Improved Modular Multiplication for Optimal Prime Fields View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2015

AUTHORS

Hwajeong Seo , Zhe Liu , Yasuyuki Nogami , Jongseok Choi , Howon Kim

ABSTRACT

Optimal Prime Fields (OPFs) are considered to be one of the best choices for lightweight elliptic curve cryptography implementation on resource-constraint embedded processors. In this paper, we revisit efficient implementation of the modular arithmetic over the special prime fields, and present improved implementation of modular multiplication for OPFs, called Optimal Prime Field Coarsely Integrated Operand Caching (OPF-CIOC) method. OPF-CIOC method follows the general idea of (consecutive) operand caching technique, but has been carefully optimized and redesigned for Montgomery multiplication in an integrated fashion. We then evaluate the practical performance of proposed method on representative 8-bit AVR processor. Experimental results show that the proposed OPF-CIOC method outperforms the previous best known results in ACNS’14 by a factor of 5 %. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information. More... »

PAGES

150-161

References to SciGraph publications

  • 2005. Elliptic Curve Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2013. Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes in INFORMATION AND COMMUNICATIONS SECURITY
  • 2014. MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2011. Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2011
  • 2014. Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors in INFORMATION SECURITY AND CRYPTOLOGY
  • 2012. Smart Elliptic Curve Cryptography for Smart Dust in QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS IN HETEROGENEOUS NETWORKS
  • 2012. Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors in INFORMATION SECURITY APPLICATIONS
  • 2004. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004
  • 2014. New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2014
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-319-15086-4
    978-3-319-15087-1

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-15087-1_12

    DOI

    http://dx.doi.org/10.1007/978-3-319-15087-1_12

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1025299938


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computation Theory and Mathematics", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609\u2013735, Republic of Korea"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Seo", 
            "givenName": "Hwajeong", 
            "id": "sg:person.015101423711.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Luxembourg", 
              "id": "https://www.grid.ac/institutes/grid.16008.3f", 
              "name": [
                "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, 6, Rue R. Coudenhove-Kalergi, 1359\u00a0Luxembourg-kirchberg, Luxembourg"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Zhe", 
            "id": "sg:person.013144776623.84", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Okayama University", 
              "id": "https://www.grid.ac/institutes/grid.261356.5", 
              "name": [
                "Graduate School of Natural Science and Technology, Okayama University, 3-1-1, Tsushima-naka, Kita, Okayama\u00a0700-8530, Japan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Nogami", 
            "givenName": "Yasuyuki", 
            "id": "sg:person.012253411571.23", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012253411571.23"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609\u2013735, Republic of Korea"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Choi", 
            "givenName": "Jongseok", 
            "id": "sg:person.016515567115.78", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609\u2013735, Republic of Korea"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kim", 
            "givenName": "Howon", 
            "id": "sg:person.010610076315.82", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-29222-4_44", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006493294", 
              "https://doi.org/10.1007/978-3-642-29222-4_44"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008174972", 
              "https://doi.org/10.1007/978-3-540-28632-5_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008174972", 
              "https://doi.org/10.1007/978-3-540-28632-5_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1368436.1368500", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010953052"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-02726-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012395636", 
              "https://doi.org/10.1007/978-3-319-02726-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359340.359342", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013337011"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/0-387-23483-7_131", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021349612", 
              "https://doi.org/10.1007/0-387-23483-7_131"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-07536-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032424761", 
              "https://doi.org/10.1007/978-3-319-07536-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-07536-5_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032424761", 
              "https://doi.org/10.1007/978-3-319-07536-5_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-35416-8_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034940906", 
              "https://doi.org/10.1007/978-3-642-35416-8_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-06734-6_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038724880", 
              "https://doi.org/10.1007/978-3-319-06734-6_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1090/s0025-5718-1985-0777282-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041482767"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-12087-4_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043836324", 
              "https://doi.org/10.1007/978-3-319-12087-4_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/2484389.2484398", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044042271"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047137953", 
              "https://doi.org/10.1007/978-3-642-23951-9_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047137953", 
              "https://doi.org/10.1007/978-3-642-23951-9_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/40.502403", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061168196"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1147/sj.294.0526", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1063184115"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/iccsnt.2011.6181997", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094496856"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "Optimal Prime Fields (OPFs) are considered to be one of the best choices for lightweight elliptic curve cryptography implementation on resource-constraint embedded processors. In this paper, we revisit efficient implementation of the modular arithmetic over the special prime fields, and present improved implementation of modular multiplication for OPFs, called Optimal Prime Field Coarsely Integrated Operand Caching (OPF-CIOC) method. OPF-CIOC method follows the general idea of (consecutive) operand caching technique, but has been carefully optimized and redesigned for Montgomery multiplication in an integrated fashion. We then evaluate the practical performance of proposed method on representative 8-bit AVR processor. Experimental results show that the proposed OPF-CIOC method outperforms the previous best known results in ACNS\u201914 by a factor of 5\u00a0%. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information.", 
        "editor": [
          {
            "familyName": "Rhee", 
            "givenName": "Kyung-Hyune", 
            "type": "Person"
          }, 
          {
            "familyName": "Yi", 
            "givenName": "Jeong Hyun", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-15087-1_12", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-319-15086-4", 
            "978-3-319-15087-1"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Improved Modular Multiplication for Optimal Prime Fields", 
        "pagination": "150-161", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-15087-1_12"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "78877302342ce72cda3c90357771a9084aa7b56b13fd74b172a594bb25e4e912"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1025299938"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-15087-1_12", 
          "https://app.dimensions.ai/details/publication/pub.1025299938"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T21:58", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000258.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-15087-1_12"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-15087-1_12'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-15087-1_12'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-15087-1_12'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-15087-1_12'


