Full-Size High-Security ECC Implementation on MSP430 Microcontrollers View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015

AUTHORS

Gesine Hinterwälder , Amir Moradi , Michael Hutter , Peter Schwabe , Christof Paar

ABSTRACT

In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument’s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a \(16\times 16\)-bit or a \(32\times 32\)-bit hardware multiplier respectively. More... »

PAGES

31-47

Book

TITLE

Progress in Cryptology - LATINCRYPT 2014

ISBN

978-3-319-16294-2
978-3-319-16295-9

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2

DOI

http://dx.doi.org/10.1007/978-3-319-16295-9_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1007958487


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hinterw\u00e4lder", 
        "givenName": "Gesine", 
        "id": "sg:person.016347320117.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016347320117.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moradi", 
        "givenName": "Amir", 
        "id": "sg:person.015303112617.60", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015303112617.60"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Graz University of Technology", 
          "id": "https://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hutter", 
        "givenName": "Michael", 
        "id": "sg:person.014316344436.77", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014316344436.77"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Radboud University Nijmegen", 
          "id": "https://www.grid.ac/institutes/grid.5590.9", 
          "name": [
            "Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schwabe", 
        "givenName": "Peter", 
        "id": "sg:person.010637555557.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Paar", 
        "givenName": "Christof", 
        "id": "sg:person.016666667155.68", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/1514274.1514276", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001431469"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-25286-0_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001715024", 
          "https://doi.org/10.1007/978-3-642-25286-0_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13389-012-0029-z", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002198320", 
          "https://doi.org/10.1007/s13389-012-0029-z"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10628-6_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003968777", 
          "https://doi.org/10.1007/978-3-642-10628-6_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10628-6_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003968777", 
          "https://doi.org/10.1007/978-3-642-10628-6_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-02384-2_23", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004091122", 
          "https://doi.org/10.1007/978-3-642-02384-2_23"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-38553-7_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009383266", 
          "https://doi.org/10.1007/978-3-642-38553-7_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-03356-8_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012320763", 
          "https://doi.org/10.1007/978-3-642-03356-8_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13389-015-0093-2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015478192", 
          "https://doi.org/10.1007/s13389-015-0093-2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00145-009-9049-y", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017461552", 
          "https://doi.org/10.1007/s00145-009-9049-y"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-05960-0_3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027314402", 
          "https://doi.org/10.1007/978-3-319-05960-0_3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-33027-8_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030639334", 
          "https://doi.org/10.1007/978-3-642-33027-8_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/11745853_14", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1030714294", 
          "https://doi.org/10.1007/11745853_14"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1038588160", 
          "https://doi.org/10.1007/978-3-540-77690-1_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-03515-4_16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039355960", 
          "https://doi.org/10.1007/978-3-319-03515-4_16"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-27257-8_11", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1043248200", 
          "https://doi.org/10.1007/978-3-642-27257-8_11"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046226105", 
          "https://doi.org/10.1007/978-3-642-15031-9_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046226105", 
          "https://doi.org/10.1007/978-3-642-15031-9_8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-23951-9_30", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047137953", 
          "https://doi.org/10.1007/978-3-642-23951-9_30"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44586-2_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049925081", 
          "https://doi.org/10.1007/3-540-44586-2_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44586-2_27", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049925081", 
          "https://doi.org/10.1007/3-540-44586-2_27"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1090/s0025-5718-1987-0866113-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050650230"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ipsn.2008.47", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093251515"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2008.31", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095092296"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2015", 
    "datePublishedReg": "2015-01-01", 
    "description": "In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument\u2019s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1\u00a0million or 6.5\u00a0million cycles on MSP430Xs having a \\(16\\times 16\\)-bit or a \\(32\\times 32\\)-bit hardware multiplier respectively.", 
    "editor": [
      {
        "familyName": "Aranha", 
        "givenName": "Diego F.", 
        "type": "Person"
      }, 
      {
        "familyName": "Menezes", 
        "givenName": "Alfred", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-16295-9_2", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.6208039", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6194109", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6188238", 
        "type": "MonetaryGrant"
      }, 
      {
        "id": "sg:grant.6208637", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": {
      "isbn": [
        "978-3-319-16294-2", 
        "978-3-319-16295-9"
      ], 
      "name": "Progress in Cryptology - LATINCRYPT 2014", 
      "type": "Book"
    }, 
    "name": "Full-Size High-Security ECC Implementation on MSP430 Microcontrollers", 
    "pagination": "31-47", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-16295-9_2"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "25e9c6ace6cd3b5e01acc80357da5be8e1c8706588d18135c75ddf893f0ddc86"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1007958487"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-16295-9_2", 
      "https://app.dimensions.ai/details/publication/pub.1007958487"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T18:09", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000248.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-16295-9_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'


