{"id":"https://openalex.org/W3008766599","doi":"https://doi.org/10.1145/3373087.3375325","title":"Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms","display_name":"Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms","publication_year":2020,"publication_date":"2020-02-23","ids":{"openalex":"https://openalex.org/W3008766599","doi":"https://doi.org/10.1145/3373087.3375325","mag":"3008766599"},"language":"en","primary_location":{"id":"doi:10.1145/3373087.3375325","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3373087.3375325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101913132","display_name":"Changsu Kim","orcid":"https://orcid.org/0000-0001-6688-9322"},"institutions":[{"id":"https://openalex.org/I123900574","display_name":"Pohang University of Science and Technology","ror":"https://ror.org/04xysgw12","country_code":"KR","type":"education","lineage":["https://openalex.org/I123900574"]},{"id":"https://openalex.org/I2799891827","display_name":"Korea Post","ror":"https://ror.org/00p45d091","country_code":"KR","type":"government","lineage":["https://openalex.org/I2799891827","https://openalex.org/I2801339556","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Changsu Kim","raw_affiliation_strings":["POSTECH, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"POSTECH, Seoul, South Korea","institution_ids":["https://openalex.org/I2799891827","https://openalex.org/I123900574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100459260","display_name":"Yongwoo Lee","orcid":"https://orcid.org/0000-0002-7458-8885"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yongwoo Lee","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005351532","display_name":"Shinnung Jeong","orcid":"https://orcid.org/0000-0001-8884-3851"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Shinnung Jeong","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101664863","display_name":"Wen Wang","orcid":"https://orcid.org/0000-0002-3019-2336"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wen Wang","raw_affiliation_strings":["Yale University, New Haven, CT, USA"],"affiliations":[{"raw_affiliation_string":"Yale University, New Haven, CT, USA","institution_ids":["https://openalex.org/I32971472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044387689","display_name":"Jakub Szefer","orcid":"https://orcid.org/0000-0001-9721-3640"},"institutions":[{"id":"https://openalex.org/I32971472","display_name":"Yale University","ror":"https://ror.org/03v76x132","country_code":"US","type":"education","lineage":["https://openalex.org/I32971472"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jakub Szefer","raw_affiliation_strings":["Yale University, New Haven, CT, USA"],"affiliations":[{"raw_affiliation_string":"Yale University, New Haven, CT, USA","institution_ids":["https://openalex.org/I32971472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100722345","display_name":"Hanjun Kim","orcid":"https://orcid.org/0000-0002-0762-7901"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hanjun Kim","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101913132"],"corresponding_institution_ids":["https://openalex.org/I123900574","https://openalex.org/I2799891827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02053623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8547807335853577},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.6092404127120972},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5705260038375854},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5165180563926697},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4973349869251251},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4851763844490051},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.4467311203479767},{"id":"https://openalex.org/keywords/reconfigurable-computing","display_name":"Reconfigurable computing","score":0.42516839504241943},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39193764328956604},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3893404006958008},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.37999069690704346},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3667086362838745},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32450103759765625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09654161334037781},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08747100830078125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8547807335853577},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.6092404127120972},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5705260038375854},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5165180563926697},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4973349869251251},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4851763844490051},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.4467311203479767},{"id":"https://openalex.org/C142962650","wikidata":"https://www.wikidata.org/wiki/Q240838","display_name":"Reconfigurable computing","level":3,"score":0.42516839504241943},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39193764328956604},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3893404006958008},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.37999069690704346},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3667086362838745},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32450103759765625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09654161334037781},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08747100830078125},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3373087.3375325","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3373087.3375325","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4318899699","https://openalex.org/W1612076744","https://openalex.org/W2152074211","https://openalex.org/W2126857316","https://openalex.org/W2129019972","https://openalex.org/W3164085601","https://openalex.org/W1522032972","https://openalex.org/W2139962137","https://openalex.org/W2113308450","https://openalex.org/W2340647897"],"abstract_inverted_index":{"With":[0],"the":[1,17,49,65,73,92,103,118,163,168,184],"technical":[2],"advance":[3],"of":[4,16,108,117,158,171],"quantum":[5,35],"computers":[6],"that":[7],"can":[8,45,78],"solve":[9],"intractable":[10],"problems":[11],"for":[12,102],"conventional":[13],"computers,":[14,36],"many":[15],"currently":[18],"used":[19],"public-key":[20],"cryptosystems":[21],"become":[22],"vulnerable.":[23],"Recently":[24],"proposed":[25,132,185],"post-quantum":[26],"cryptography":[27],"(PQC)":[28],"is":[29],"secure":[30],"against":[31],"both":[32],"classical":[33],"and":[34,59,110,121,147,173],"but":[37],"existing":[38],"embedded":[39,68],"systems":[40,69],"such":[41],"as":[42],"smart":[43],"card":[44],"not":[46],"easily":[47],"support":[48],"PQC":[50,66,74,104,119,160,176],"algorithms":[51,105,120,161],"due":[52],"to":[53,71,80,180],"their":[54],"much":[55],"larger":[56],"key":[57],"sizes":[58],"more":[60],"complex":[61],"arithmetics.":[62],"To":[63],"accelerate":[64],"algorithms,":[67],"have":[70],"embed":[72],"hardware":[75,82,100,139,156],"blocks,":[76],"which":[77],"lead":[79],"huge":[81],"design":[83,93,101,140,157],"costs.":[84],"Although":[85],"High-Level":[86],"Synthesis":[87],"(HLS)":[88],"helps":[89],"significantly":[90],"reduce":[91],"costs,":[94],"current":[95],"HLS":[96,182],"frameworks":[97],"produce":[98],"inefficient":[99],"in":[106,129,145,162],"terms":[107],"area":[109],"performance.":[111],"This":[112,152],"work":[113,153],"analyzes":[114],"common":[115],"features":[116],"proposes":[122],"a":[123],"new":[124],"pipeline-aware":[125],"logic":[126,137],"deduplication":[127],"method":[128,133,186],"HLS.":[130],"The":[131],"shares":[134],"commonly":[135],"invoked":[136],"across":[138],"while":[141],"considering":[142],"load":[143],"balancing":[144],"pipeline":[146],"resolving":[148],"dynamic":[149],"memory":[150],"accesses.":[151],"implements":[154],"FPGA":[155],"seven":[159],"round":[164],"2":[165],"candidates":[166],"from":[167],"National":[169],"Institute":[170],"Standards":[172],"Technology":[174],"(NIST)":[175],"standardization":[177],"process.":[178],"Compared":[179],"commercial":[181],"framework,":[183],"achieves":[187],"an":[188],"area-delay-product":[189],"reduction":[190],"by":[191],"34.5%.":[192]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
