{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:38:27Z","timestamp":1770845907327,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11342903","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"7358-7364","source":"Crossref","is-referenced-by-count":0,"title":["ScalaCrypt: A Secure Multi-Core Parallel System Architecture for High-Throughput Encrypted Data Transmission"],"prefix":"10.1109","author":[{"given":"Anbang","family":"Li","sequence":"first","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"}]},{"given":"Yixin","family":"Qin","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"}]},{"given":"Xiaojuan","family":"Meng","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"}]},{"given":"Yunbo","family":"Yan","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"}]},{"given":"Jiaxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Jinan Institute of Supercomputing Technology,Jinan,P. R. China,250103"}]},{"given":"Meng","family":"Guo","sequence":"additional","affiliation":[{"name":"Qilu University of Technology (Shandong Academy of Sciences),Shandong Computer Science Center (National Supercomputing Center in Jinan),Key Laboratory of Computing Power Network and Information Security, Ministry of Education,Jinan,P. R. China,250013"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-021-01959-z"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0275-7_29"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14010088"},{"key":"ref4","first-page":"4277","article-title":"{ReDMArk}: Bypassing {RDMA} security mechanisms","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Rothenberger"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34647-8_10"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.58"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13214325"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/app15073928"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2020.102621"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503260"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LPE.2003.1231830"},{"key":"ref12","first-page":"437","article-title":"Design guidelines for high performance {RDMA} systems","volume-title":"2016 USENIX annual technical conference (USENIX ATC 16)","author":"Kalia"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34647-8_10"},{"key":"ref14","first-page":"15","article-title":"Hostping: Diagnosing intra-host network bottlenecks in {RDMA} servers","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Liu"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13244900"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/info16040298"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14030466"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3193827"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS55109.2022.00026"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-024-00923-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.197"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(10)70006-4"},{"key":"ref23","first-page":"0278","article-title":"The galois\/counter mode of operation (gcm)","volume":"20","author":"McGrew","year":"2004","journal-title":"submission to NIST Modes of Operation Process"},{"key":"ref24","author":"Dworkin","year":"2007","journal-title":"Sp 800-38d. recommendation for block cipher modes of operation: Galois\/counter mode (gcm) and gmac"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4106"},{"key":"ref26","article-title":"Study of the ieee standard 1619.1: Authenticated encryption with length expansion for storage devices","volume-title":"Master\u2019s thesis","author":"Gonzalez Torrego","year":"2009"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2017.9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-67462-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpc.2024.109455"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2024.114878"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22137-8_35"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2022.04.004"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11342903.pdf?arnumber=11342903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:52:02Z","timestamp":1770843122000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11342903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11342903","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}