     

    This table displays all metadata directly associated to this object as RDF triples.

    161 TRIPLES      23 PREDICATES      43 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-15087-1_12 schema:about anzsrc-for:08
    2 anzsrc-for:0802
    3 schema:author N492f34b9c2bd435db5c36626dc53cba6
    4 schema:citation sg:pub.10.1007/0-387-23483-7_131
    5 sg:pub.10.1007/978-3-319-02726-5_22
    6 sg:pub.10.1007/978-3-319-06734-6_14
    7 sg:pub.10.1007/978-3-319-07536-5_22
    8 sg:pub.10.1007/978-3-319-12087-4_14
    9 sg:pub.10.1007/978-3-540-28632-5_9
    10 sg:pub.10.1007/978-3-642-23951-9_30
    11 sg:pub.10.1007/978-3-642-29222-4_44
    12 sg:pub.10.1007/978-3-642-35416-8_5
    13 https://doi.org/10.1090/s0025-5718-1985-0777282-x
    14 https://doi.org/10.1109/40.502403
    15 https://doi.org/10.1109/iccsnt.2011.6181997
    16 https://doi.org/10.1145/1368436.1368500
    17 https://doi.org/10.1145/2484389.2484398
    18 https://doi.org/10.1145/359340.359342
    19 https://doi.org/10.1147/sj.294.0526
    20 schema:datePublished 2015
    21 schema:datePublishedReg 2015-01-01
    22 schema:description Optimal Prime Fields (OPFs) are considered to be one of the best choices for lightweight elliptic curve cryptography implementation on resource-constraint embedded processors. In this paper, we revisit efficient implementation of the modular arithmetic over the special prime fields, and present improved implementation of modular multiplication for OPFs, called Optimal Prime Field Coarsely Integrated Operand Caching (OPF-CIOC) method. OPF-CIOC method follows the general idea of (consecutive) operand caching technique, but has been carefully optimized and redesigned for Montgomery multiplication in an integrated fashion. We then evaluate the practical performance of proposed method on representative 8-bit AVR processor. Experimental results show that the proposed OPF-CIOC method outperforms the previous best known results in ACNS’14 by a factor of 5 %. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information.
    23 schema:editor Nd68696e8b0a743829f113bf0d9f5e130
    24 schema:genre chapter
    25 schema:inLanguage en
    26 schema:isAccessibleForFree true
    27 schema:isPartOf N59caf23bb9c24402ad48bfd1d550205a
    28 schema:name Improved Modular Multiplication for Optimal Prime Fields
    29 schema:pagination 150-161
    30 schema:productId N583756a5c0154ea1adf3493524c0d82c
    31 N86cf118169334108b3391ebf96365b0e
    32 Nef833e3a05f64601858a0c7631f91888
    33 schema:publisher N0b2117eefa9b4907847062f38bb12abd
    34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025299938
    35 https://doi.org/10.1007/978-3-319-15087-1_12
    36 schema:sdDatePublished 2019-04-15T21:58
    37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    38 schema:sdPublisher N9ef20947a1a34e33823e2325b2ba3168
    39 schema:url http://link.springer.com/10.1007/978-3-319-15087-1_12
    40 sgo:license sg:explorer/license/
    41 sgo:sdDataset chapters
    42 rdf:type schema:Chapter
    43 N0b2117eefa9b4907847062f38bb12abd schema:location Cham
    44 schema:name Springer International Publishing
    45 rdf:type schema:Organisation
    46 N492f34b9c2bd435db5c36626dc53cba6 rdf:first sg:person.015101423711.26
    47 rdf:rest N57a356cf76324afeb7bf668c215b41b1
