Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Zhe Liu , Hwajeong Seo , Johann Großschädl , Howon Kim

ABSTRACT

In this paper, we present a highly-optimized implementation of standards-compliant Elliptic Curve Cryptography (ECC) for wireless sensor nodes and similar devices featuring an 8-bit AVR processor. The field arithmetic is written in Assembly language and optimized for the 192-bit NIST-specified prime p = 2192 − 264 − 1, while the group arithmetic (i.e. point addition and doubling) is programmed in ANSI C. One of our contributions is a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previously-proposed squaring techniques. Based on our highly optimized arithmetic library for the 192-bit NIST prime, we achieve record-setting execution times for scalar multiplication (with both fixed and arbitrary points) as well as multiple scalar multiplication. Experimental results, obtained on an AVR ATmega128 processor, show that the two scalar multiplications of ephemeral Elliptic Curve Diffie-Hellman (ECDH) key exchange can be executed in 1.75 s altogether (at a clock frequency of 7.37 MHz) and consume an energy of some 42 mJ. The generation and verification of an ECDSA signature requires roughly 1.91 s and costs 46 mJ at the same clock frequency. Our results significantly improve the state-of-the-art in ECDH and ECDSA computation on the P-192 curve, outperforming the previous best implementations in the literature by a factor of 1.35 and 2.33, respectively. We also protected the field arithmetic and algorithms for scalar multiplication against side-channel attacks, especially Simple Power Analysis (SPA). More... »

PAGES

302-317

References to SciGraph publications

Book

TITLE

Information and Communications Security

ISBN

978-3-319-02725-8
978-3-319-02726-5

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-02726-5_22

DOI

http://dx.doi.org/10.1007/978-3-319-02726-5_22

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1012395636


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "https://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, 6, rue R. Coudenhove-Kalergi, 1359\u00a0Luxembourg, Kirchberg, Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Zhe", 
        "id": "sg:person.013144776623.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609-735, Republic of Korea"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Seo", 
        "givenName": "Hwajeong", 
        "id": "sg:person.015101423711.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Luxembourg", 
          "id": "https://www.grid.ac/institutes/grid.16008.3f", 
          "name": [
            "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, 6, rue R. Coudenhove-Kalergi, 1359\u00a0Luxembourg, Kirchberg, Luxembourg"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gro\u00dfsch\u00e4dl", 
        "givenName": "Johann", 
        "id": "sg:person.011275441722.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011275441722.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Pusan National University", 
          "id": "https://www.grid.ac/institutes/grid.262229.f", 
          "name": [
            "School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609-735, Republic of Korea"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kim", 
        "givenName": "Howon", 
        "id": "sg:person.010610076315.82", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/11935308_37", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000175039", 
          "https://doi.org/10.1007/11935308_37"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11935308_37", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000175039", 
          "https://doi.org/10.1007/11935308_37"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-48405-1_25", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1005179729", 
          "https://doi.org/10.1007/3-540-48405-1_25"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-29222-4_44", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006493294", 
          "https://doi.org/10.1007/978-3-642-29222-4_44"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008174972", 
          "https://doi.org/10.1007/978-3-540-28632-5_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008174972", 
          "https://doi.org/10.1007/978-3-540-28632-5_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-38553-7_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009383266", 
          "https://doi.org/10.1007/978-3-642-38553-7_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1180345.1180366", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009400835"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-16644-0_21", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026911791", 
          "https://doi.org/10.1007/978-3-642-16644-0_21"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-16644-0_21", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026911791", 
          "https://doi.org/10.1007/978-3-642-16644-0_21"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.779", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027427614"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.jss.2012.06.074", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030997602"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-89255-7_20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031654257", 
