{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:37:46Z","timestamp":1774517866546,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ancs.2019.8901886","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:43:48Z","timestamp":1574689428000},"page":"1-6","source":"Crossref","is-referenced-by-count":41,"title":["Cryptographic Hashing in P4 Data Planes"],"prefix":"10.1109","author":[{"given":"Dominik","family":"Scholz","sequence":"first","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Andreas","family":"Oeldemann","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Fabien","family":"Geyer","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Sebastian","family":"Gallenm\u00fcller","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Henning","family":"Stubbe","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Thomas","family":"Wild","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Andreas","family":"Herkersdorf","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Germany"}]}],"member":"263","reference":[{"key":"ref30","article-title":"The Joy of Micro-C","author":"wray","year":"2014"},{"key":"ref10","article-title":"Dapper: Data Plane Performance Diagnosis of TCP","author":"ghasemi","year":"0","journal-title":"Proceedings of the Symposium on SDN Research (SOSR&#x2018;17)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3106989.3106998"},{"key":"ref12","author":"kucera","year":"2018","journal-title":"Seek and Push Detecting Large Traffic Aggregates in the Dataplane"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2018.8436963"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618500822"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2010.5655360"},{"key":"ref16","author":"hauser","year":"2019","journal-title":"P4-MACsec Dynamic Topology Monitoring and Data Layer Protection with MACsec in P4-SDN"},{"key":"ref17","author":"hauser","year":"2019","journal-title":"P4-IPsec Implementation of IPsec Gateways in P4 with SDN Control for Host-to-Site Scenarios"},{"key":"ref18","article-title":"Performance of Hashing-Based Schemes for Internet Load Balancing","author":"cao","year":"2000","journal-title":"IEEE INFOCOM 2000"},{"key":"ref19","article-title":"Denial of Service via Algorithmic Complexity Attacks","author":"crosby","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref28","article-title":"NFP-4000 Theory of Operation","year":"2016","journal-title":"Netronome Systems Inc Tech Rep"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref27","article-title":"Poly1305 git repository","year":"2016","journal-title":"Austin Appleby"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/3050220.3063772","article-title":"Heavy-Hitter Detection Entirely in the Data Plane","author":"sivaraman","year":"2017","journal-title":"Proceedings of the Symposium on SDN Research ser SOSR &#x2018;16"},{"key":"ref6","article-title":"A Comparative Experimental Study of Hash Functions Applied to Packet Sampling","author":"molina","year":"0","journal-title":"International Teletraffic Congress (ITC-19)"},{"key":"ref29","article-title":"The P4->NetFPGA Workflow for Line-Rate Packet Processing","author":"ibanez","year":"0","journal-title":"Proceedings of the 2019 ACM\/SIGDA International Symposium on Field-Programmable Gate Arrays"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.49"},{"key":"ref8","article-title":"A Hash Function for Hash Table Lookup","author":"jenkins","year":"1997"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384614"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.32"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2007.4567339"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38980-1_8","article-title":"BLAKE2: Simpler, Smaller, Fast as MD5","author":"aumasson","year":"2013","journal-title":"Applied Cryptography and Network Security"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-34931-7_28","article-title":"SipHash: A Fast Short-Input PRF","author":"aumasson","year":"2012","journal-title":"Progress in Cryptology - INDOCRYPT 2012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4987"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4270"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/11502760_3","article-title":"The Poly1305-AES Message-Authentication Code","author":"bernstein","year":"2005","journal-title":"Fast Software Encryption"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2959080"}],"event":{"name":"2019 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)","location":"Cambridge, UK","start":{"date-parts":[[2019,9,24]]},"end":{"date-parts":[[2019,9,25]]}},"container-title":["2019 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8891060\/8901868\/08901886.pdf?arnumber=8901886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:21:04Z","timestamp":1755800464000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8901886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ancs.2019.8901886","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}