{"id":"https://openalex.org/W4414869616","doi":"https://doi.org/10.62056/anxrudy6b","title":"Exploring SHA Instructions and Its Application to AES-based Schemes","display_name":"Exploring SHA Instructions and Its Application to AES-based Schemes","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4414869616","doi":"https://doi.org/10.62056/anxrudy6b"},"language":"en","primary_location":{"id":"doi:10.62056/anxrudy6b","is_oa":true,"landing_page_url":"https://doi.org/10.62056/anxrudy6b","pdf_url":"https://cic.iacr.org/p/2/3/28/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/2/3/28/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049710749","display_name":"Takuro Shiraya","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Takuro Shiraya","raw_affiliation_strings":["The University of Osaka"],"raw_orcid":"https://orcid.org/0000-0002-5275-335X","affiliations":[{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005140945","display_name":"Subhadeep Banik","orcid":null},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Subhadeep Banik","raw_affiliation_strings":["University of Lugano"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Lugano","institution_ids":["https://openalex.org/I57201433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109215055","display_name":"Ishikawa Tatsuya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tatsuya Ishikawa","raw_affiliation_strings":["The University of Osaka"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029704779","display_name":"Ryoma Ito","orcid":"https://orcid.org/0000-0002-4929-8974"},"institutions":[{"id":"https://openalex.org/I90023481","display_name":"National Institute of Information and Communications Technology","ror":"https://ror.org/016bgq349","country_code":"JP","type":"facility","lineage":["https://openalex.org/I90023481"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryoma Ito","raw_affiliation_strings":["National Institute of Information and Communications Technology","The University of Osaka"],"raw_orcid":"https://orcid.org/0000-0002-4929-8974","affiliations":[{"raw_affiliation_string":"National Institute of Information and Communications Technology","institution_ids":["https://openalex.org/I90023481"]},{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054077729","display_name":"Mostafizar Rahman","orcid":"https://orcid.org/0000-0003-0934-4769"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["Kyoto University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Kyoto University","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008561889","display_name":"Kosei Sakamoto","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159266","display_name":"Mitsubishi Electric (United States)","ror":"https://ror.org/053jnhe44","country_code":"US","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125","https://openalex.org/I4210159266"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kosei Sakamoto","raw_affiliation_strings":["Mitsubishi Electric Corporation","The University of Osaka"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Mitsubishi Electric Corporation","institution_ids":["https://openalex.org/I4210159266"]},{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030417315","display_name":"Atsushi Tanaka","orcid":"https://orcid.org/0000-0002-2584-8871"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Atsushi Tanaka","raw_affiliation_strings":["The University of Osaka"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022193556","display_name":"Shion Utsumi","orcid":"https://orcid.org/0009-0004-8136-0135"},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shion Utsumi","raw_affiliation_strings":["University of Hyogo"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Hyogo","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056480052","display_name":"Takanori Isobe","orcid":"https://orcid.org/0000-0003-4253-5567"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takanori Isobe","raw_affiliation_strings":["The University of Osaka"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"The University of Osaka","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5049710749"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32273588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5839999914169312},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5748999714851379},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5135999917984009},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35440000891685486},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.32519999146461487},{"id":"https://openalex.org/keywords/aes-implementations","display_name":"AES