Full-Size High-Security ECC Implementation on MSP430 Microcontrollers View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015

AUTHORS

Gesine Hinterwälder , Amir Moradi , Michael Hutter , Peter Schwabe , Christof Paar

ABSTRACT

In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument’s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a \(16\times 16\)-bit or a \(32\times 32\)-bit hardware multiplier respectively. More... »

PAGES

31-47

Book

TITLE

Progress in Cryptology - LATINCRYPT 2014

ISBN

978-3-319-16294-2
978-3-319-16295-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2

DOI

http://dx.doi.org/10.1007/978-3-319-16295-9_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1007958487


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hinterw\u00e4lder", 
        "givenName": "Gesine", 
        "id": "sg:person.016347320117.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016347320117.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moradi", 
        "givenName": "Amir", 
        "id": "sg:person.015303112617.60", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015303112617.60"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Graz University of Technology", 
          "id": "https://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hutter", 
        "givenName": "Michael", 
        "id": "sg:person.014316344436.77", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014316344436.77"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Radboud University Nijmegen", 
          "id": "https://www.grid.ac/institutes/grid.5590.9", 
          "name": [
            "Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schwabe", 
        "givenName": "Peter", 
        "id": "sg:person.010637555557.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Paar", 
        "givenName": "Christof", 
        "id": "sg:person.016666667155.68", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/1514274.1514276", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001431469"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-25286-0_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001715024", 
          "https://doi.org/10.1007/978-3-642-25286-0_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13389-012-0029-z", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002198320", 
          "https://doi.org/10.1007/s13389-012-0029-z"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10628-6_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003968777", 
          "https://doi.org/10.1007/978-3-642-10628-6_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10628-6_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003968777", 
          "https://doi.org/10.1007/978-3-642-10628-6_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-02384-2_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004091122", 
          "https://doi.org/10.1007/978-3-642-02384-2_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-38553-7_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009383266", 
          "https://doi.org/10.1007/978-3-642-38553-7_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-03356-8_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012320763", 
          "https://doi.org/10.1007/978-3-642-03356-8_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13389-015-0093-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015478192", 
          "https://doi.org/10.1007/s13389-015-0093-2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-05960-0_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027314402", 
          "https://doi.org/10.1007/978-3-319-05960-0_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-33027-8_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030639334", 
          "https://doi.org/10.1007/978-3-642-33027-8_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-03515-4_16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039355960", 
          "https://doi.org/10.1007/978-3-319-03515-4_16"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-27257-8_11", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1043248200", 
          "https://doi.org/10.1007/978-3-642-27257-8_11"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046226105", 
          "https://doi.org/10.1007/978-3-642-15031-9_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046226105", 
          "https://doi.org/10.1007/978-3-642-15031-9_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44586-2_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049925081", 
          "https://doi.org/10.1007/3-540-44586-2_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44586-2_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049925081", 
          "https://doi.org/10.1007/3-540-44586-2_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1090/s0025-5718-1987-0866113-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050650230"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ipsn.2008.47", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093251515"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2008.31", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095092296"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2015", 
    "datePublishedReg": "2015-01-01", 
    "description": "In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument\u2019s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1\u00a0million or 6.5\u00a0million cycles on MSP430Xs having a \\(16\\times 16\\)-bit or a \\(32\\times 32\\)-bit hardware multiplier respectively.", 
    "editor": [
      {
        "familyName": "Aranha", 
        "givenName": "Diego F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Menezes", 
        "givenName": "Alfred", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-16295-9_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.6208039", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6194109", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6188238", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6208637", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": {
      "isbn": [
        "978-3-319-16294-2", 
        "978-3-319-16295-9"
      ], 
      "name": "Progress in Cryptology - LATINCRYPT 2014", 
      "type": "Book"
    }, 
    "name": "Full-Size High-Security ECC Implementation on MSP430 Microcontrollers", 
    "pagination": "31-47", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-16295-9_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "25e9c6ace6cd3b5e01acc80357da5be8e1c8706588d18135c75ddf893f0ddc86"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1007958487"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-16295-9_2", 
      "https://app.dimensions.ai/details/publication/pub.1007958487"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T18:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000248.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-16295-9_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'


 

This table displays all metadata directly associated to this object as RDF triples.

