{"id":"https://openalex.org/W3015238260","doi":"https://doi.org/10.23919/icact48636.2020.9061457","title":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","display_name":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3015238260","doi":"https://doi.org/10.23919/icact48636.2020.9061457","mag":"3015238260"},"language":"en","primary_location":{"id":"doi:10.23919/icact48636.2020.9061457","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact48636.2020.9061457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042725826","display_name":"Ruizhen Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruizhen Wu","raw_affiliation_strings":["Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China","institution_ids":["https://openalex.org/I4210144143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100324524","display_name":"Xiaoyong Zhang","orcid":"https://orcid.org/0000-0002-9432-0149"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaoyong Zhang","raw_affiliation_strings":["Biren Technology Ltd, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Biren Technology Ltd, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100347518","display_name":"Mingming Wang","orcid":"https://orcid.org/0009-0008-3736-9051"},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingming Wang","raw_affiliation_strings":["Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China","institution_ids":["https://openalex.org/I4210144143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100403242","display_name":"Lin Wang","orcid":"https://orcid.org/0000-0003-2374-0725"},"institutions":[{"id":"https://openalex.org/I4210144143","display_name":"Inspur (China)","ror":"https://ror.org/0474p4r72","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210144143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Wang","raw_affiliation_strings":["Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China"],"affiliations":[{"raw_affiliation_string":"Inspur Electronic Information Industry Co.,Ltd, Xi'an, Shaanxi Province, China","institution_ids":["https://openalex.org/I4210144143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5042725826"],"corresponding_institution_ids":["https://openalex.org/I4210144143"],"apc_list":null,"apc_paid":null,"fwci":1.4054,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.7990913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1242","last_page":"1247"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7887380123138428},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7443016767501831},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.6851128935813904},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5749744772911072},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5237841010093689},{"id":"https://openalex.org/keywords/pipeline-transport","display_name":"Pipeline transport","score":0.5159602761268616},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.5070352554321289},{"id":"https://openalex.org/keywords/hardware-architecture","display_name":"Hardware architecture","score":0.4804263114929199},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4633757174015045},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.43836042284965515},{"id":"https://openalex.org/keywords/hardware-security-module","display_name":"Hardware security module","score":0.43430501222610474},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.43313878774642944},{"id":"https://openalex.org/keywords/critical-path-method","display_name":"Critical path method","score":0.41403695940971375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3574943542480469},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.18054449558258057},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14212918281555176},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.0992799699306488},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.091555655002594},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08761858940124512}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7887380123138428},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7443016767501831},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.6851128935813904},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5749744772911072},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5237841010093689},{"id":"https://openalex.org/C175309249","wikidata":"https://www.wikidata.org/wiki/Q725864","display_name":"Pipeline transport","level":2,"score":0.5159602761268616},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.5070352554321289},{"id":"https://openalex.org/C65232700","wikidata":"https://www.wikidata.org/wiki/Q5656403","display_name":"Hardware architecture","level":3,"score":0.4804263114929199},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4633757174015045},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.43836042284965515},{"id":"https://openalex.org/C39217717","wikidata":"https://www.wikidata.org/wiki/Q1432354","display_name":"Hardware security module","level":3,"score":0.43430501222610474},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.43313878774642944},{"id":"https://openalex.org/C115874739","wikidata":"https://www.wikidata.org/wiki/Q825377","display_name":"Critical path method","level":2,"score":0.41403695940971375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3574943542480469},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.18054449558258057},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14212918281555176},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0992799699306488},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.091555655002594},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08761858940124512},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact48636.2020.9061457","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact48636.2020.9061457","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1964789195","https://openalex.org/W1970866180","https://openalex.org/W2113189475","https://openalex.org/W2535035809","https://openalex.org/W2599628922","https://openalex.org/W2613376733","https://openalex.org/W2789829526","https://openalex.org/W2791294521","https://openalex.org/W2792648677","https://openalex.org/W2798540755","https://openalex.org/W2808733935","https://openalex.org/W2886316835","https://openalex.org/W4235629799","https://openalex.org/W4248175462","https://openalex.org/W6748759900"],"related_works":["https://openalex.org/W3011443213","https://openalex.org/W2165367082","https://openalex.org/W1972641423","https://openalex.org/W298517545","https://openalex.org/W4312291060","https://openalex.org/W3009157445","https://openalex.org/W4288754584","https://openalex.org/W128809540","https://openalex.org/W4240229238","https://openalex.org/W2133376923"],"abstract_inverted_index":{"The":[0,34,144],"SHA-256":[1,35,92,123,142,146,165],"algorithm":[2],"is":[3,21,38,77,124],"used":[4,97],"to":[5,15,48,67,85,98,186],"ensure":[6],"the":[7,50,55,100,104,110,115,131,163,189],"integrity":[8],"and":[9,32,62,82,113,152,159],"authenticity":[10],"of":[11,43,53,64,91,122,138,182,188],"data":[12],"in":[13,26,103,126],"order":[14,47],"achieve":[16],"a":[17,39,69,87],"good":[18],"security":[19],"thus":[20],"playing":[22],"an":[23,179],"important":[24],"role":[25],"various":[27],"applications,":[28],"such":[29],"as":[30],"e-transactions":[31],"bitcoins.":[33],"computation":[36,51,116,132],"capacity":[37,52,133],"main":[40],"research":[41],"direction":[42],"Hashing":[44],"Algorithm.":[45],"In":[46],"improve":[49],"hardware,":[54],"proposed":[56,145,164],"design":[57],"first":[58],"uses":[59],"pipeline":[60],"principle":[61],"circuitry":[63],"timing":[65,111],"prediction":[66],"find":[68],"most":[70],"efficient":[71],"architecture":[72,90,148],"for":[73],"implementation.":[74,143,191],"Then":[75],"it":[76],"optimized":[78],"with":[79,140,154,174],"hash":[80],"function":[81],"hardware":[83,89,147],"characteristics":[84],"give":[86],"high-performance":[88],"hash.":[93],"Three":[94],"pipelines":[95],"are":[96],"replace":[99],"critical":[101],"path":[102],"round":[105],"functions":[106],"which":[107],"can":[108,134,168],"shorten":[109],"path,":[112],"divide":[114],"chain":[117],"into":[118],"independent":[119],"steps.":[120],"Multi-computation":[121],"working":[125],"parallel":[127],"pipelines,":[128],"indicating":[129],"that":[130,139,187],"be":[135,169],"3":[136,172],"times":[137,173,184],"standard":[141,190],"has":[149],"been":[150],"implemented":[151],"synthesized":[153],"Intel":[155],"14nm":[156],"technology.":[157],"Simulation":[158],"synthesis":[160],"results":[161],"show":[162],"hashing":[166],"throughput":[167],"improved":[170],"by":[171],"50.7%":[175],"power":[176],"reduction,":[177],"at":[178],"area":[180],"cost":[181],"2.9":[183],"compared":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
