. Hsu","raw_affiliation_strings":["Rochester Institute of Technology, USA","Rochester Institute of Technology (USA)"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]},{"raw_affiliation_string":"Rochester Institute of Technology (USA)","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5091196466"],"corresponding_institution_ids":["https://openalex.org/I4210117968"],"apc_list":null,"apc_paid":null,"fwci":0.9387,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81554128,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8089085817337036},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.6453613638877869},{"id":"https://openalex.org/keywords/vhdl","display_name":"VHDL","score":0.6066529750823975},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5978598594665527},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5931154489517212},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.4717745780944824},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4223252534866333},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.340054452419281},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2810934782028198},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1176709234714508}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8089085817337036},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.6453613638877869},{"id":"https://openalex.org/C36941000","wikidata":"https://www.wikidata.org/wiki/Q209455","display_name":"VHDL","level":3,"score":0.6066529750823975},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5978598594665527},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5931154489517212},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.4717745780944824},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4223252534866333},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.340054452419281},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2810934782028198},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1176709234714508}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vlsisoc.2007.4402513","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vlsisoc.2007.4402513","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 IFIP International Conference on Very Large Scale Integration","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W119575818","https://openalex.org/W1527701244","https://openalex.org/W1636750413","https://openalex.org/W2079432887","https://openalex.org/W2154447348","https://openalex.org/W2199322517","https://openalex.org/W2536826060","https://openalex.org/W6604788990","https://openalex.org/W6631698751","https://openalex.org/W6682589954"],"related_works":["https://openalex.org/W3004362061","https://openalex.org/W2364622490","https://openalex.org/W2042515040","https://openalex.org/W2383986884","https://openalex.org/W2356141508","https://openalex.org/W4297665406","https://openalex.org/W2749962643","https://openalex.org/W2390807153","https://openalex.org/W2913264063","https://openalex.org/W1968560271"],"abstract_inverted_index":{"This":[0],"paper":[1],"seeks":[2],"to":[3],"implement":[4],"the":[5,23,54,84,99,129],"Blowfish":[6,17,24,34,113],"algorithm":[7,25],"in":[8,18],"VHDL":[9],"and":[10,61,70,83,96,133],"provide":[11],"a":[12,37,71,87,117],"simple,":[13],"robust":[14],"implementation":[15,32,114],"of":[16,21,33,67,74,119,131],"hardware.":[19],"As":[20],"today,":[22],"has":[26],"no":[27],"known":[28],"cryptanalysis.":[29],"A":[30],"hardware":[31],"would":[35],"be":[36,124],"powerful":[38],"tool":[39],"for":[40,57,116],"any":[41,45],"mobile":[42],"device":[43],"or":[44],"technology":[46],"requiring":[47],"strong":[48],"encryption.":[49],"Our":[50],"final":[51],"design":[52,107],"uses":[53],"core-slow":[55],"library":[56],"worst-case":[58],"scenario":[59],"analysis":[60],"reaches":[62],"an":[63,109],"incredible":[64],"encryption":[65],"speed":[66,73,122],"590":[68],"MBits/sec":[69],"decryption":[72],"559":[75],"MBits/sec.":[76],"The":[77,105,121],"area":[78],"is":[79,86,108],"4996":[80],"standard":[81],"cell,s":[82],"power":[85,134],"mere":[88],"63":[89],"mW.":[90],"These":[91],"results":[92],"are":[93],"very":[94],"competitive":[95],"beat":[97],"out":[98],"competition":[100],"as":[101,103],"far":[102],"speed.":[104],"overall":[106],"incredibly":[110],"fast,":[111],"efficient":[112],"suitable":[115],"plethora":[118],"applications.":[120],"can":[123],"drastically":[125],"increased":[126],"further":[127],"at":[128],"expense":[130],"space":[132],"by":[135],"pipelining.":[136]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
