{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:35:22Z","timestamp":1761824122325,"version":"3.37.3"},"reference-count":20,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"DOI":"10.13039\/501100008865","name":"Xiamen University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008865","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fujian Key Laboratory of IC Design"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p> The Linux Unified Key Setup (LUKS) is the standard key management scheme for the full disk encryption solution implemented in Linux-based operating systems. It is composed of PBKDF2, an anti-forensic splitter, and a cipher. In this paper, a new FPGA-based high-throughput and pipelined implementation of LUKS is presented. We design a four-stage pipelined SHA-1 module without the multiplexers between piecewise function and a total eight-stage pipelined PBKDF2 by reusing two hash results. Besides, we implement ST box-based AES decipher with BRAM resources, which improves the performance and leaves most of the slice resources to PBKDF2 architecture. By using the above techniques, we instantiate a high throughput LUKS co-processor in a Xilinx Zynq 7030 FPGA. Compared to the previous work of implementation of LUKS PBKDF2 with AES on FPGA, our design shows better improvement of the speed and efficiency by 16 times and 8 times, respectively. Our speed of LUKS key recovery is even faster than Nvidia GPU GTX480. <\/jats:p>","DOI":"10.1142\/s0218126620500759","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T10:36:33Z","timestamp":1559817393000},"page":"2050075","source":"Crossref","is-referenced-by-count":3,"title":["A High Throughput and Pipelined Implementation of the LUKS on FPGA"],"prefix":"10.1142","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7469-7064","authenticated-orcid":false,"given":"Xiaochao","family":"Li","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering, Xiamen University, Siming District, Xiamen 361005, Fujian, China"}]},{"given":"Kongcheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Xiamen University, Siming District, Xiamen 361005, Fujian, China"}]},{"given":"Qi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Xiamen University, Siming District, Xiamen 361005, Fujian, China"}]},{"given":"Shaoyu","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Xiamen University, Siming District, Xiamen 361005, Fujian, China"}]},{"given":"Yihui","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Xiamen University, Siming District, Xiamen 361005, Fujian, China"}]},{"given":"Shen Yuong","family":"Wong","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Xiamen University Malaysia Sepang 43900, Selangor, Malaysia"}]}],"member":"219","published-online":{"date-parts":[[2019,7,15]]},"reference":[{"key":"S0218126620500759BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26823-1_16"},{"key":"S0218126620500759BIB003","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0202752"},{"key":"S0218126620500759BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00072"},{"key":"S0218126620500759BIB005","first-page":"823","volume-title":"Computational Science and Engineering","author":"FanJiao M.","year":"2017"},{"key":"S0218126620500759BIB006","first-page":"1","volume-title":"TENCON 2015 \u2014 2015 IEEE Region 10 Conf.","author":"Chen X.","year":"2015"},{"key":"S0218126620500759BIB007","first-page":"1","volume-title":"The 4th International Symposium on Research in Grey-Hat Hacking","author":"Demir L.","year":"2016"},{"key":"S0218126620500759BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0090"},{"key":"S0218126620500759BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.10.003"},{"key":"S0218126620500759BIB010","first-page":"1","volume-title":"Proceedings of the 8th USENIX Workshop on Offensive Technologies (WOOT 2014)","author":"Malvoni K.","year":"2014"},{"key":"S0218126620500759BIB011","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2014.7097841"},{"key":"S0218126620500759BIB012","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126616500328"},{"key":"S0218126620500759BIB013","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126615501054"},{"key":"S0218126620500759BIB014","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.1174"},{"key":"S0218126620500759BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.12.002"},{"key":"S0218126620500759BIB017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_18"},{"key":"S0218126620500759BIB018","doi-asserted-by":"publisher","DOI":"10.1587\/elex.12.20150371"},{"key":"S0218126620500759BIB019","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2016.7807963"},{"key":"S0218126620500759BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.11.015"},{"key":"S0218126620500759BIB025","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1138"},{"key":"S0218126620500759BIB026","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2868191"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126620500759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T09:09:48Z","timestamp":1590138588000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126620500759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,15]]},"references-count":20,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["10.1142\/S0218126620500759"],"URL":"https:\/\/doi.org\/10.1142\/s0218126620500759","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2019,7,15]]}}}