{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:13Z","timestamp":1750220233085,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"GuangDong Basic and Applied Basic Research","award":["2021A1515110777"],"award-info":[{"award-number":["2021A1515110777"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3546000.3546016","type":"proceedings-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T16:08:37Z","timestamp":1660925317000},"page":"106-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Digital Signature Virtual Platform Based on Hardware-Software Co-Design"],"prefix":"10.1145","author":[{"given":"Fengjie","family":"Lin","sequence":"first","affiliation":[{"name":"Guangdong University of Technology, China"}]},{"given":"Shuting","family":"Cai","sequence":"additional","affiliation":[{"name":"Guangdong University of Technology, China"}]},{"given":"Heming","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangdong University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Computer Knowledge and Technology","author":"Su-Juan W U","year":"2014","unstructured":"Su-Juan W U . The Research and Application of Data Encryption Technology in Computer Network Security[J] . Computer Knowledge and Technology , 2014 . Su-Juan W U . The Research and Application of Data Encryption Technology in Computer Network Security[J]. Computer Knowledge and Technology, 2014."},{"key":"e_1_3_2_1_2_1","volume-title":"Virtual platforms: Breaking new grounds[J]","author":"Leupers R","year":"2012","unstructured":"Leupers R , Martin G , Plyaskin R , Virtual platforms: Breaking new grounds[J] . IEEE , 2012 . Leupers R, Martin G , Plyaskin R , Virtual platforms: Breaking new grounds[J]. IEEE, 2012."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE","author":"Rekik W","year":"2013","unstructured":"Rekik W , Said M B , Amor N B , Virtual prototyping of multiprocessor architectures using the open virtual platform[C]\/\/ International Conference on Computer Applications Technology . IEEE , 2013 . Rekik W ,Said M B , Amor N B , Virtual prototyping of multiprocessor architectures using the open virtual platform[C]\/\/ International Conference on Computer Applications Technology. IEEE, 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"SOCC 2011","author":"Lin Y L","year":"2011","unstructured":"Lin Y L , Su A . Functional verifications for SoC software\/hardware co-design: From virtual platform to physical platform[C]\/\/ IEEE 24th International SoC Conference , SOCC 2011 , Taipei, Taiwan , September 26-28, 2011 . IEEE, 2011. Lin Y L , Su A .Functional verifications for SoC software\/hardware co-design: From virtual platform to physical platform[C]\/\/ IEEE 24th International SoC Conference, SOCC 2011, Taipei, Taiwan, September 26-28, 2011. IEEE, 2011."},{"key":"e_1_3_2_1_5_1","unstructured":"Jung M Sadri M Wehn N . Virtual Platforms for Fast Memory Subsystem Exploration Using gem5 and TLM2.0[C]\/\/ Ninth International Summer School on Advanced Computer Architecture and Compilation for High-Performance and Embedded Systems (ACACES13). 2013.  Jung M Sadri M Wehn N . Virtual Platforms for Fast Memory Subsystem Exploration Using gem5 and TLM2.0[C]\/\/ Ninth International Summer School on Advanced Computer Architecture and Compilation for High-Performance and Embedded Systems (ACACES13). 2013."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2009.2014858"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE","author":"Rekik W","year":"2013","unstructured":"Rekik W , Said M B , Amor N B , Virtual prototyping of multiprocessor architectures using the open virtual platform[C]\/\/ International Conference on Computer Applications Technology . IEEE , 2013 . Rekik W ,Said M B , Amor N B , Virtual prototyping of multiprocessor architectures using the open virtual platform[C]\/\/ International Conference on Computer Applications Technology. IEEE, 2013."},{"key":"e_1_3_2_1_8_1","unstructured":"Gr\u00f6tker Liao S Martin G System Design with SystemC[M].  Gr\u00f6tker Liao S Martin G System Design with SystemC[M]."},{"issue":"11","key":"e_1_3_2_1_9_1","first-page":"1365","article-title":"Survey on transaction level modeling for system-on-chip design[J]","volume":"19","author":"Tong K","year":"2007","unstructured":"Tong K . Survey on transaction level modeling for system-on-chip design[J] . Journal of Computer-Aided Design & Computer Graphics , 2007 , 19 ( 11 ): 1365 - 1372 . Tong K . Survey on transaction level modeling for system-on-chip design[J]. Journal of Computer-Aided Design & Computer Graphics, 2007, 19(11):1365-1372.","journal-title":"Journal of Computer-Aided Design & Computer Graphics"},{"key":"e_1_3_2_1_10_1","volume-title":"Virtual Prototyping Platform for Multiprocessor System-on-Chip Hardware\/Software Co-design and Co-verification[C]\/\/ Springer International Publishing","author":"Wicaksana A","year":"2018","unstructured":"Wicaksana A , Tang C M . Virtual Prototyping Platform for Multiprocessor System-on-Chip Hardware\/Software Co-design and Co-verification[C]\/\/ Springer International Publishing . Springer International Publishing , 2018 . Wicaksana A , Tang C M . Virtual Prototyping Platform for Multiprocessor System-on-Chip Hardware\/Software Co-design and Co-verification[C]\/\/ Springer International Publishing. Springer International Publishing, 2018."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2155698"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_13_1","volume-title":"Finite Fields and Elliptic Curves in Cryptography[J]. rug seminar location gent be date may","author":"Vercauteren F .","year":"2001","unstructured":"Vercauteren F . Finite Fields and Elliptic Curves in Cryptography[J]. rug seminar location gent be date may , 2001 . Vercauteren F . Finite Fields and Elliptic Curves in Cryptography[J]. rug seminar location gent be date may, 2001."}],"event":{"name":"HP3C'22: 2022 6th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C'22","location":"Jilin China"},"container-title":["Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546000.3546016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:18Z","timestamp":1750188618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":13,"alternative-id":["10.1145\/3546000.3546016","10.1145\/3546000"],"URL":"https:\/\/doi.org\/10.1145\/3546000.3546016","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"2022-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}