{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:11Z","timestamp":1750307291917,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/1958746.1958800","type":"proceedings-article","created":{"date-parts":[[2011,3,15]],"date-time":"2011-03-15T16:37:50Z","timestamp":1300207070000},"page":"381-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Workload characterization of cryptography algorithms for hardware acceleration"],"prefix":"10.1145","author":[{"given":"Jed Kao-Tung","family":"Chang","sequence":"first","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Chen","family":"Liu","sequence":"additional","affiliation":[{"name":"Florida International University"}]},{"given":"Shaoshan","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Corp"}]},{"given":"Jean-Luc","family":"Gaudiot","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NIST \"Data Encryption Standard (DES) - FIPS Pub. 46 \" January 1977.  NIST \"Data Encryption Standard (DES) - FIPS Pub. 46 \" January 1977."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2004.1399180"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2004.1303110"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379238"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2009.248"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552055_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2006.62"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_15"},{"key":"e_1_3_2_1_10_1","volume-title":"Second AES Candidate Conference","author":"Clapp Craig S. K.","year":"1999","unstructured":"Craig S. K. Clapp , \" Instruction Level Parallelism in AES Candidates\" , Second AES Candidate Conference , Rome , March 1999 . Craig S. K. Clapp, \"Instruction Level Parallelism in AES Candidates\", Second AES Candidate Conference, Rome, March 1999."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 5th annual IEEE workshop on Workload Characterization (WWC-5)","author":"Fiskiran A. Murat","year":"2002","unstructured":"A. Murat Fiskiran , Ruby B. Lee , \" Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments \", in Proceedings of the 5th annual IEEE workshop on Workload Characterization (WWC-5) , 2002 . A. Murat Fiskiran, Ruby B. Lee, \"Workload Characterization of Elliptic Curve Cryptography and other Network Security Algorithms for Constrained Environments\", in Proceedings of the 5th annual IEEE workshop on Workload Characterization (WWC-5), 2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AHS.2007.23"},{"issue":"9","key":"e_1_3_2_1_13_1","first-page":"265","article-title":"Hardware Implementation of AES Algorithm","volume":"56","author":"Mali Marko","year":"2005","unstructured":"Marko Mali , Franc Novak , and Anton Biasizzo , \" Hardware Implementation of AES Algorithm \", Journal of Electrical Engineering, VOL. 56 , No. 9-10 , 2005 , pp. 265 - 269 . Marko Mali, Franc Novak, and Anton Biasizzo, \"Hardware Implementation of AES Algorithm\", Journal of Electrical Engineering, VOL. 56, No. 9-10, 2005, pp. 265-269.","journal-title":"Journal of Electrical Engineering, VOL."},{"key":"e_1_3_2_1_14_1","first-page":"191","article-title":"Parallelization Method of Encryption Algorithms","author":"Bielecki Wnodzimierz","year":"2008","unstructured":"Wnodzimierz Bielecki and Dariusz Burak , \" Parallelization Method of Encryption Algorithms \", Advances in Information Processing and Protection , 2008 , pp. 191 - 204 . Wnodzimierz Bielecki and Dariusz Burak, \"Parallelization Method of Encryption Algorithms\", Advances in Information Processing and Protection, 2008, pp. 191-204.","journal-title":"Advances in Information Processing and Protection"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24685-5_108"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"key":"e_1_3_2_1_17_1","unstructured":"x86 Assembly Language Reference Manual Sun Microsystems. http:\/\/dlc.sun.com\/pdf\/817-5477\/817- 5477.pdf.  x86 Assembly Language Reference Manual Sun Microsystems. http:\/\/dlc.sun.com\/pdf\/817-5477\/817- 5477.pdf."},{"key":"e_1_3_2_1_18_1","unstructured":"VTune: Intel performance analyzer http:\/\/software.intel.com\/en-us\/intel-vtune\/.  VTune: Intel performance analyzer http:\/\/software.intel.com\/en-us\/intel-vtune\/."