          "https://doi.org/10.1007/978-3-540-89255-7_20"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-89255-7_20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031654257", 
          "https://doi.org/10.1007/978-3-540-89255-7_20"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-07536-5_22", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032424761", 
          "https://doi.org/10.1007/978-3-319-07536-5_22"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-07536-5_22", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032424761", 
          "https://doi.org/10.1007/978-3-319-07536-5_22"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-35416-8_5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1034940906", 
          "https://doi.org/10.1007/978-3-642-35416-8_5"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-03944-7_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037936174", 
          "https://doi.org/10.1007/978-3-642-03944-7_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1043836382", 
          "https://doi.org/10.1007/978-3-540-28632-5_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1043836382", 
          "https://doi.org/10.1007/978-3-540-28632-5_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2484389.2484398", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1044042271"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11545262_6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1044926321", 
          "https://doi.org/10.1007/11545262_6"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11545262_6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1044926321", 
          "https://doi.org/10.1007/11545262_6"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1090/s0025-5718-1987-0866113-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050650230"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1049/ip-cdt:20020235", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1056845284"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2002.1024422", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393425"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.3934/amc.2010.4.169", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1071730649"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ipsn.2008.47", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093251515"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "In this paper, we present a highly-optimized implementation of standards-compliant Elliptic Curve Cryptography (ECC) for wireless sensor nodes and similar devices featuring an 8-bit AVR processor. The field arithmetic is written in Assembly language and optimized for the 192-bit NIST-specified prime p\u2009=\u20092192\u2009\u2212\u2009264\u2009\u2212\u20091, while the group arithmetic (i.e. point addition and doubling) is programmed in ANSI C. One of our contributions is a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previously-proposed squaring techniques. Based on our highly optimized arithmetic library for the 192-bit NIST prime, we achieve record-setting execution times for scalar multiplication (with both fixed and arbitrary points) as well as multiple scalar multiplication. Experimental results, obtained on an AVR ATmega128 processor, show that the two scalar multiplications of ephemeral Elliptic Curve Diffie-Hellman (ECDH) key exchange can be\u00a0executed in 1.75\u00a0s altogether (at a clock frequency of 7.37 MHz) and consume an energy of some 42\u00a0mJ. The generation and verification of an ECDSA signature requires roughly 1.91\u00a0s and costs 46\u00a0mJ at the same clock frequency. Our results significantly improve the state-of-the-art in ECDH and ECDSA computation on the P-192 curve, outperforming\u00a0the previous best implementations in the literature by a factor of 1.35 and 2.33, respectively. We also protected the field arithmetic and algorithms for scalar multiplication against side-channel attacks, especially Simple Power Analysis (SPA).", 
    "editor": [
      {
        "familyName": "Qing", 
        "givenName": "Sihan", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhou", 
        "givenName": "Jianying", 
        "type": "Person"
      }, 
      {
        "familyName": "Liu", 
        "givenName": "Dongmei", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-02726-5_22", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-02725-8", 
        "978-3-319-02726-5"
      ], 
      "name": "Information and Communications Security", 
      "type": "Book"
    }, 
    "name": "Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes", 
    "pagination": "302-317", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-02726-5_22"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "3b0e6de0594595c3359aab75d9a305143d4f20e5e3865ae439c586b6b7e0f07d"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1012395636"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-02726-5_22", 
      "https://app.dimensions.ai/details/publication/pub.1012395636"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T12:30", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8663_00000250.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-02726-5_22"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-02726-5_22'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-02726-5_22'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-02726-5_22'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-02726-5_22'