    48 N4c20e1349c1c4dd2b1d0b4c46522cb5d rdf:first sg:person.016515567115.78
    49 rdf:rest Nb1c5a34abf5c4476a867f58480a9e186
    50 N57a356cf76324afeb7bf668c215b41b1 rdf:first sg:person.013144776623.84
    51 rdf:rest Nefb64bbf807845889038b85bd7f7e971
    52 N583756a5c0154ea1adf3493524c0d82c schema:name doi
    53 schema:value 10.1007/978-3-319-15087-1_12
    54 rdf:type schema:PropertyValue
    55 N59caf23bb9c24402ad48bfd1d550205a schema:isbn 978-3-319-15086-4
    56 978-3-319-15087-1
    57 schema:name Information Security Applications
    58 rdf:type schema:Book
    59 N86cf118169334108b3391ebf96365b0e schema:name dimensions_id
    60 schema:value pub.1025299938
    61 rdf:type schema:PropertyValue
    62 N97b5710d4db140d29d3c7080d2fa27a6 rdf:first Nd7f367f716f74d40ae2d5fb2816788c7
    63 rdf:rest rdf:nil
    64 N9ef20947a1a34e33823e2325b2ba3168 schema:name Springer Nature - SN SciGraph project
    65 rdf:type schema:Organization
    66 Nb1c5a34abf5c4476a867f58480a9e186 rdf:first sg:person.010610076315.82
    67 rdf:rest rdf:nil
    68 Nc2435c25e13a450aa380c8ab8b7041bd schema:familyName Rhee
    69 schema:givenName Kyung-Hyune
    70 rdf:type schema:Person
    71 Nd68696e8b0a743829f113bf0d9f5e130 rdf:first Nc2435c25e13a450aa380c8ab8b7041bd
    72 rdf:rest N97b5710d4db140d29d3c7080d2fa27a6
    73 Nd7f367f716f74d40ae2d5fb2816788c7 schema:familyName Yi
    74 schema:givenName Jeong Hyun
    75 rdf:type schema:Person
    76 Nef833e3a05f64601858a0c7631f91888 schema:name readcube_id
    77 schema:value 78877302342ce72cda3c90357771a9084aa7b56b13fd74b172a594bb25e4e912
    78 rdf:type schema:PropertyValue
    79 Nefb64bbf807845889038b85bd7f7e971 rdf:first sg:person.012253411571.23
    80 rdf:rest N4c20e1349c1c4dd2b1d0b4c46522cb5d
    81 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    82 schema:name Information and Computing Sciences
    83 rdf:type schema:DefinedTerm
    84 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
    85 schema:name Computation Theory and Mathematics
    86 rdf:type schema:DefinedTerm
    87 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    88 schema:familyName Kim
    89 schema:givenName Howon
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
    91 rdf:type schema:Person
    92 sg:person.012253411571.23 schema:affiliation https://www.grid.ac/institutes/grid.261356.5
    93 schema:familyName Nogami
    94 schema:givenName Yasuyuki
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012253411571.23
    96 rdf:type schema:Person
    97 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
    98 schema:familyName Liu
    99 schema:givenName Zhe
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
    101 rdf:type schema:Person
    102 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    103 schema:familyName Seo
    104 schema:givenName Hwajeong
    105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
    106 rdf:type schema:Person
    107 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    108 schema:familyName Choi
    109 schema:givenName Jongseok
    110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
    111 rdf:type schema:Person
    112 sg:pub.10.1007/0-387-23483-7_131 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021349612
    113 https://doi.org/10.1007/0-387-23483-7_131
    114 rdf:type schema:CreativeWork
