{"id":"https://openalex.org/W2129065500","doi":"https://doi.org/10.1109/ipdps.2004.1303101","title":"A parallel architecture for secure FPGA symmetric encryption","display_name":"A parallel architecture for secure FPGA symmetric encryption","publication_year":2004,"publication_date":"2004-06-10","ids":{"openalex":"https://openalex.org/W2129065500","doi":"https://doi.org/10.1109/ipdps.2004.1303101","mag":"2129065500"},"language":"en","primary_location":{"id":"doi:10.1109/ipdps.2004.1303101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2004.1303101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028340171","display_name":"Eric J. Swankoski","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126846","display_name":"Information Technology Laboratory","ror":"https://ror.org/0440c3437","country_code":"US","type":"government","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065","https://openalex.org/I4210126846"]},{"id":"https://openalex.org/I4388482701","display_name":"Applied Research Laboratory at the University of Hawai\u2018i","ror":"https://ror.org/046s2rf49","country_code":null,"type":"facility","lineage":["https://openalex.org/I4388482701"]},{"id":"https://openalex.org/I4210096458","display_name":"Applied Research (United States)","ror":"https://ror.org/00qw43163","country_code":"US","type":"company","lineage":["https://openalex.org/I4210096458"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"E.J. Swankoski","raw_affiliation_strings":["Information Science & Technology Division, Applied Research Laboratory, USA","Applied Research Laboratory"],"affiliations":[{"raw_affiliation_string":"Information Science & Technology Division, Applied Research Laboratory, USA","institution_ids":["https://openalex.org/I4210126846","https://openalex.org/I4210096458","https://openalex.org/I4388482701"]},{"raw_affiliation_string":"Applied Research Laboratory","institution_ids":["https://openalex.org/I4210096458","https://openalex.org/I4388482701"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016131855","display_name":"Richard R. Brooks","orcid":"https://orcid.org/0000-0002-4240-4762"},"institutions":[{"id":"https://openalex.org/I4210096458","display_name":"Applied Research (United States)","ror":"https://ror.org/00qw43163","country_code":"US","type":"company","lineage":["https://openalex.org/I4210096458"]},{"id":"https://openalex.org/I4210126846","display_name":"Information Technology Laboratory","ror":"https://ror.org/0440c3437","country_code":"US","type":"government","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065","https://openalex.org/I4210126846"]},{"id":"https://openalex.org/I4388482701","display_name":"Applied Research Laboratory at the University of Hawai\u2018i","ror":"https://ror.org/046s2rf49","country_code":null,"type":"facility","lineage":["https://openalex.org/I4388482701"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.R. Brooks","raw_affiliation_strings":["Information Science & Technology Division, Applied Research Laboratory, USA","Applied Research Laboratory"],"affiliations":[{"raw_affiliation_string":"Information Science & Technology Division, Applied Research Laboratory, USA","institution_ids":["https://openalex.org/I4210126846","https://openalex.org/I4210096458","https://openalex.org/I4388482701"]},{"raw_affiliation_string":"Applied Research Laboratory","institution_ids":["https://openalex.org/I4210096458","https://openalex.org/I4388482701"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076019669","display_name":"V. Narayanan","orcid":"https://orcid.org/0000-0003-0653-8170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. Narayanan","raw_affiliation_strings":["Computer Science and Engineering Department, Pennsylvania State University","School of Electrical Engineering and Computer Science"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Pennsylvania State University","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007116603","display_name":"Mahmut Kandemir","orcid":"https://orcid.org/0000-0002-9940-9951"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Kandemir","raw_affiliation_strings":["Computer Science and Engineering Department, Pennsylvania State University, USA","School of Electrical Engineering and Computer Science"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112796358","display_name":"M.J. Irwin","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M.J. Irwin","raw_affiliation_strings":["Computer Science and Engineering Department, Pennsylvania State University, USA","School of Electrical Engineering and Computer Science"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"School of Electrical Engineering and Computer Science","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5028340171"],"corresponding_institution_ids":["https://openalex.org/I4210096458","https://openalex.org/I4210126846","https://openalex.org/I4388482701"],"apc_list":null,"apc_paid":null,"fwci":3.5976,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.93162103,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"197","issue":null,"first_page":"132","last_page":"139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7925264835357666},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7475882172584534},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6045323014259338},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5882099270820618},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5437499284744263},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5181366205215454},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.45167556405067444},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.44305816292762756},{"id":"https://openalex.org/keywords/hardware-architecture","display_name":"Hardware