 

This table displays all metadata directly associated to this object as RDF triples.

186 TRIPLES      23 PREDICATES      51 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-02726-5_22 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N7f6f2d62308a4952bbb9b59851d09a8a
4 schema:citation sg:pub.10.1007/11545262_6
5 sg:pub.10.1007/11745853_14
6 sg:pub.10.1007/11935308_37
7 sg:pub.10.1007/3-540-48405-1_25
8 sg:pub.10.1007/978-3-319-07536-5_22
9 sg:pub.10.1007/978-3-540-28632-5_10
10 sg:pub.10.1007/978-3-540-28632-5_9
11 sg:pub.10.1007/978-3-540-77690-1_19
12 sg:pub.10.1007/978-3-540-89255-7_20
13 sg:pub.10.1007/978-3-642-03944-7_9
14 sg:pub.10.1007/978-3-642-16644-0_21
15 sg:pub.10.1007/978-3-642-23951-9_30
16 sg:pub.10.1007/978-3-642-29222-4_44
17 sg:pub.10.1007/978-3-642-35416-8_5
18 sg:pub.10.1007/978-3-642-38553-7_9
19 https://doi.org/10.1002/sec.779
20 https://doi.org/10.1016/j.jss.2012.06.074
21 https://doi.org/10.1049/ip-cdt:20020235
22 https://doi.org/10.1090/s0025-5718-1987-0866113-7
23 https://doi.org/10.1109/ipsn.2008.47
24 https://doi.org/10.1109/mcom.2002.1024422
25 https://doi.org/10.1145/1180345.1180366
26 https://doi.org/10.1145/2484389.2484398
27 https://doi.org/10.3934/amc.2010.4.169
28 schema:datePublished 2013
29 schema:datePublishedReg 2013-01-01
30 schema:description In this paper, we present a highly-optimized implementation of standards-compliant Elliptic Curve Cryptography (ECC) for wireless sensor nodes and similar devices featuring an 8-bit AVR processor. The field arithmetic is written in Assembly language and optimized for the 192-bit NIST-specified prime p = 2192 − 264 − 1, while the group arithmetic (i.e. point addition and doubling) is programmed in ANSI C. One of our contributions is a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previously-proposed squaring techniques. Based on our highly optimized arithmetic library for the 192-bit NIST prime, we achieve record-setting execution times for scalar multiplication (with both fixed and arbitrary points) as well as multiple scalar multiplication. Experimental results, obtained on an AVR ATmega128 processor, show that the two scalar multiplications of ephemeral Elliptic Curve Diffie-Hellman (ECDH) key exchange can be executed in 1.75 s altogether (at a clock frequency of 7.37 MHz) and consume an energy of some 42 mJ. The generation and verification of an ECDSA signature requires roughly 1.91 s and costs 46 mJ at the same clock frequency. Our results significantly improve the state-of-the-art in ECDH and ECDSA computation on the P-192 curve, outperforming the previous best implementations in the literature by a factor of 1.35 and 2.33, respectively. We also protected the field arithmetic and algorithms for scalar multiplication against side-channel attacks, especially Simple Power Analysis (SPA).
31 schema:editor N9b072040c2444181943fda98febc6ef7
32 schema:genre chapter
33 schema:inLanguage en
34 schema:isAccessibleForFree true
35 schema:isPartOf N0b32bf3468a44b12929c92145a468d3e
36 schema:name Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
37 schema:pagination 302-317
38 schema:productId N1069dbf955db415eb27ee3cbe37e22d9
39 Nd3ada44ed5c0476bb1d302f1edce48e4
40 Ndfc7557ee39d4ee9be3409673c2990e4
41 schema:publisher Nf9e8867cf9944183ada0ead9206d784e
42 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012395636
43 https://doi.org/10.1007/978-3-319-02726-5_22
44 schema:sdDatePublished 2019-04-15T12:30
45 schema:sdLicense https://scigraph.springernature.com/explorer/license/
46 schema:sdPublisher N5a0d3023f3e540f29c292ffd2e2f4368
47 schema:url http://link.springer.com/10.1007/978-3-319-02726-5_22
48 sgo:license sg:explorer/license/
49 sgo:sdDataset chapters
50 rdf:type schema:Chapter
51 N0aa0ef66edfd4ecd9e35f55dac71c5f0 rdf:first sg:person.011275441722.34
52 rdf:rest N247df6ff70b9448aba552384bf84d4ea
53 N0b32bf3468a44b12929c92145a468d3e schema:isbn 978-3-319-02725-8
54 978-3-319-02726-5
55 schema:name Information and Communications Security
56 rdf:type schema:Book
57 N1069dbf955db415eb27ee3cbe37e22d9 schema:name dimensions_id
58 schema:value pub.1012395636
59 rdf:type schema:PropertyValue
60 N135be0101906474cbbd2007f929dc1d8 rdf:first sg:person.015101423711.26
61 rdf:rest N0aa0ef66edfd4ecd9e35f55dac71c5f0
62 N247df6ff70b9448aba552384bf84d4ea rdf:first sg:person.010610076315.82
63 rdf:rest rdf:nil
64 N3a7d81971f3a451fad475d97183e5c92 rdf:first Na1e9fbe812b241048441b427138451d0
65 rdf:rest rdf:nil
66 N5a0d3023f3e540f29c292ffd2e2f4368 schema:name Springer Nature - SN SciGraph project
67 rdf:type schema:Organization
68 N7c309e14c32c422097be6296b799a71d schema:familyName Zhou
69 schema:givenName Jianying
70 rdf:type schema:Person
71 N7f6f2d62308a4952bbb9b59851d09a8a rdf:first sg:person.013144776623.84
72 rdf:rest N135be0101906474cbbd2007f929dc1d8
73 N9b072040c2444181943fda98febc6ef7 rdf:first Nf9f91db2b87e477881fb749d1748d002
74 rdf:rest Nccb9cb154d544893a8fad5d488543462
75 Na1e9fbe812b241048441b427138451d0 schema:familyName Liu
76 schema:givenName Dongmei
77 rdf:type schema:Person
78 Nccb9cb154d544893a8fad5d488543462 rdf:first N7c309e14c32c422097be6296b799a71d
79 rdf:rest N3a7d81971f3a451fad475d97183e5c92
80 Nd3ada44ed5c0476bb1d302f1edce48e4 schema:name readcube_id
81 schema:value 3b0e6de0594595c3359aab75d9a305143d4f20e5e3865ae439c586b6b7e0f07d
82 rdf:type schema:PropertyValue
83 Ndfc7557ee39d4ee9be3409673c2990e4 schema:name doi
84 schema:value 10.1007/978-3-319-02726-5_22
85 rdf:type schema:PropertyValue
86 Nf9e8867cf9944183ada0ead9206d784e schema:location Cham
87 schema:name Springer International Publishing
