{"id":"https://openalex.org/W2950119048","doi":"https://doi.org/10.1145/3328833.3328879","title":"An Enhanced SHA3-based Hashing Method","display_name":"An Enhanced SHA3-based Hashing Method","publication_year":2019,"publication_date":"2019-04-09","ids":{"openalex":"https://openalex.org/W2950119048","doi":"https://doi.org/10.1145/3328833.3328879","mag":"2950119048"},"language":"en","primary_location":{"id":"doi:10.1145/3328833.3328879","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3328833.3328879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 8th International Conference on Software and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025411036","display_name":"A. Samir Abo-Taleb","orcid":null},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"A. Samir Abo-Taleb","raw_affiliation_strings":["Electronics and Communications Department, Ain Shams University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Electronics and Communications Department, Ain Shams University, Cairo, Egypt","institution_ids":["https://openalex.org/I107720978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005408176","display_name":"Nabil Moukafih","orcid":"https://orcid.org/0000-0002-2148-7896"},"institutions":[{"id":"https://openalex.org/I4210127717","display_name":"Armed Forces College of Medicine","ror":"https://ror.org/033ttrk34","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210127717"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. Nabil","raw_affiliation_strings":["Computer Science Department, Armed Forces Research and Development Center, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Armed Forces Research and Development Center, Cairo, Egypt","institution_ids":["https://openalex.org/I4210127717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001436579","display_name":"Mohamed Shalaby","orcid":"https://orcid.org/0000-0001-9933-5617"},"institutions":[{"id":"https://openalex.org/I59272784","display_name":"Arab Academy for Science, Technology, and Maritime Transport","ror":"https://ror.org/0004vyj87","country_code":"EG","type":"education","lineage":["https://openalex.org/I59272784"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. Shalaby","raw_affiliation_strings":["Egyptian Armed Forces, Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Egyptian Armed Forces, Arab Academy for Science Technology and Maritime Transport, Cairo, Egypt","institution_ids":["https://openalex.org/I59272784"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110181660","display_name":"Salwa Elramly","orcid":null},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Salwa Elramly","raw_affiliation_strings":["Electronics and Communications Department, Ain Shams University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Electronics and Communications Department, Ain Shams University, Cairo, Egypt","institution_ids":["https://openalex.org/I107720978"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5025411036"],"corresponding_institution_ids":["https://openalex.org/I107720978"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.05447066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"145","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8530406951904297},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6803887486457825},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5613599419593811},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5458940863609314},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5290756821632385},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.5175772905349731},{"id":"https://openalex.org/keywords/linear-hashing","display_name":"Linear hashing","score":0.5097091197967529},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.469806969165802},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.43655824661254883},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3535269498825073},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34304293990135193},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3027952313423157},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.2898467183113098},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2732013761997223},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20918211340904236}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8530406951904297},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6803887486457825},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5613599419593811},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5458940863609314},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5290756821632385},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.5175772905349731},{"id":"https://openalex.org/C36375716","wikidata":"https://www.wikidata.org/wiki/Q6553456","display_name":"Linear hashing","level":5,"score":0.5097091197967529},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.469806969165802},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.43655824661254883},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3535269498825073},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34304293990135193},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3027952313423157},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.2898467183113098},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2732013761997223},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20918211340904236},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3328833.3328879","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3328833.3328879","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 8th International Conference on Software and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W115326044","https://openalex.org/W1628268027","https://openalex.org/W1639305476","https://openalex.org/W1880212920","https://openalex.org/W2017176661","https://openalex.org/W2041934618","https://openalex.org/W2098801947","https://openalex.org/W2103239853","https://openalex.org/W2154835755","https://openalex.org/W2408040052","https://openalex.org/W2480363991","https://openalex.org/W2481249534","https://openalex.org/W2483391179","https://openalex.org/W2740230064","https://openalex.org/W2741177417","https://openalex.org/W2884186080","https://openalex.org/W2916086000","https://openalex.org/W3145042860"],"related_works":["https://openalex.org/W3012429193","https://openalex.org/W1571368810","https://openalex.org/W1967890297","https://openalex.org/W1594563977","https://openalex.org/W4214838992","https://openalex.org/W2808189470","https://openalex.org/W1534022569","https://openalex.org/W1579918296","https://openalex.org/W1481299995","https://openalex.org/W2895073576"],"abstract_inverted_index":{"When":[0],"a":[1,5,25,108,112,176,196],"software":[2,89,109],"implementation":[3,110],"of":[4,27,74,82,94,111,208],"security":[6,51,56,200],"system":[7,52,59],"is":[8,186,195,213],"considered,":[9],"side":[10,75],"channel":[11],"attacks":[12,29,99],"are":[13,24],"on":[14,116],"the":[15,72,80,95,123,137,161,172,205,209],"spot":[16],"threat.":[17],"Side-channel":[18],"attacks,":[19],"considered":[20],"in":[21,30,77],"this":[22,104],"work,":[23],"class":[26],"physical":[28,37],"which":[31],"an":[32,86],"adversary":[33],"tries":[34],"to":[35,49,85,154],"exploit":[36],"information":[38],"leakages":[39],"such":[40,62],"as":[41,63],"timing":[42],"information,":[43],"power":[44],"consumption,":[45],"or":[46],"electromagnetic":[47],"radiation":[48],"estimate":[50],"parameters":[53],"during":[54],"performing":[55],"algorithms.":[57],"New":[58],"architecture":[60],"features,":[61],"larger":[64],"cache":[65],"sizes":[66],"and":[67,100,140,201],"multicore":[68],"processors,":[69],"have":[70],"increased":[71],"prevalence":[73],"channels,":[76],"addition":[78],"to,":[79],"availability":[81],"measurement":[83],"apparatuses":[84],"attacker.":[87],"Thus,":[88],"developers":[90],"must":[91],"be":[92],"aware":[93],"potential":[96],"for":[97],"side-channel":[98,124],"plan":[101],"appropriately.":[102],"In":[103],"paper,":[105],"we":[106,130,135,149,159],"propose":[107],"hashing":[113,118,184,199,202,211],"method":[114,185,212],"based":[115],"SHA3-512":[117],"algorithm":[119],"that":[120,181],"can":[121,170],"counteract":[122],"attacks.":[125],"To":[126],"achieve":[127],"our":[128,182],"goal,":[129],"use":[131,150],"three":[132],"techniques,":[133],"first,":[134],"shuffle":[136],"dataset,":[138],"salt,":[139],"process":[141],"selector":[142],"arrays":[143],"using":[144],"\"Fisher":[145],"Yates\"":[146],"algorithm.":[147],"Second,":[148],"volatile":[151],"memory":[152],"objects":[153,174],"hold":[155],"critical":[156,173],"data.":[157],"Finally,":[158],"apply":[160],"thread":[162,169],"locking":[163],"technique":[164],"where":[165],"at":[166,175],"most":[167],"one":[168],"access":[171],"time.":[177],"Experimental":[178],"results":[179],"show":[180],"proposed":[183,210],"more":[187],"secure":[188],"than":[189],"other":[190],"related":[191],"methods.":[192],"Although":[193],"there":[194],"trade-off":[197],"between":[198],"processing":[203,206],"time,":[204],"time":[207],"still":[214],"acceptable.":[215]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
