{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:00Z","timestamp":1746115860807,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_50","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"472-481","source":"Crossref","is-referenced-by-count":0,"title":["Hardware Acceleration for Cryptography Algorithms by Hotspot Detection"],"prefix":"10.1007","author":[{"given":"Jed Kao-Tung","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Gaudiot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"50_CR1","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal on Computing\u00a017(2), 373\u2013386 (1988)","journal-title":"SIAM Journal on Computing"},{"key":"50_CR2","unstructured":"Rijmen, V.: Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, K.U.Leuven (October 1997)"},{"key":"50_CR3","unstructured":"NIST (National Institute of Standards and Technology), \u201cAdvanced Encryption Standard (AES) \u2013 FIPS Pub. 197 (November 2001)"},{"issue":"2","key":"50_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of ACM"},{"key":"50_CR5","unstructured":"Intel VTune, http:\/\/software.intel.com\/en-us\/intel-vtune\/"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Bielecki, W., Burak, D.: Parallelization Method of Encryption Algorithms. In: Advances in Information Processing and Protection, pp. 191\u2013204 (2008)","DOI":"10.1007\/978-0-387-73137-7_17"},{"key":"50_CR7","unstructured":"The eMips project, http:\/\/research.microsoft.com\/en-us\/projects\/emips\/default.aspx"},{"key":"50_CR8","unstructured":"Davies, D.W., Price, W.L.: Security for Computer Networks. Security for Computer Networks. Wiley (1989)"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The RC5 encryption algorithm. In: Proceedings of the 2nd Workshop on Fast Software Encryption, pp. 86\u201396. Springer (1995)","DOI":"10.1007\/3-540-60590-8_7"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm, Request for Comments (RFC1320). Internet Activities Board, Internet Privacy Task Force (1992)","DOI":"10.17487\/rfc1321"},{"key":"50_CR11","unstructured":"Lai, X.: On the Design and Security of Block Ciphers. Hartung-Gorre Verlag (1992)"},{"key":"50_CR12","unstructured":"FIPS 180-1. Secure hash standard, NIST, US Department of Commerce, Washington D.C. Springer (1996)"},{"key":"50_CR13","unstructured":"Counterpane Systems, http:\/\/www.counterpane.com"},{"key":"50_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"50_CR15","unstructured":"IEEE 1363: Standard Specifications for Public-Key Cryptography, http:\/\/grouper.ieee.org\/groups\/1363\/"},{"key":"50_CR16","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons (1996)"},{"key":"50_CR17","doi-asserted-by":"crossref","unstructured":"Hodjat, A.: Interfacing a high speed crypto accelerator to an embedded CPU. In: Proceedings of the 38th Asilomar Conference on Signals, Systems, and Computers, pp. 488\u2013492 (2004)","DOI":"10.1109\/ACSSC.2004.1399180"},{"key":"50_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74735-2_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"O. Harrison","year":"2007","unstructured":"Harrison, O., Waldron, J.: AES Encryption Implementation and Analysis on Commodity Graphics Processing Units. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 209\u2013226. Springer, Heidelberg (2007)"},{"key":"50_CR19","doi-asserted-by":"crossref","unstructured":"Mourad, O.-C., Lotfy, S.-M., Noureddine, M., Ahmed, B., Camel, T.: AES Embedded Hardware Implementation. In: Second NASA\/ESA Conference on Adaptive Hardware and Systems (AHS 2007), pp. 103\u2013109 (2002)","DOI":"10.1109\/AHS.2007.23"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Bertoni, G.M., Breveglieri, L., Roberto, F., Regazzoni, F.: Speeding up AES by extending a 32 bit processor instruction set. In: Proceedings of the IEEE 17th International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2006), pp. 275\u2013282 (2006)","DOI":"10.1109\/ASAP.2006.62"},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, S., Gu, Z., Li, X.-F., Gaudiot, J.-L.: Hardware-Assisted Middleware: Acceleration of Garbage Collection Operations. In: Proceedings of the 21st IEEE International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2010 (2010)","DOI":"10.1109\/ASAP.2010.5541011"},{"key":"50_CR22","unstructured":"Tang, J., Liu, S., Gu, Z., Liu, C., Gaudiot, J.-L.: Prefetching in Embedded Mobile Systems Can Be Energy-Efficient. Computer Architecture Letters (February 2011), http:\/\/doi.ieeecomputersociety.org\/10.1109\/L-CA.2011.2"},{"key":"50_CR23","unstructured":"Tang, J., Thanarungroj, P., Liu, C., Liu, S., Gu, Z., Gaudiot, J.-L.: Pinned OS\/Services: A Case Study of XML Parsing on Intel SCC. Journal of Computer Science and Technology (in press)"},{"key":"50_CR24","unstructured":"Tang, J., Liu, S., Liu, C., Gu, Z., Gaudiot, J.-L.: Acceleration of XML Parsing Through Prefetching. IEEE Transactions on Computers (in press)"},{"key":"50_CR25","doi-asserted-by":"crossref","unstructured":"Tang, J., Liu, S., Gu, Z., Li, X.-F., Gaudiot, J.-L.: Achieving Middleware Execution Efficiency: Hardware-Assisted Garbage Collection Operations. Journal of Supercomputing (November 2010), doi:10.1007\/s11227-010-0493-0","DOI":"10.1007\/s11227-010-0493-0"},{"key":"50_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-24403-2_22","volume-title":"Network and Parallel Computing","author":"J. Tang","year":"2011","unstructured":"Tang, J., Liu, S., Gu, Z., Liu, C., Gaudiot, J.-L.: Memory-Side Acceleration for XML Parsing. In: Altman, E., Shi, W. (eds.) NPC 2011. LNCS, vol.\u00a06985, pp. 277\u2013292. Springer, Heidelberg (2011)"},{"key":"50_CR27","doi-asserted-by":"crossref","unstructured":"Liu, S., Pittman, R.N., Forin, A., Gaudiot, J.-L.: Minimizing the Runtime Partial Reconfiguration Overheads in Reconfigurable Systems. Journal of Supercomputing (July 22, 2011), doi:10.1007\/s11227-011-0657-6","DOI":"10.1007\/s11227-011-0657-6"},{"key":"50_CR28","doi-asserted-by":"crossref","unstructured":"Chang, J.K.-T., Liu, C., Liu, S., Gaudiot, J.-L.: Workload Characterization of Cryptography Algorithms for Hardware Acceleration. In: Proceedings of the 2nd ACM International Conference on Performance Engineering (ICPE 2011), Karlsruhe, Germany, March 14-16 (2011)","DOI":"10.1145\/1958746.1958800"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:39:00Z","timestamp":1746002340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}