implementations","score":0.2992999851703644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.828000009059906},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5839999914169312},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5748999714851379},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5135999917984009},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35440000891685486},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3490000069141388},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C46331935","wikidata":"https://www.wikidata.org/wiki/Q4651362","display_name":"AES implementations","level":4,"score":0.2992999851703644},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28859999775886536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2793000042438507},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.27480000257492065},{"id":"https://openalex.org/C157172786","wikidata":"https://www.wikidata.org/wiki/Q185235","display_name":"MD5","level":3,"score":0.27390000224113464},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.2630000114440918},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/anxrudy6b","is_oa":true,"landing_page_url":"https://doi.org/10.62056/anxrudy6b","pdf_url":"https://cic.iacr.org/p/2/3/28/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/anxrudy6b","is_oa":true,"landing_page_url":"https://doi.org/10.62056/anxrudy6b","pdf_url":"https://cic.iacr.org/p/2/3/28/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309030","display_name":"Small Business Innovation Research","ror":"https://ror.org/015t55b95"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414869616.pdf","grobid_xml":"https://content.openalex.org/works/W4414869616.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W41296744","https://openalex.org/W1530387410","https://openalex.org/W1596861772","https://openalex.org/W1774261413","https://openalex.org/W1814882979","https://openalex.org/W1883566054","https://openalex.org/W1963965124","https://openalex.org/W2116204329","https://openalex.org/W2132250906","https://openalex.org/W2143462372","https://openalex.org/W2152881483","https://openalex.org/W2168543008","https://openalex.org/W2211781628","https://openalex.org/W2406134143","https://openalex.org/W2407639567","https://openalex.org/W2538373418","https://openalex.org/W2554299582","https://openalex.org/W2616896838","https://openalex.org/W2740612841","https://openalex.org/W2750851991","https://openalex.org/W2883822506","https://openalex.org/W2901745692","https://openalex.org/W2969187202","https://openalex.org/W3003420019","https://openalex.org/W3108438139","https://openalex.org/W3146780285","https://openalex.org/W3168092484","https://openalex.org/W4225883647","https://openalex.org/W4285152302","https://openalex.org/W4296960192","https://openalex.org/W4312547397","https://openalex.org/W4318220632","https://openalex.org/W4323320112","https://openalex.org/W4365807751","https://openalex.org/W4366307857","https://openalex.org/W4380634836","https://openalex.org/W4389857034","https://openalex.org/W4392358714","https://openalex.org/W4392742439","https://openalex.org/W4402522079","https://openalex.org/W4402937645","https://openalex.org/W4403175055","https://openalex.org/W4405134424","https://openalex.org/W4405329202"],"related_works":[],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,66,94],"explore":[4],"the":[5,20,43,72],"potential":[6],"of":[7,48,77,97,104,119],"improving":[8],"AES-based":[9,73,101],"schemes":[10,103,129],"by":[11,87],"integrating":[12],"SHA":[13,24,57,68,98],"instructions":[14,25,33,99],"alongside":[15],"AES":[16,32,61],"instructions,":[17],"starting":[18],"from":[19],"key":[21],"observation":[22],"that":[23,127],"can":[26,130],"be":[27],"executed":[28],"in":[29,82],"parallel":[30,41],"with":[31,60,90],"on":[34],"modern":[35],"processors.":[36],"We":[37,125],"investigate":[38],"conditions":[39],"for":[40,55,135],"execution,":[42],"invocation":[44],"ratio,":[45],"and":[46,51,79],"overhead":[47],"type":[49],"conversions,":[50],"then":[52],"provide":[53],"guidelines":[54],"efficient":[56],"instruction":[58],"usage":[59],"instructions.":[62],"Applying":[63],"these":[64],"guidelines,":[65],"integrate":[67],"round":[69],"functions":[70,76],"into":[71],"short-input":[74],"hash":[75],"Simpira":[78],"Areion,":[80],"resulting":[81],"approximately":[83],"50%":[84],"faster":[85],"performance":[86],"achieving":[88],"security":[89,134],"fewer":[91],"iterations.":[92],"Besides,":[93],"apply":[95],"integration":[96],"to":[100,116],"AEAD":[102],"AEGIS-128L,":[105],"which":[106],"supports":[107],"a":[108],"256-bit":[109,122,132],"tag":[110],"but":[111],"has":[112],"recently":[113],"been":[114],"shown":[115],"fall":[117],"short":[118],"providing":[120],"full":[121],"forgery":[123,133],"security.":[124],"demonstrate":[126],"hybrid":[128],"achieve":[131],"AEGIS-128L":[136],"while":[137],"preserving":[138],"performance.":[139]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