 

This table displays all metadata directly associated to this object as RDF triples.

192 TRIPLES      23 PREDICATES      48 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-16295-9_2 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N597df5a75c7c4c338ba7b70c6428d4a5
4 schema:citation sg:pub.10.1007/11745853_14
5 sg:pub.10.1007/3-540-44586-2_27
6 sg:pub.10.1007/978-3-319-03515-4_16
7 sg:pub.10.1007/978-3-319-05960-0_3
8 sg:pub.10.1007/978-3-540-77690-1_19
9 sg:pub.10.1007/978-3-642-02384-2_23
10 sg:pub.10.1007/978-3-642-03356-8_19
11 sg:pub.10.1007/978-3-642-10628-6_17
12 sg:pub.10.1007/978-3-642-15031-9_8
13 sg:pub.10.1007/978-3-642-23951-9_30
14 sg:pub.10.1007/978-3-642-25286-0_3
15 sg:pub.10.1007/978-3-642-27257-8_11
16 sg:pub.10.1007/978-3-642-33027-8_19
17 sg:pub.10.1007/978-3-642-38553-7_9
18 sg:pub.10.1007/s00145-009-9049-y
19 sg:pub.10.1007/s13389-012-0029-z
20 sg:pub.10.1007/s13389-015-0093-2
21 https://doi.org/10.1090/s0025-5718-1987-0866113-7
22 https://doi.org/10.1109/ipsn.2008.47
23 https://doi.org/10.1109/sp.2008.31
24 https://doi.org/10.1145/1514274.1514276
25 schema:datePublished 2015
26 schema:datePublishedReg 2015-01-01
27 schema:description In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument’s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a \(16\times 16\)-bit or a \(32\times 32\)-bit hardware multiplier respectively.
28 schema:editor N5b28e0220659459f8932b71608b4ccea
29 schema:genre chapter
30 schema:inLanguage en
31 schema:isAccessibleForFree false
32 schema:isPartOf N3ddee712000747e0b630c4fa06ac2f11
33 schema:name Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
34 schema:pagination 31-47
35 schema:productId N3ea6a524abad4b669f0108c96f355862
36 N87d651a5b9844b7da1c3c9eb0a82d8ba
37 Nb0d808e710da47c5b01354fd0ea67de9
38 schema:publisher Necfbe8f81b52452eabac26e9ba666ac7
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007958487
40 https://doi.org/10.1007/978-3-319-16295-9_2
41 schema:sdDatePublished 2019-04-15T18:09
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher Ne88f722885934854a7d2497d5cab634f
44 schema:url http://link.springer.com/10.1007/978-3-319-16295-9_2
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N266b24abd1ef4160b8452f899e1fba90 schema:familyName Menezes
49 schema:givenName Alfred
50 rdf:type schema:Person
51 N26eaf1d0c2d54690b5ecacbeff2d00b5 schema:familyName Aranha
52 schema:givenName Diego F.
53 rdf:type schema:Person
54 N321b5794208441b492133cc63219cb09 rdf:first sg:person.010637555557.91
55 rdf:rest N915ab70deb4a4556aac2f6db3189ac23
56 N3ddee712000747e0b630c4fa06ac2f11 schema:isbn 978-3-319-16294-2
57 978-3-319-16295-9
58 schema:name Progress in Cryptology - LATINCRYPT 2014
59 rdf:type schema:Book
60 N3ea6a524abad4b669f0108c96f355862 schema:name doi
61 schema:value 10.1007/978-3-319-16295-9_2
62 rdf:type schema:PropertyValue
63 N597df5a75c7c4c338ba7b70c6428d4a5 rdf:first sg:person.016347320117.34
64 rdf:rest Nfa7126bada924b2b8807ec2cc149efe9
65 N5b28e0220659459f8932b71608b4ccea rdf:first N26eaf1d0c2d54690b5ecacbeff2d00b5
66 rdf:rest Ncb77d5b15c2e4a0188e3f9ba34fc2cd0
67 N87d651a5b9844b7da1c3c9eb0a82d8ba schema:name readcube_id
68 schema:value 25e9c6ace6cd3b5e01acc80357da5be8e1c8706588d18135c75ddf893f0ddc86
69 rdf:type schema:PropertyValue
70 N915ab70deb4a4556aac2f6db3189ac23 rdf:first sg:person.016666667155.68
71 rdf:rest rdf:nil
72 Na714a3abc5d743c097d6601df190c9d1 rdf:first sg:person.014316344436.77
