Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2015

AUTHORS

Marcin Andrychowicz , Daniel Masny , Edoardo Persichetti

ABSTRACT

Information leakage is a major concern in modern day IT-security. In fact, a malicious user is often able to extract information about private values from the computation performed on the devices. In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks. In this paper, we present a framework to make cryptographic primitives based on large finite fields robust against information leakage with a bounded computational cost. The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model. Furthermore, we show how to apply the proposed techniques to the authentication protocol Lapin, and we compare it to existing solutions. More... »

PAGES

655-674

References to SciGraph publications

  • 2012. Theory and Practice of a Leakage Resilient Masking Scheme in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2012
  • 2005. Elliptic Curve Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2010. Leakage-Resilient Storage in SECURITY AND CRYPTOGRAPHY FOR NETWORKS
  • 2014. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis in ADVANCES IN CRYPTOLOGY – CRYPTO 2014
  • 2012. Leakage-Resilient Circuits without Computational Assumptions in THEORY OF CRYPTOGRAPHY
  • 2013. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs in ADVANCES IN CRYPTOLOGY – CRYPTO 2013
  • 2010. Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • 2010. Securing Computation against Continuous Leakage in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2004. Physically Observable Cryptography in THEORY OF CRYPTOGRAPHY
  • 2014. On the Practical Security of a Leakage Resilient Masking Scheme in TOPICS IN CRYPTOLOGY – CT-RSA 2014
  • 2010. Leakage-Resilient Signatures in THEORY OF CRYPTOGRAPHY
  • 2014. Hardware Implementation and Side-Channel Analysis of Lapin in TOPICS IN CRYPTOLOGY – CT-RSA 2014
  • 2003. Private Circuits: Securing Hardware against Probing Attacks in ADVANCES IN CRYPTOLOGY - CRYPTO 2003
  • 2010. Provably Secure Higher-Order Masking of AES in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2011. Leakage-Resilient Cryptography from the Inner-Product Extractor in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2011
  • 2011. Higher-Order Glitches Free Implementation of the AES Using Secure Multi-party Computation Protocols in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2011
  • 2012. Lapin: An Efficient Authentication Protocol Based on Ring-LPN in FAST SOFTWARE ENCRYPTION
  • 2010. Protecting Cryptographic Keys against Continual Leakage in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • Book

    TITLE

    Applied Cryptography and Network Security

    ISBN

    978-3-319-28165-0
    978-3-319-28166-7

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-28166-7_32

    DOI

    http://dx.doi.org/10.1007/978-3-319-28166-7_32

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1007780973


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of Warsaw", 
              "id": "https://www.grid.ac/institutes/grid.12847.38", 
              "name": [
                "University of Warsaw"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Andrychowicz", 
            "givenName": "Marcin", 
            "id": "sg:person.010125136035.18", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010125136035.18"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "HGI, Ruhr-Universit\u00e4t Bochum"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Masny", 
            "givenName": "Daniel", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Dakota State University", 
              "id": "https://www.grid.ac/institutes/grid.254833.b", 
              "name": [
                "Dakota State University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Persichetti", 
            "givenName": "Edoardo", 
            "id": "sg:person.015327600132.90", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015327600132.90"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-45146-4_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004401764", 
              "https://doi.org/10.1007/978-3-540-45146-4_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006594902", 
              "https://doi.org/10.1007/978-3-642-14623-7_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006594902", 
              "https://doi.org/10.1007/978-3-642-14623-7_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-44371-2_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008243221", 
              "https://doi.org/10.1007/978-3-662-44371-2_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-40084-1_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010980912", 
              "https://doi.org/10.1007/978-3-642-40084-1_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-04852-9_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013887799", 
              "https://doi.org/10.1007/978-3-319-04852-9_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/0-387-23483-7_131", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021349612", 
              "https://doi.org/10.1007/0-387-23483-7_131"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34047-5_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024908214", 
              "https://doi.org/10.1007/978-3-642-34047-5_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027621097", 
              "https://doi.org/10.1007/978-3-642-15031-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027621097", 
              "https://doi.org/10.1007/978-3-642-15031-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-23951-9_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028987380", 
              "https://doi.org/10.1007/978-3-642-23951-9_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-23951-9_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028987380", 
              "https://doi.org/10.1007/978-3-642-23951-9_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24638-1_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029805716", 
              "https://doi.org/10.1007/978-3-540-24638-1_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24638-1_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029805716", 
              "https://doi.org/10.1007/978-3-540-24638-1_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040247219", 
              "https://doi.org/10.1007/978-3-642-13190-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040247219", 
              "https://doi.org/10.1007/978-3-642-13190-5_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-04852-9_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040453807", 
              "https://doi.org/10.1007/978-3-319-04852-9_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040849851", 
              "https://doi.org/10.1007/978-3-642-14623-7_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040849851", 
              "https://doi.org/10.1007/978-3-642-14623-7_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-28914-9_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041004111", 
              "https://doi.org/10.1007/978-3-642-28914-9_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-11799-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041489268", 
              "https://doi.org/10.1007/978-3-642-11799-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-11799-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041489268", 
              "https://doi.org/10.1007/978-3-642-11799-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15317-4_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041512820", 
              "https://doi.org/10.1007/978-3-642-15317-4_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15317-4_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041512820", 
              "https://doi.org/10.1007/978-3-642-15317-4_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25385-0_38", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043774376", 
              "https://doi.org/10.1007/978-3-642-25385-0_38"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34961-4_45", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048010039", 
              "https://doi.org/10.1007/978-3-642-34961-4_45"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/0217015", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062842034"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/focs.2010.56", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1093631546"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/focs.2008.56", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094005302"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/focs.2010.55", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094492776"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/focs.2012.34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095630092"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2015", 
        "datePublishedReg": "2015-01-01", 
        "description": "Information leakage is a major concern in modern day IT-security. In fact, a malicious user is often able to extract information about private values from the computation performed on the devices. In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks. In this paper, we present a framework to make cryptographic primitives based on large finite fields robust against information leakage with a bounded computational cost. The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model. Furthermore, we show how to apply the proposed techniques to the authentication protocol Lapin, and we compare it to existing solutions.", 
        "editor": [
          {
            "familyName": "Malkin", 
            "givenName": "Tal", 
            "type": "Person"
          }, 
          {
            "familyName": "Kolesnikov", 
            "givenName": "Vladimir", 
            "type": "Person"
          }, 
          {
            "familyName": "Lewko", 
            "givenName": "Allison Bishop", 
            "type": "Person"
          }, 
          {
            "familyName": "Polychronakis", 
            "givenName": "Michalis", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-28166-7_32", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-28165-0", 
            "978-3-319-28166-7"
          ], 
          "name": "Applied Cryptography and Network Security", 
          "type": "Book"
        }, 
        "name": "Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice", 
        "pagination": "655-674", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-28166-7_32"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "25105d51f2e38e0323e19dacc4c591c9b820cbce68458ecae8736901146d4591"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1007780973"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-28166-7_32", 
          "https://app.dimensions.ai/details/publication/pub.1007780973"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T14:22", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000247.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-28166-7_32"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28166-7_32'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28166-7_32'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28166-7_32'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-28166-7_32'