},{"key":"e_1_3_2_1_19_1","unstructured":"PIN\n  : a dynamic binary instrumentation tool. http:\/\/software.intel.com\/en-us\/intel-vtune\/.  PIN: a dynamic binary instrumentation tool. http:\/\/software.intel.com\/en-us\/intel-vtune\/."},{"key":"e_1_3_2_1_20_1","volume-title":"No Starch Press","author":"Huang A.","year":"2003","unstructured":"A. Huang . Hacking the Xbox: An introduction to Reverse Engineering . No Starch Press , San Francisco, CA , 2003 . A. Huang. Hacking the Xbox: An introduction to Reverse Engineering. No Starch Press, San Francisco, CA, 2003."},{"key":"e_1_3_2_1_21_1","unstructured":"PGP (Pretty Good Privacy) PGP Corp. http:\/\/www.pgp.com\/.  PGP (Pretty Good Privacy) PGP Corp. http:\/\/www.pgp.com\/."},{"key":"e_1_3_2_1_22_1","volume-title":"Security for Computer Networks","author":"Davies D.W.","year":"1989","unstructured":"D.W. Davies and W.L. Price . Security for Computer Networks . Wiley , 1989 . D.W. Davies and W.L. Price. Security for Computer Networks. Wiley, 1989."},{"key":"e_1_3_2_1_23_1","unstructured":"NIST (National Institute of Standards and Technology) \"Advanced Encryption Standard (AES) - FIPS Pub. 197 \" November 2001.  NIST (National Institute of Standards and Technology) \"Advanced Encryption Standard (AES) - FIPS Pub. 197 \" November 2001."},{"key":"e_1_3_2_1_24_1","unstructured":"Counterpane Systems. http:\/\/www.counterpane.com. Counterpane Systems . http:\/\/www.counterpane.com."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60590-8_7"},{"key":"e_1_3_2_1_26_1","volume-title":"Internet Activities Board","author":"Rivest R.L.","year":"1992","unstructured":"R.L. Rivest . The MD5 message-digest algorithm , Request for Comments (RFC1320) , Internet Activities Board , Internet Privacy Task Force , 1992 . R.L. Rivest. The MD5 message-digest algorithm, Request for Comments (RFC1320), Internet Activities Board, Internet Privacy Task Force, 1992."},{"key":"e_1_3_2_1_27_1","volume-title":"On the Design and Security of Block Ciphers","author":"Lai Xuejia","year":"1992","unstructured":"Xuejia Lai . On the Design and Security of Block Ciphers . Hartung-Gorre Verlag , 1992 . Xuejia Lai. On the Design and Security of Block Ciphers. Hartung-Gorre Verlag, 1992."},{"key":"e_1_3_2_1_28_1","volume-title":"NIST, US Department of Commerce, Washington D.C.","author":"FIPS","year":"1996","unstructured":"FIPS 180-1. Secure hash standard , NIST, US Department of Commerce, Washington D.C. , Springer-Verlag , 1996 . FIPS 180-1. Secure hash standard, NIST, US Department of Commerce, Washington D.C., Springer-Verlag, 1996."},{"key":"e_1_3_2_1_29_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology -- CRYPTO'85.","author":"S.","year":"1986","unstructured":"Miller, V. S. : Use of elliptic curves in cryptography . In Williams, H.C., ed.: Advances in Cryptology -- CRYPTO'85. Volume 218 of Lecture Notes in Computer Science . Springer-Verlag , Berlin, Heidelberg , New York ( 1986 ) 417- 426. Miller, V.S.: Use of elliptic curves in cryptography. In Williams, H.C., ed.: Advances in Cryptology -- CRYPTO'85. Volume 218 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, Heidelberg, New York (1986) 417- 426."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_32_1","unstructured":"V. Rijmen \"Cryptanalysis and design of iterated block ciphers \" Doctoral Dissertation October 1997 K.U. Leuven.  V. Rijmen \"Cryptanalysis and design of iterated block ciphers \" Doctoral Dissertation October 1997 K.U. Leuven."}],"event":{"name":"ICPE'11: Second Joint WOSP\/SIPEW International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Karlsruhe Germany","acronym":"ICPE'11"},"container-title":["Proceedings of the 2nd ACM\/SPEC International Conference on Performance engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1958746.1958800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1958746.1958800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:42Z","timestamp":1750244382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1958746.1958800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":32,"alternative-id":["10.1145\/1958746.1958800","10.1145\/1958746"],"URL":"https:\/\/doi.org\/10.1145\/1958746.1958800","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}