73 rdf:rest N321b5794208441b492133cc63219cb09
74 Nb0d808e710da47c5b01354fd0ea67de9 schema:name dimensions_id
75 schema:value pub.1007958487
76 rdf:type schema:PropertyValue
77 Ncb77d5b15c2e4a0188e3f9ba34fc2cd0 rdf:first N266b24abd1ef4160b8452f899e1fba90
78 rdf:rest rdf:nil
79 Ne88f722885934854a7d2497d5cab634f schema:name Springer Nature - SN SciGraph project
80 rdf:type schema:Organization
81 Necfbe8f81b52452eabac26e9ba666ac7 schema:location Cham
82 schema:name Springer International Publishing
83 rdf:type schema:Organisation
84 Nfa7126bada924b2b8807ec2cc149efe9 rdf:first sg:person.015303112617.60
85 rdf:rest Na714a3abc5d743c097d6601df190c9d1
86 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
87 schema:name Technology
88 rdf:type schema:DefinedTerm
89 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
90 schema:name Communications Technologies
91 rdf:type schema:DefinedTerm
92 sg:grant.6188238 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
93 rdf:type schema:MonetaryGrant
94 sg:grant.6194109 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
95 rdf:type schema:MonetaryGrant
96 sg:grant.6208039 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
97 rdf:type schema:MonetaryGrant
98 sg:grant.6208637 http://pending.schema.org/fundedItem sg:pub.10.1007/978-3-319-16295-9_2
99 rdf:type schema:MonetaryGrant
100 sg:person.010637555557.91 schema:affiliation https://www.grid.ac/institutes/grid.5590.9
101 schema:familyName Schwabe
102 schema:givenName Peter
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91
104 rdf:type schema:Person
105 sg:person.014316344436.77 schema:affiliation https://www.grid.ac/institutes/grid.410413.3
106 schema:familyName Hutter
107 schema:givenName Michael
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014316344436.77
109 rdf:type schema:Person
110 sg:person.015303112617.60 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
111 schema:familyName Moradi
112 schema:givenName Amir
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015303112617.60
114 rdf:type schema:Person
115 sg:person.016347320117.34 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
116 schema:familyName Hinterwälder
117 schema:givenName Gesine
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016347320117.34
119 rdf:type schema:Person
120 sg:person.016666667155.68 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
121 schema:familyName Paar
122 schema:givenName Christof
123 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68
124 rdf:type schema:Person
125 sg:pub.10.1007/11745853_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030714294
126 https://doi.org/10.1007/11745853_14
127 rdf:type schema:CreativeWork
128 sg:pub.10.1007/3-540-44586-2_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049925081
129 https://doi.org/10.1007/3-540-44586-2_27
130 rdf:type schema:CreativeWork
131 sg:pub.10.1007/978-3-319-03515-4_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039355960
132 https://doi.org/10.1007/978-3-319-03515-4_16
133 rdf:type schema:CreativeWork
134 sg:pub.10.1007/978-3-319-05960-0_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027314402
135 https://doi.org/10.1007/978-3-319-05960-0_3
136 rdf:type schema:CreativeWork
137 sg:pub.10.1007/978-3-540-77690-1_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038588160
138 https://doi.org/10.1007/978-3-540-77690-1_19