     

    This table displays all metadata directly associated to this object as RDF triples.

    185 TRIPLES      23 PREDICATES      50 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-28166-7_32 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N9b80cf5a50f74d0aa513d7f045c8a557
    4 schema:citation sg:pub.10.1007/0-387-23483-7_131
    5 sg:pub.10.1007/978-3-319-04852-9_11
    6 sg:pub.10.1007/978-3-319-04852-9_9
    7 sg:pub.10.1007/978-3-540-24638-1_16
    8 sg:pub.10.1007/978-3-540-45146-4_27
    9 sg:pub.10.1007/978-3-642-11799-2_21
    10 sg:pub.10.1007/978-3-642-13190-5_7
    11 sg:pub.10.1007/978-3-642-14623-7_3
    12 sg:pub.10.1007/978-3-642-14623-7_4
    13 sg:pub.10.1007/978-3-642-15031-9_28
    14 sg:pub.10.1007/978-3-642-15317-4_9
    15 sg:pub.10.1007/978-3-642-23951-9_5
    16 sg:pub.10.1007/978-3-642-25385-0_38
    17 sg:pub.10.1007/978-3-642-28914-9_13
    18 sg:pub.10.1007/978-3-642-34047-5_20
    19 sg:pub.10.1007/978-3-642-34961-4_45
    20 sg:pub.10.1007/978-3-642-40084-1_18
    21 sg:pub.10.1007/978-3-662-44371-2_25
    22 https://doi.org/10.1109/focs.2008.56
    23 https://doi.org/10.1109/focs.2010.55
    24 https://doi.org/10.1109/focs.2010.56
    25 https://doi.org/10.1109/focs.2012.34
    26 https://doi.org/10.1137/0217015
    27 schema:datePublished 2015
    28 schema:datePublishedReg 2015-01-01
    29 schema:description Information leakage is a major concern in modern day IT-security. In fact, a malicious user is often able to extract information about private values from the computation performed on the devices. In specific settings, such as RFID, where a low computational complexity is required, it is hard to apply standard techniques to achieve resilience against this kind of attacks. In this paper, we present a framework to make cryptographic primitives based on large finite fields robust against information leakage with a bounded computational cost. The approach makes use of the inner product extractor and guarantees security in the presence of leakage in a widely accepted model. Furthermore, we show how to apply the proposed techniques to the authentication protocol Lapin, and we compare it to existing solutions.
    30 schema:editor N186360ea8c5e41c5af4c1d49c163ffbb
    31 schema:genre chapter
    32 schema:inLanguage en
    33 schema:isAccessibleForFree false
    34 schema:isPartOf N73e343f300ff40f4a9ff4db6736538ff
    35 schema:name Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
    36 schema:pagination 655-674
    37 schema:productId N60c2983177504d6d88601b2b66356c01
    38 N61bd1674e17d48c0ae5e566188db9b1e
    39 Neb667cccffe34f38a4bc211f466b335a
    40 schema:publisher Ne417cded430d498eb0db46baae43b533
    41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007780973
    42 https://doi.org/10.1007/978-3-319-28166-7_32
    43 schema:sdDatePublished 2019-04-15T14:22
    44 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    45 schema:sdPublisher N975b19fe9a8c4bedaaf1f575c1b6fc6d
    46 schema:url http://link.springer.com/10.1007/978-3-319-28166-7_32
    47 sgo:license sg:explorer/license/
    48 sgo:sdDataset chapters
    49 rdf:type schema:Chapter