88 rdf:type schema:Organisation
89 Nf9f91db2b87e477881fb749d1748d002 schema:familyName Qing
90 schema:givenName Sihan
91 rdf:type schema:Person
92 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
93 schema:name Technology
94 rdf:type schema:DefinedTerm
95 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
96 schema:name Communications Technologies
97 rdf:type schema:DefinedTerm
98 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
99 schema:familyName Kim
100 schema:givenName Howon
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
102 rdf:type schema:Person
103 sg:person.011275441722.34 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
104 schema:familyName Großschädl
105 schema:givenName Johann
106 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011275441722.34
107 rdf:type schema:Person
108 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
109 schema:familyName Liu
110 schema:givenName Zhe
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
112 rdf:type schema:Person
113 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
114 schema:familyName Seo
115 schema:givenName Hwajeong
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
117 rdf:type schema:Person
118 sg:pub.10.1007/11545262_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044926321
119 https://doi.org/10.1007/11545262_6
120 rdf:type schema:CreativeWork
121 sg:pub.10.1007/11745853_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030714294
122 https://doi.org/10.1007/11745853_14
123 rdf:type schema:CreativeWork
124 sg:pub.10.1007/11935308_37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000175039
125 https://doi.org/10.1007/11935308_37
126 rdf:type schema:CreativeWork
127 sg:pub.10.1007/3-540-48405-1_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005179729
128 https://doi.org/10.1007/3-540-48405-1_25
129 rdf:type schema:CreativeWork
130 sg:pub.10.1007/978-3-319-07536-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032424761
131 https://doi.org/10.1007/978-3-319-07536-5_22
132 rdf:type schema:CreativeWork
133 sg:pub.10.1007/978-3-540-28632-5_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043836382
134 https://doi.org/10.1007/978-3-540-28632-5_10
135 rdf:type schema:CreativeWork
136 sg:pub.10.1007/978-3-540-28632-5_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008174972
137 https://doi.org/10.1007/978-3-540-28632-5_9
138 rdf:type schema:CreativeWork
139 sg:pub.10.1007/978-3-540-77690-1_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038588160
140 https://doi.org/10.1007/978-3-540-77690-1_19
141 rdf:type schema:CreativeWork
142 sg:pub.10.1007/978-3-540-89255-7_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031654257
143 https://doi.org/10.1007/978-3-540-89255-7_20
144 rdf:type schema:CreativeWork
145 sg:pub.10.1007/978-3-642-03944-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037936174
146 https://doi.org/10.1007/978-3-642-03944-7_9
147 rdf:type schema:CreativeWork
148 sg:pub.10.1007/978-3-642-16644-0_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026911791
149 https://doi.org/10.1007/978-3-642-16644-0_21
150 rdf:type schema:CreativeWork
151 sg:pub.10.1007/978-3-642-23951-9_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047137953
152 https://doi.org/10.1007/978-3-642-23951-9_30
153 rdf:type schema:CreativeWork
154 sg:pub.10.1007/978-3-642-29222-4_44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006493294
155 https://doi.org/10.1007/978-3-642-29222-4_44
156 rdf:type schema:CreativeWork
157 sg:pub.10.1007/978-3-642-35416-8_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034940906
158 https://doi.org/10.1007/978-3-642-35416-8_5
159 rdf:type schema:CreativeWork
160 sg:pub.10.1007/978-3-642-38553-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009383266
161 https://doi.org/10.1007/978-3-642-38553-7_9
162 rdf:type schema:CreativeWork
163 https://doi.org/10.1002/sec.779 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027427614
164 rdf:type schema:CreativeWork
165 https://doi.org/10.1016/j.jss.2012.06.074 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030997602
166 rdf:type schema:CreativeWork
167 https://doi.org/10.1049/ip-cdt:20020235 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056845284
168 rdf:type schema:CreativeWork
169 https://doi.org/10.1090/s0025-5718-1987-0866113-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050650230
170 rdf:type schema:CreativeWork
171 https://doi.org/10.1109/ipsn.2008.47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093251515
172 rdf:type schema:CreativeWork
173 https://doi.org/10.1109/mcom.2002.1024422 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393425
174 rdf:type schema:CreativeWork
175 https://doi.org/10.1145/1180345.1180366 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009400835
176 rdf:type schema:CreativeWork
177 https://doi.org/10.1145/2484389.2484398 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044042271
178 rdf:type schema:CreativeWork
179 https://doi.org/10.3934/amc.2010.4.169 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730649
180 rdf:type schema:CreativeWork
181 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
182 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, 6, rue R. Coudenhove-Kalergi, 1359 Luxembourg, Kirchberg, Luxembourg
183 rdf:type schema:Organization
184 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
185 schema:name School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609-735, Republic of Korea
186 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...