139 rdf:type schema:CreativeWork
140 sg:pub.10.1007/978-3-642-02384-2_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004091122
141 https://doi.org/10.1007/978-3-642-02384-2_23
142 rdf:type schema:CreativeWork
143 sg:pub.10.1007/978-3-642-03356-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012320763
144 https://doi.org/10.1007/978-3-642-03356-8_19
145 rdf:type schema:CreativeWork
146 sg:pub.10.1007/978-3-642-10628-6_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003968777
147 https://doi.org/10.1007/978-3-642-10628-6_17
148 rdf:type schema:CreativeWork
149 sg:pub.10.1007/978-3-642-15031-9_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046226105
150 https://doi.org/10.1007/978-3-642-15031-9_8
151 rdf:type schema:CreativeWork
152 sg:pub.10.1007/978-3-642-23951-9_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047137953
153 https://doi.org/10.1007/978-3-642-23951-9_30
154 rdf:type schema:CreativeWork
155 sg:pub.10.1007/978-3-642-25286-0_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001715024
156 https://doi.org/10.1007/978-3-642-25286-0_3
157 rdf:type schema:CreativeWork
158 sg:pub.10.1007/978-3-642-27257-8_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043248200
159 https://doi.org/10.1007/978-3-642-27257-8_11
160 rdf:type schema:CreativeWork
161 sg:pub.10.1007/978-3-642-33027-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030639334
162 https://doi.org/10.1007/978-3-642-33027-8_19
163 rdf:type schema:CreativeWork
164 sg:pub.10.1007/978-3-642-38553-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009383266
165 https://doi.org/10.1007/978-3-642-38553-7_9
166 rdf:type schema:CreativeWork
167 sg:pub.10.1007/s00145-009-9049-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1017461552
168 https://doi.org/10.1007/s00145-009-9049-y
169 rdf:type schema:CreativeWork
170 sg:pub.10.1007/s13389-012-0029-z schema:sameAs https://app.dimensions.ai/details/publication/pub.1002198320
171 https://doi.org/10.1007/s13389-012-0029-z
172 rdf:type schema:CreativeWork
173 sg:pub.10.1007/s13389-015-0093-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015478192
174 https://doi.org/10.1007/s13389-015-0093-2
175 rdf:type schema:CreativeWork
176 https://doi.org/10.1090/s0025-5718-1987-0866113-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050650230
177 rdf:type schema:CreativeWork
178 https://doi.org/10.1109/ipsn.2008.47 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093251515
179 rdf:type schema:CreativeWork
180 https://doi.org/10.1109/sp.2008.31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095092296
181 rdf:type schema:CreativeWork
182 https://doi.org/10.1145/1514274.1514276 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001431469
183 rdf:type schema:CreativeWork
184 https://www.grid.ac/institutes/grid.410413.3 schema:alternateName Graz University of Technology
185 schema:name Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria
186 rdf:type schema:Organization
187 https://www.grid.ac/institutes/grid.5570.7 schema:alternateName Ruhr University Bochum
188 schema:name Horst Görtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany
189 rdf:type schema:Organization
190 https://www.grid.ac/institutes/grid.5590.9 schema:alternateName Radboud University Nijmegen
191 schema:name Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands
192 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...