{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:35Z","timestamp":1750220855448,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T00:00:00Z","timestamp":1569801600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1561807,1908806"],"award-info":[{"award-number":["1561807,1908806"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,30]]},"DOI":"10.1145\/3357526.3357570","type":"proceedings-article","created":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T14:25:56Z","timestamp":1573050356000},"page":"33-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Attacking memory-hard scrypt with near-data-processing"],"prefix":"10.1145","author":[{"given":"Jiwon","family":"Choe","sequence":"first","affiliation":[{"name":"Brown University"}]},{"given":"Tali","family":"Moreshet","sequence":"additional","affiliation":[{"name":"Boston University"}]},{"given":"R. Iris","family":"Bahar","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Maurice","family":"Herlihy","sequence":"additional","affiliation":[{"name":"Brown University"}]}],"member":"320","published-online":{"date-parts":[[2019,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.205"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750386"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750385"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2516011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30695-7_2"},{"volume-title":"New stream cipher designs","author":"Bernstein Daniel J","key":"e_1_3_2_1_7_1","unstructured":"Daniel J Bernstein . 2008. The Salsa20 family of stream ciphers . In New stream cipher designs . Springer , 84--97. Daniel J Bernstein. 2008. The Salsa20 family of stream ciphers. In New stream cipher designs. Springer, 84--97."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.31"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2017.48"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173177"},{"key":"e_1_3_2_1_12_1","volume-title":"LazyPIM: An efficient cache coherence mechanism for processing-in-memory","author":"Boroumand Amirali","year":"2017","unstructured":"Amirali Boroumand , Saugata Ghose , Brandon Lucia , Kevin Hsieh , Krishna Malladi , Hongzhong Zheng , and Onur Mutlu . 2017. LazyPIM: An efficient cache coherence mechanism for processing-in-memory . IEEE Computer Architecture Letters ( 2017 ). Amirali Boroumand, Saugata Ghose, Brandon Lucia, Kevin Hsieh, Krishna Malladi, Hongzhong Zheng, and Onur Mutlu. 2017. LazyPIM: An efficient cache coherence mechanism for processing-in-memory. IEEE Computer Architecture Letters (2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322266"},{"key":"e_1_3_2_1_14_1","unstructured":"Ziqi Chen Weiyang Wang Xiao Yan and Jia Tian. [n. d.]. Cortex-AI on Blockchain. ([n. d.]).  Ziqi Chen Weiyang Wang Xiao Yan and Jia Tian. [n. d.]. Cortex-AI on Blockchain. ([n. d.])."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323165.3323191"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2751042"},{"key":"e_1_3_2_1_17_1","volume-title":"Towards Near Data Processing of Convolutional Neural Networks. In VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 2018 31st International Conference on. IEEE, 380--385","author":"Das Palash","year":"2018","unstructured":"Palash Das , Shivam Lakhotia , Prabodh Shetty , and Hemangee K Kapoor . 2018 . Towards Near Data Processing of Convolutional Neural Networks. In VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 2018 31st International Conference on. IEEE, 380--385 . Palash Das, Shivam Lakhotia, Prabodh Shetty, and Hemangee K Kapoor. 2018. Towards Near Data Processing of Convolutional Neural Networks. In VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID), 2018 31st International Conference on. IEEE, 380--385."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.4241340"},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/github.com\/ethereum\/wiki\/wiki\/Ethash","author":"Wiki Ethereum","year":"2017","unstructured":"Ethereum Wiki . 2017. Ethash. ( 2017 ). https:\/\/github.com\/ethereum\/wiki\/wiki\/Ethash Ethereum Wiki. 2017. Ethash. (2017). https:\/\/github.com\/ethereum\/wiki\/wiki\/Ethash"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173171"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.22"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967938.2967958"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2016.7753257"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322237"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Mohsen Imani Saransh Gupta and Tajana Rosing. 2018. GenPIM: Generalized Processing In-Memory to Accelerate Data Intensive Applications. (2018).  Mohsen Imani Saransh Gupta and Tajana Rosing. 2018. GenPIM: Generalized Processing In-Memory to Accelerate Data Intensive Applications. (2018).","DOI":"10.23919\/DATE.2018.8342186"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2700298"},{"key":"e_1_3_2_1_29_1","volume-title":"Hongyi Xin, Donghyuk Lee, Saugata Ghose, Mohammed Alser, Hasan Hassan, Oguz Ergin, Can Alkan, and Onur Mutlu.","author":"Kim Jeremie S","year":"2018","unstructured":"Jeremie S Kim , Damla Senol Cali , Hongyi Xin, Donghyuk Lee, Saugata Ghose, Mohammed Alser, Hasan Hassan, Oguz Ergin, Can Alkan, and Onur Mutlu. 