architecture","score":0.4384458661079407},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4233846962451935},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.36689072847366333},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3582778573036194},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25670570135116577},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22767135500907898},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14770972728729248},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1366979479789734},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11103424429893494}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7925264835357666},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7475882172584534},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6045323014259338},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5882099270820618},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5437499284744263},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5181366205215454},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.45167556405067444},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.44305816292762756},{"id":"https://openalex.org/C65232700","wikidata":"https://www.wikidata.org/wiki/Q5656403","display_name":"Hardware architecture","level":3,"score":0.4384458661079407},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4233846962451935},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.36689072847366333},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3582778573036194},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25670570135116577},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22767135500907898},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14770972728729248},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1366979479789734},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11103424429893494}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipdps.2004.1303101","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipdps.2004.1303101","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th International Parallel and Distributed Processing Symposium, 2004. Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5199999809265137,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W117007327","https://openalex.org/W1499050268","https://openalex.org/W1786292017","https://openalex.org/W1849758760","https://openalex.org/W2000171858","https://openalex.org/W2034115915","https://openalex.org/W2087402364","https://openalex.org/W2118220486","https://openalex.org/W2144595681","https://openalex.org/W2145771994","https://openalex.org/W2161754620","https://openalex.org/W2170047587","https://openalex.org/W2199322517","https://openalex.org/W4242720920","https://openalex.org/W6659052051"],"related_works":["https://openalex.org/W2388259026","https://openalex.org/W2913264063","https://openalex.org/W648677723","https://openalex.org/W1585813234","https://openalex.org/W2548263541","https://openalex.org/W1989288259","https://openalex.org/W2571824618","https://openalex.org/W1540096141","https://openalex.org/W3033579761","https://openalex.org/W3036154582"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2,112],"given.":[3],"Cryptographic":[4],"algorithms":[5,34],"provide":[6,23],"encryption":[7,60,96,126,148],"for":[8,79,101,129],"millions":[9],"of":[10,28,94,105,168,184,207],"sensitive":[11],"financial,":[12],"government,":[13],"and":[14,40,107,117,140,196,209,221],"private":[15],"transactions":[16],"daily.":[17],"Reconfigurable":[18],"computing":[19],"platforms":[20],"like":[21],"FPGAs":[22],"a":[24,45,71,102,146,154,204],"low-cost,":[25],"high-performance":[26],"method":[27],"implementing":[29],"cryptographic":[30],"primitives.":[31],"Several":[32],"standard":[33],"are":[35],"used:":[36],"the":[37,91,163,169,174,200,213,216],"DES,":[38],"3DES,":[39],"AES":[41],"algorithms.":[42],"We":[43,121,143],"propose":[44],"parallel":[46,125,175,201],"architecture":[47,127,202],"in":[48,153],"which":[49,76,189],"internal":[50],"hardware":[51,69,141],"functionality":[52],"is":[53,56,77,88,171,180],"reused.":[54],"This":[55,81],"unlike":[57],"conventional":[58,134],"pipelined":[59,135,147],"systems,":[61],"where":[62],"loop-unrolled":[63],"architectures":[64,136],"use":[65],"duplicated":[66],"hardware.":[67],"Reused":[68],"creates":[70,82],"reasonably":[72],"compact":[73],"single":[74],"block,":[75],"ideal":[78],"duplication.":[80],"more":[83],"security,":[84],"as":[85,158],"spatial":[86],"isolation":[87,167],"achieved":[89,172],"by":[90,113],"physical":[92,115,186,208,223],"separation":[93],"individual":[95],"blocks.":[97],"Also,":[98],"this":[99,124],"allows":[100,128],"greater":[103,138],"degree":[104],"scalability,":[106],"system":[108,149],"throughput":[109],"becomes":[110],"limited":[111],"available":[114,118],"resources":[116],"I/O":[119],"resources.":[120],"conclude":[122],"that":[123,145],"comparable":[130],"performance":[131],"compared":[132],"to":[133],"with":[137],"flexibility":[139],"efficiency.":[142],"show":[144],"cannot":[150],"be":[151],"used":[152],"physically":[155],"secure":[156],"environment,":[157],"it":[159],"does":[160],"not":[161],"protect":[162],"keys":[164],"adequately.":[165],"Temporal":[166],"key":[170,178,192,217],"using":[173,182],"architecture.":[176],"Indirect":[177],"storage":[179],"accomplished":[181],"principles":[183],"controlled":[185],"random":[187],"functions,":[188],"make":[190],"all":[191],"values":[193],"fully":[194],"transient":[195],"never":[197],"hardware-resident.":[198],"Thus":[199],"achieves":[203],"high":[205],"level":[206],"design":[210],"security":[211],"within":[212],"FPGA,":[214],"protecting":[215],"from":[218],"both":[219],"invasive":[220],"noninvasive":[222],"attacks.":[224]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