    115 sg:pub.10.1007/978-3-319-02726-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012395636
    116 https://doi.org/10.1007/978-3-319-02726-5_22
    117 rdf:type schema:CreativeWork
    118 sg:pub.10.1007/978-3-319-06734-6_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038724880
    119 https://doi.org/10.1007/978-3-319-06734-6_14
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/978-3-319-07536-5_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032424761
    122 https://doi.org/10.1007/978-3-319-07536-5_22
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/978-3-319-12087-4_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043836324
    125 https://doi.org/10.1007/978-3-319-12087-4_14
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/978-3-540-28632-5_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008174972
    128 https://doi.org/10.1007/978-3-540-28632-5_9
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-642-23951-9_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047137953
    131 https://doi.org/10.1007/978-3-642-23951-9_30
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-642-29222-4_44 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006493294
    134 https://doi.org/10.1007/978-3-642-29222-4_44
    135 rdf:type schema:CreativeWork
    136 sg:pub.10.1007/978-3-642-35416-8_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034940906
    137 https://doi.org/10.1007/978-3-642-35416-8_5
    138 rdf:type schema:CreativeWork
    139 https://doi.org/10.1090/s0025-5718-1985-0777282-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1041482767
    140 rdf:type schema:CreativeWork
    141 https://doi.org/10.1109/40.502403 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061168196
    142 rdf:type schema:CreativeWork
    143 https://doi.org/10.1109/iccsnt.2011.6181997 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094496856
    144 rdf:type schema:CreativeWork
    145 https://doi.org/10.1145/1368436.1368500 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010953052
    146 rdf:type schema:CreativeWork
    147 https://doi.org/10.1145/2484389.2484398 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044042271
    148 rdf:type schema:CreativeWork
    149 https://doi.org/10.1145/359340.359342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013337011
    150 rdf:type schema:CreativeWork
    151 https://doi.org/10.1147/sj.294.0526 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063184115
    152 rdf:type schema:CreativeWork
    153 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
    154 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, 6, Rue R. Coudenhove-Kalergi, 1359 Luxembourg-kirchberg, Luxembourg
    155 rdf:type schema:Organization
    156 https://www.grid.ac/institutes/grid.261356.5 schema:alternateName Okayama University
    157 schema:name Graduate School of Natural Science and Technology, Okayama University, 3-1-1, Tsushima-naka, Kita, Okayama 700-8530, Japan
    158 rdf:type schema:Organization
    159 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
    160 schema:name School of Computer Science and Engineering, Pusan National University, San-30, Jangjeon-Dong, Geumjeong-Gu, Busan, 609–735, Republic of Korea
    161 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...