2018 . GRIM-Filter: Fast seed location filtering in DNA read mapping using processing-in-memory technologies. BMC genomics 19, 2 (2018), 89. Jeremie S Kim, Damla Senol Cali, Hongyi Xin, Donghyuk Lee, Saugata Ghose, Mohammed Alser, Hasan Hassan, Oguz Ergin, Can Alkan, and Onur Mutlu. 2018. GRIM-Filter: Fast seed location filtering in DNA read mapping using processing-in-memory technologies. BMC genomics 19, 2 (2018), 89."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898064"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087556.3087582"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.54"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818950.2818982"},{"key":"e_1_3_2_1_34_1","unstructured":"Colin Percival. 2009. Stronger key derivation via sequential memory-hard functions. (2009).  Colin Percival. 2009. Stronger key derivation via sequential memory-hard functions. (2009)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"C. Percival and S. Josefsson. 2016. The scrypt Password-Based Key Derivation Function. RFC 7914. RFC Editor.  C. Percival and S. Josefsson. 2016. The scrypt Password-Based Key Derivation Function . RFC 7914. RFC Editor.","DOI":"10.17487\/RFC7914"},{"key":"e_1_3_2_1_36_1","volume-title":"Yescrypt-a password hashing competition submission. Password Hashing Competition. v0 edn 14","author":"Peslyak Alexander","year":"2014","unstructured":"Alexander Peslyak . 2014. Yescrypt-a password hashing competition submission. Password Hashing Competition. v0 edn 14 ( 2014 ). Alexander Peslyak. 2014. Yescrypt-a password hashing competition submission. Password Hashing Competition. v0 edn 14 (2014)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2014.6844483"},{"key":"e_1_3_2_1_38_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Santos Paulo C","year":"2018","unstructured":"Paulo C Santos , Geraldo F Oliveira , Jo\u00e3o P Lima , Marco AZ Alves , Luigi Carro , and Antonio CS Beck . 2018 . Processing in 3D memories to speed up operations on complex data structures. In Design , Automation & Test in Europe Conference & Exhibition (DATE) , 2018. IEEE, 897--900. Paulo C Santos, Geraldo F Oliveira, Jo\u00e3o P Lima, Marco AZ Alves, Luigi Carro, and Antonio CS Beck. 2018. Processing in 3D memories to speed up operations on complex data structures. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2018. IEEE, 897--900."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124544"},{"volume-title":"https:\/\/github.com\/Tarsnap\/scrypt","year":"2019","key":"e_1_3_2_1_40_1","unstructured":"Tarsnap. 2019. Tarsnap\/scrypt. ( 2019 ). https:\/\/github.com\/Tarsnap\/scrypt Tarsnap. 2019. Tarsnap\/scrypt. (2019). https:\/\/github.com\/Tarsnap\/scrypt"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_4"},{"key":"e_1_3_2_1_42_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 , 2014 (2014), 1--32. Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317862"},{"key":"e_1_3_2_1_44_1","volume-title":"Intelligent Memory Architecture with New Memory Technologies. Computer Architecture Today Blog","author":"Xie Yuan","year":"2018","unstructured":"Yuan Xie . 2018. Intelligent Memory Architecture with New Memory Technologies. Computer Architecture Today Blog ( 2018 ). https:\/\/www.sigarch.org\/intelligent-memory-architecture-with-new-memory-technologies\/ https:\/\/www.sigarch.org\/intelligent-memory-architecture-with-new-memory-technologies\/. Yuan Xie. 2018. Intelligent Memory Architecture with New Memory Technologies. Computer Architecture Today Blog (2018). https:\/\/www.sigarch.org\/intelligent-memory-architecture-with-new-memory-technologies\/ https:\/\/www.sigarch.org\/intelligent-memory-architecture-with-new-memory-technologies\/."},{"key":"e_1_3_2_1_45_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE)","author":"Yitbarek Salessawi Ferede","year":"2016","unstructured":"Salessawi Ferede Yitbarek , Tao Yang , Reetuparna Das , and Todd Austin . 2016 . Exploring specialized near-memory processing for data intensive operations. In Design , Automation & Test in Europe Conference & Exhibition (DATE) , 2016. IEEE, 1449--1452. Salessawi Ferede Yitbarek, Tao Yang, Reetuparna Das, and Todd Austin. 2016. Exploring specialized near-memory processing for data intensive operations. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2016. IEEE, 1449--1452."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600212.2600213"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00053"}],"event":{"name":"MEMSYS '19: The International Symposium on Memory Systems","acronym":"MEMSYS '19","location":"Washington District of Columbia USA"},"container-title":["Proceedings of the International Symposium on Memory Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357526.3357570","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357526.3357570","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357526.3357570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:22Z","timestamp":1750202602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357526.3357570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,30]]},"references-count":45,"alternative-id":["10.1145\/3357526.3357570","10.1145\/3357526"],"URL":"https:\/\/doi.org\/10.1145\/3357526.3357570","relation":{},"subject":[],"published":{"date-parts":[[2019,9,30]]},"assertion":[{"value":"2019-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}