192 TRIPLES      23 PREDICATES      48 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-16295-9_2 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N297e08dbe6d2475ca28de8cdff019489
4 schema:citation sg:pub.10.1007/11745853_14
5 sg:pub.10.1007/3-540-44586-2_27
6 sg:pub.10.1007/978-3-319-03515-4_16
7 sg:pub.10.1007/978-3-319-05960-0_3
8 sg:pub.10.1007/978-3-540-77690-1_19
9 sg:pub.10.1007/978-3-642-02384-2_23
10 sg:pub.10.1007/978-3-642-03356-8_19
11 sg:pub.10.1007/978-3-642-10628-6_17
12 sg:pub.10.1007/978-3-642-15031-9_8
13 sg:pub.10.1007/978-3-642-23951-9_30
14 sg:pub.10.1007/978-3-642-25286-0_3
15 sg:pub.10.1007/978-3-642-27257-8_11
16 sg:pub.10.1007/978-3-642-33027-8_19
17 sg:pub.10.1007/978-3-642-38553-7_9
18 sg:pub.10.1007/s00145-009-9049-y
19 sg:pub.10.1007/s13389-012-0029-z
20 sg:pub.10.1007/s13389-015-0093-2
21 https://doi.org/10.1090/s0025-5718-1987-0866113-7
22 https://doi.org/10.1109/ipsn.2008.47
23 https://doi.org/10.1109/sp.2008.31
24 https://doi.org/10.1145/1514274.1514276
25 schema:datePublished 2015
26 schema:datePublishedReg 2015-01-01
27 schema:description In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument’s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a \(16\times 16\)-bit or a \(32\times 32\)-bit hardware multiplier respectively.
28 schema:editor N90f1d04c6f87471482c72d536d760084
29 schema:genre chapter
30 schema:inLanguage en
31 schema:isAccessibleForFree false
32 schema:isPartOf Nfdfd8f4ce3a14447b9627e448a77f9d9
33 schema:name Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
34 schema:pagination 31-47
35 schema:productId N47cb97cbda584862bc90c3fd3a26596a
36 N8a9f4d8f4c97480c998695c56211bf00
37 Nd02671a24d6a41edbf4397bc4c768264
38 schema:publisher N9c021186084d40688d0e3e8436baa692
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007958487
40 https://doi.org/10.1007/978-3-319-16295-9_2
41 schema:sdDatePublished 2019-04-15T18:09
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N0ab8a0e2d2714c87bda37c73913c59d6
44 schema:url http://link.springer.com/10.1007/978-3-319-16295-9_2
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N00f989846cc34320851ded9fa4f06373 rdf:first sg:person.015303112617.60
49 rdf:rest Ndfc89355ade6415faee246f475fc40b5
50 N0ab8a0e2d2714c87bda37c73913c59d6 schema:name Springer Nature - SN SciGraph project
51 rdf:type schema:Organization
52 N1bb4090dd25b48dda6be0e62113cf079 schema:familyName Menezes
53 schema:givenName Alfred
54 rdf:type schema:Person
55 N297e08dbe6d2475ca28de8cdff019489 rdf:first sg:person.016347320117.34
56 rdf:rest N00f989846cc34320851ded9fa4f06373
57 N47cb97cbda584862bc90c3fd3a26596a schema:name readcube_id
58 schema:value 25e9c6ace6cd3b5e01acc80357da5be8e1c8706588d18135c75ddf893f0ddc86
59 rdf:type schema:PropertyValue
60 N6299d75bd0994b2eb7f2ebf9d16ab0aa rdf:first sg:person.010637555557.91
61 rdf:rest Nae0e5f8119b144858da319fef0c1c185
62 N8a9f4d8f4c97480c998695c56211bf00 schema:name doi
63 schema:value 10.1007/978-3-319-16295-9_2
64 rdf:type schema:PropertyValue
65 N90f1d04c6f87471482c72d536d760084 rdf:first Ne8a9cba887104835b9e28f947556bb40
66 rdf:rest Nfbd8d6710a1a46feba7e94f9c7fa0c6a
67 N9c021186084d40688d0e3e8436baa692 schema:location Cham
68 schema:name Springer International Publishing
69 rdf:type schema:Organisation
70 Nae0e5f8119b144858da319fef0c1c185 rdf:first sg:person.016666667155.68
71 rdf:rest rdf:nil
72 Nd02671a24d6a41edbf4397bc4c768264 schema:name dimensions_id
73 schema:value pub.1007958487
74 rdf:type schema:PropertyValue
75 Ndfc89355ade6415faee246f475fc40b5 rdf:first sg:person.014316344436.77
76 rdf:rest N6299d75bd0994b2eb7f2ebf9d16ab0aa
77 Ne8a9cba887104835b9e28f947556bb40 schema:familyName Aranha
78 schema:givenName Diego F.
79 rdf:type schema:Person
80 Nfbd8d6710a1a46feba7e94f9c7fa0c6a rdf:first N1bb4090dd25b48dda6be0e62113cf079
81 rdf:rest rdf:nil
82 Nfdfd8f4ce3a14447b9627e448a77f9d9 schema:isbn 978-3-319-16294-2
83 978-3-319-16295-9
84 schema:name Progress in Cryptology - LATINCRYPT 2014
85 rdf:type schema:Book
86 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
87 schema:name Technology
88 rdf:type schema:DefinedTerm
89 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
90 schema:name Communications Technologies
91 rdf:type schema:DefinedTerm
92 sg:grant.6188238 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
93 rdf:type schema:MonetaryGrant
94 sg:grant.6194109 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
95 rdf:type schema:MonetaryGrant
96 sg:grant.6208039 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
97 rdf:type schema:MonetaryGrant
98 sg:grant.6208637 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
99 rdf:type schema:MonetaryGrant
100 sg:person.010637555557.91 schema:affiliation https://www.grid.ac/institutes/grid.5590.9
101 schema:familyName Schwabe
102 schema:givenName Peter
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91
104 rdf:type schema:Person
105 sg:person.014316344436.77 schema:affiliation https://www.grid.ac/institutes/grid.410413.3
106 schema:familyName Hutter
107 schema:givenName Michael
