{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:57:08Z","timestamp":1771851428452,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T00:00:00Z","timestamp":1655596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T00:00:00Z","timestamp":1655596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001863","name":"New Energy and Industrial Technology Development Organization","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001863","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,19]]},"DOI":"10.1109\/newcas52662.2022.9842174","type":"proceedings-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T19:33:34Z","timestamp":1659728014000},"page":"30-34","source":"Crossref","is-referenced-by-count":11,"title":["High-performance Multi-function HMAC-SHA2 FPGA Implementation"],"prefix":"10.1109","author":[{"given":"Binh","family":"Kieu-Do-Nguyen","sequence":"first","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585"}]},{"given":"Trong-Thuc","family":"Hoang","sequence":"additional","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585"}]},{"given":"Akira","family":"Tsukamoto","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064"}]},{"given":"Kuniyasu","family":"Suzaki","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology (AIST),Tokyo,Japan,135-0064"}]},{"given":"Cong-Kha","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Electro-Communications (UEC),Tokyo,Japan,182-8585"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Test vectors for SHA-1, SHA-2 and SHA-3","year":"2020"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4231"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3619"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ITICT.2005.1609672"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.17"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417118"},{"key":"ref36","first-page":"1090","article-title":"Integrating SDN-Enabled Wireless Sensor Networks Into the Internet","author":"\u00e7eken","year":"2019","journal-title":"IEEE Intn Conf on Inte Data Acquisition and Adv Computing Sys Tech and Appl (IDAACS)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2018.8460125"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISC246665.2019.9071788"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICITBS.2015.148"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23321-0_89"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-005-0086-5"},{"key":"ref12","first-page":"240","article-title":"Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing","author":"kim","year":"2008","journal-title":"Information Security and Cryptology (INSCRYPT 2007)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISC246665.2019.9071788"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2892003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC49090.2020.9243340"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366363"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2006.68"},{"key":"ref18","first-page":"456","article-title":"An HMAC processor with integrated SHA-1 and MD5 algorithms","author":"wang","year":"2004","journal-title":"Proc Asia and South Pacific Design Automation Conf (ASP-DAC)"},{"key":"ref19","first-page":"282","article-title":"Memory optimization of HMAC\/SHA-2 encryption","author":"rubayya","year":"2015","journal-title":"Int Conf on Circ and Syst for Comm (ICCSC)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000450"},{"key":"ref4","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"hugo","year":"1997","journal-title":"RFC 2104"},{"key":"ref27","first-page":"324","article-title":"A 1 Gbit\/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512","author":"roar","year":"2004","journal-title":"Topics in Cryptology (CT-RSA)"},{"key":"ref3","article-title":"The Keyed-Hash Message Authentication Code (HMAC)","year":"2008","journal-title":"FIPS 198-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAR-SSI.2011.5931396"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2006.70"},{"key":"ref5","article-title":"The Transport Layer Security (TLS) Protocol Version 1.2","author":"eric","year":"2008","journal-title":"RFC 5246"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.154"},{"key":"ref7","article-title":"Security Architecture for the Internet Protocol","author":"karen","year":"2005","journal-title":"RFC 4301"},{"key":"ref2","first-page":"1","article-title":"Security threats in IoT","author":"octavia","year":"2020","journal-title":"9th Int Symp on Electron and Telecom (ISETC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2878697"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065082"},{"key":"ref20","first-page":"121","article-title":"Cryptanalysis on HMAC\/NMAC-MD5 and MD5-MAC","author":"xiaoyun wang","year":"2009","journal-title":"Advances in Cryptology (EUROCRYPT)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1321"},{"key":"ref21","article-title":"Secure Hash Standard (SHS)","year":"2008","journal-title":"FIPS 180-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_4"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2006.09.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_19"},{"key":"ref41","article-title":"FPGA Implementation of an HMAC Processor based on the SHA-2 Family of Hash Functions","author":"juliato","year":"2011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2133352.2133354"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.264"},{"key":"ref43","first-page":"29","article-title":"Three-stage pipeline implementation for SHA2 using data forwarding","author":"hoang","year":"2008","journal-title":"Proc Int Field Programmable Logic Appl (FPL)"}],"event":{"name":"2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)","location":"Quebec City, QC, Canada","start":{"date-parts":[[2022,6,19]]},"end":{"date-parts":[[2022,6,22]]}},"container-title":["2022 20th IEEE Interregional NEWCAS Conference (NEWCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9841660\/9841947\/09842174.pdf?arnumber=9842174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T02:35:55Z","timestamp":1660617355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9842174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,19]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/newcas52662.2022.9842174","relation":{},"subject":[],"published":{"date-parts":[[2022,6,19]]}}}