{"id":"https://openalex.org/W3089462693","doi":"https://doi.org/10.1145/3311724","title":"Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques","display_name":"Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques","publication_year":2020,"publication_date":"2020-09-28","ids":{"openalex":"https://openalex.org/W3089462693","doi":"https://doi.org/10.1145/3311724","mag":"3089462693"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3311724","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"review","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046267593","display_name":"Zeyad A. Al-Odat","orcid":"https://orcid.org/0000-0001-9359-8838"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zeyad A. Al-Odat","raw_affiliation_strings":["North Dakota State University, Tafila, Jordan, USA"],"affiliations":[{"raw_affiliation_string":"North Dakota State University, Tafila, Jordan, USA","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000409923","display_name":"Mazhar Ali","orcid":"https://orcid.org/0000-0003-2351-6520"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mazhar Ali","raw_affiliation_strings":["COMSATS University Islamabad, Islamabad Campus, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS University Islamabad, Islamabad Campus, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059175047","display_name":"Assad Abbas","orcid":"https://orcid.org/0000-0002-4233-053X"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Assad Abbas","raw_affiliation_strings":["COMSATS University Islamabad, Islamabad Campus, Pakistan"],"affiliations":[{"raw_affiliation_string":"COMSATS University Islamabad, Islamabad Campus, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003909640","display_name":"Samee U. Khan","orcid":"https://orcid.org/0000-0001-5640-4942"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samee U. Khan","raw_affiliation_strings":["Mississippi State University, Starkville, MS"],"affiliations":[{"raw_affiliation_string":"Mississippi State University, Starkville, MS","institution_ids":["https://openalex.org/I99041443"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.209,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.997429,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":94},"biblio":{"volume":"53","issue":"5","first_page":"1","last_page":"36"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.6154506},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness","score":0.4414889}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85910624},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8141621},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.7518877},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7127077},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6963817},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.6154506},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5025635},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.47120494},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.46616274},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4414889},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.4389322},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36807892},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.32973498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18368155},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3311724","pdf_url":null,"source":{"id":"https://openalex.org/S157921468","display_name":"ACM Computing Surveys","issn_l":"0360-0300","issn":["0360-0300","1557-7341"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":59,"referenced_works":["https://openalex.org/W1279320161","https://openalex.org/W154446972","https://openalex.org/W1562434331","https://openalex.org/W1565849499","https://openalex.org/W1605172130","https://openalex.org/W1611224305","https://openalex.org/W1656731780","https://openalex.org/W184004257","https://openalex.org/W1906296398","https://openalex.org/W1952995354","https://openalex.org/W1967781821","https://openalex.org/W1970866180","https://openalex.org/W1973766005","https://openalex.org/W1975505618","https://openalex.org/W1996901123","https://openalex.org/W2001529179","https://openalex.org/W2010627065","https://openalex.org/W2010639041","https://openalex.org/W2017469192","https://openalex.org/W2019180878","https://openalex.org/W2027427541","https://openalex.org/W2045192830","https://openalex.org/W2066672460","https://openalex.org/W2090150216","https://openalex.org/W2098875331","https://openalex.org/W2103239853","https://openalex.org/W2107177577","https://openalex.org/W2113189475","https://openalex.org/W2126255765","https://openalex.org/W2141569810","https://openalex.org/W2179955370","https://openalex.org/W2181826969","https://openalex.org/W2183606400","https://openalex.org/W2245856381","https://openalex.org/W2260073882","https://openalex.org/W2293587468","https://openalex.org/W2326352923","https://openalex.org/W2335670735","https://openalex.org/W2338344188","https://openalex.org/W2395555281","https://openalex.org/W2408169318","https://openalex.org/W2460566093","https://openalex.org/W2527572152","https://openalex.org/W2534764200","https://openalex.org/W2579178582","https://openalex.org/W2587814760","https://openalex.org/W2595347423","https://openalex.org/W2604745103","https://openalex.org/W2605953901","https://openalex.org/W2608203422","https://openalex.org/W2691199017","https://openalex.org/W2758854450","https://openalex.org/W2763802695","https://openalex.org/W2779625209","https://openalex.org/W2786194669","https://openalex.org/W2843942314","https://openalex.org/W2916086000","https://openalex.org/W3035554263","https://openalex.org/W4253200933"],"related_works":["https://openalex.org/W4251738463","https://openalex.org/W4210289650","https://openalex.org/W3082687455","https://openalex.org/W3006509171","https://openalex.org/W2976219018","https://openalex.org/W2950588517","https://openalex.org/W2768195082","https://openalex.org/W2121212096","https://openalex.org/W2047181319","https://openalex.org/W1554022419"],"abstract_inverted_index":{"Cryptographic":[0],"hash":[1,55,71,123,140],"functions":[2,17],"are":[3,18,57,178],"widely":[4],"used":[5],"primitives":[6],"with":[7,23],"a":[8,82,105,110,185,201],"purpose":[9],"to":[10,26,132,153],"ensure":[11],"the":[12,40,64,70,74,85,117,122,133,138,154,159,162,169,181,189,194],"integrity":[13],"of":[14,43,77,112,147,156,166,168],"data.":[15],"Hash":[16],"also":[19],"utilized":[20],"in":[21,200],"conjunction":[22],"digital":[24],"signatures":[25],"provide":[27],"authentication":[28],"and":[29,45,51,60,94,150,164,172,196],"non-repudiation":[30],"services.":[31],"The":[32,53,142],"SHA":[33],"has":[34],"been":[35],"developed":[36],"over":[37],"time":[38],"by":[39],"National":[41],"Institute":[42],"Standards":[44],"Technology":[46],"for":[47,68,120,137],"security,":[48],"optimal":[49],"performance,":[50,93],"robustness.":[52],"best-known":[54],"standards":[56],"SHA-1,":[58],"SHA-2,":[59],"SHA-3.":[61],"Security":[62],"is":[63,104,130],"most":[65],"notable":[66],"criterion":[67],"evaluating":[69],"functions.":[72],"However,":[73],"hardware":[75,107],"performance":[76,155],"an":[78],"algorithm":[79],"serves":[80],"as":[81],"tiebreaker":[83],"among":[84],"contestants":[86],"when":[87],"all":[88],"other":[89],"parameters":[90],"(security,":[91],"software":[92],"flexibility)":[95],"have":[96],"equal":[97],"strength.":[98],"Field":[99],"Programmable":[100],"Gateway":[101],"Array":[102],"(FPGA)":[103],"reconfigurable":[106],"that":[108,180],"supports":[109],"variety":[111],"design":[113],"options,":[114],"making":[115],"it":[116],"best":[118],"choice":[119],"implementing":[121],"standards.":[124,141],"In":[125],"this":[126],"survey,":[127],"particular":[128],"attention":[129],"devoted":[131],"FPGA":[134,197],"optimization":[135,148,170,198],"techniques":[136,149,199],"three":[139],"study":[143,182],"covers":[144],"several":[145],"types":[146],"their":[151,173],"contributions":[152],"FPGAs.":[157],"Moreover,":[158],"article":[160],"highlights":[161],"strengths":[163],"weaknesses":[165],"each":[167],"methods":[171],"influence":[174],"on":[175,193],"performance.":[176],"We":[177],"optimistic":[179],"will":[183],"be":[184],"useful":[186],"resource":[187],"encompassing":[188],"efforts":[190],"carried":[191],"out":[192],"SHAs":[195],"consolidated":[202],"form.":[203]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3089462693","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2}],"updated_date":"2024-12-09T23:22:02.665160","created_date":"2020-10-08"}