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014316344436.77
109 rdf:type schema:Person
110 sg:person.015303112617.60 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
111 schema:familyName Moradi
112 schema:givenName Amir
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015303112617.60
114 rdf:type schema:Person
115 sg:person.016347320117.34 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
116 schema:familyName Hinterwälder
117 schema:givenName Gesine
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016347320117.34
119 rdf:type schema:Person
120 sg:person.016666667155.68 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
121 schema:familyName Paar
122 schema:givenName Christof
123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68
124 rdf:type schema:Person
125 sg:pub.10.1007/11745853_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030714294
126 https://doi.org/10.1007/11745853_14
127 rdf:type schema:CreativeWork
128 sg:pub.10.1007/3-540-44586-2_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049925081
129 https://doi.org/10.1007/3-540-44586-2_27
130 rdf:type schema:CreativeWork
131 sg:pub.10.1007/978-3-319-03515-4_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039355960
132 https://doi.org/10.1007/978-3-319-03515-4_16
133 rdf:type schema:CreativeWork
134 sg:pub.10.1007/978-3-319-05960-0_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027314402
135 https://doi.org/10.1007/978-3-319-05960-0_3
136 rdf:type schema:CreativeWork
137 sg:pub.10.1007/978-3-540-77690-1_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038588160
138 https://doi.org/10.1007/978-3-540-77690-1_19
139 rdf:type schema:CreativeWork
140 sg:pub.10.1007/978-3-642-02384-2_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004091122
141 https://doi.org/10.1007/978-3-642-02384-2_23
142 rdf:type schema:CreativeWork
143 sg:pub.10.1007/978-3-642-03356-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012320763
144 https://doi.org/10.1007/978-3-642-03356-8_19
145 rdf:type schema:CreativeWork
146 sg:pub.10.1007/978-3-642-10628-6_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003968777
147 https://doi.org/10.1007/978-3-642-10628-6_17
148 rdf:type schema:CreativeWork
149 sg:pub.10.1007/978-3-642-15031-9_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046226105
150 https://doi.org/10.1007/978-3-642-15031-9_8
151 rdf:type schema:CreativeWork
152 sg:pub.10.1007/978-3-642-23951-9_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047137953
153 https://doi.org/10.1007/978-3-642-23951-9_30
154 rdf:type schema:CreativeWork
155 sg:pub.10.1007/978-3-642-25286-0_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001715024
156 https://doi.org/10.1007/978-3-642-25286-0_3
157 rdf:type schema:CreativeWork
158 sg:pub.10.1007/978-3-642-27257-8_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043248200
159 https://doi.org/10.1007/978-3-642-27257-8_11
160 rdf:type schema:CreativeWork
161 sg:pub.10.1007/978-3-642-33027-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030639334
162 https://doi.org/10.1007/978-3-642-33027-8_19
163 rdf:type schema:CreativeWork
164 sg:pub.10.1007/978-3-642-38553-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009383266
165 https://doi.org/10.1007/978-3-642-38553-7_9
166 rdf:type schema:CreativeWork
167 sg:pub.10.1007/s00145-009-9049-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1017461552
168 https://doi.org/10.1007/s00145-009-9049-y
169 rdf:type schema:CreativeWork
170 sg:pub.10.1007/s13389-012-0029-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1002198320
171 https://doi.org/10.1007/s13389-012-0029-z
172 rdf:type schema:CreativeWork
173 sg:pub.10.1007/s13389-015-0093-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015478192
174 https://doi.org/10.1007/s13389-015-0093-2
175 rdf:type schema:CreativeWork
176 https://doi.org/10.1090/s0025-5718-1987-0866113-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050650230
177 rdf:type schema:CreativeWork
178 https://doi.org/10.1109/ipsn.2008.47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093251515
179 rdf:type schema:CreativeWork
180 https://doi.org/10.1109/sp.2008.31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095092296
181 rdf:type schema:CreativeWork
182 https://doi.org/10.1145/1514274.1514276 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001431469
183 rdf:type schema:CreativeWork
184 https://www.grid.ac/institutes/grid.410413.3 schema:alternateName Graz University of Technology
185 schema:name Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria
186 rdf:type schema:Organization
187 https://www.grid.ac/institutes/grid.5570.7 schema:alternateName Ruhr University Bochum
188 schema:name Horst Görtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany
189 rdf:type schema:Organization
190 https://www.grid.ac/institutes/grid.5590.9 schema:alternateName Radboud University Nijmegen
191 schema:name Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands
192 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...