    50 N01143ac925b84907ab2fef34cfe60f5d schema:familyName Polychronakis
    51 schema:givenName Michalis
    52 rdf:type schema:Person
    53 N0c4334c0c0c5401a888d487607a21641 schema:affiliation N2e71dd1637d94089ac19c41a81e28b0e
    54 schema:familyName Masny
    55 schema:givenName Daniel
    56 rdf:type schema:Person
    57 N186360ea8c5e41c5af4c1d49c163ffbb rdf:first N2e43ba13180d4077ba9089c40327e6fc
    58 rdf:rest N5082b69abb324fb4a10bf01ad4926631
    59 N2e43ba13180d4077ba9089c40327e6fc schema:familyName Malkin
    60 schema:givenName Tal
    61 rdf:type schema:Person
    62 N2e71dd1637d94089ac19c41a81e28b0e schema:name HGI, Ruhr-Universität Bochum
    63 rdf:type schema:Organization
    64 N41dbd2d0891245ab8fd333ac1ede142d schema:familyName Kolesnikov
    65 schema:givenName Vladimir
    66 rdf:type schema:Person
    67 N5082b69abb324fb4a10bf01ad4926631 rdf:first N41dbd2d0891245ab8fd333ac1ede142d
    68 rdf:rest Nc8e1379c27e74f4eb216f5747aafde91
    69 N60c2983177504d6d88601b2b66356c01 schema:name readcube_id
    70 schema:value 25105d51f2e38e0323e19dacc4c591c9b820cbce68458ecae8736901146d4591
    71 rdf:type schema:PropertyValue
    72 N61bd1674e17d48c0ae5e566188db9b1e schema:name doi
    73 schema:value 10.1007/978-3-319-28166-7_32
    74 rdf:type schema:PropertyValue
    75 N73e343f300ff40f4a9ff4db6736538ff schema:isbn 978-3-319-28165-0
    76 978-3-319-28166-7
    77 schema:name Applied Cryptography and Network Security
    78 rdf:type schema:Book
    79 N906460baa638454dbfb3f5fb15eef9c7 rdf:first N0c4334c0c0c5401a888d487607a21641
    80 rdf:rest N9231ad12f0264c4dbbcbac33131b43ea
    81 N9231ad12f0264c4dbbcbac33131b43ea rdf:first sg:person.015327600132.90
    82 rdf:rest rdf:nil
    83 N95700c4f03f54145be5e48500b3d2f3d rdf:first N01143ac925b84907ab2fef34cfe60f5d
    84 rdf:rest rdf:nil
    85 N975b19fe9a8c4bedaaf1f575c1b6fc6d schema:name Springer Nature - SN SciGraph project
    86 rdf:type schema:Organization
    87 N9b80cf5a50f74d0aa513d7f045c8a557 rdf:first sg:person.010125136035.18
    88 rdf:rest N906460baa638454dbfb3f5fb15eef9c7
    89 Na06d19fd8287483fb5ac01a49e5d867e schema:familyName Lewko
    90 schema:givenName Allison Bishop
    91 rdf:type schema:Person
    92 Nc8e1379c27e74f4eb216f5747aafde91 rdf:first Na06d19fd8287483fb5ac01a49e5d867e
    93 rdf:rest N95700c4f03f54145be5e48500b3d2f3d
    94 Ne417cded430d498eb0db46baae43b533 schema:location Cham
    95 schema:name Springer International Publishing
    96 rdf:type schema:Organisation
    97 Neb667cccffe34f38a4bc211f466b335a schema:name dimensions_id
    98 schema:value pub.1007780973
    99 rdf:type schema:PropertyValue
    100 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    101 schema:name Information and Computing Sciences
    102 rdf:type schema:DefinedTerm
    103 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    104 schema:name Data Format
    105 rdf:type schema:DefinedTerm
    106 sg:person.010125136035.18 schema:affiliation https://www.grid.ac/institutes/grid.12847.38
    107 schema:familyName Andrychowicz
    108 schema:givenName Marcin
    109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010125136035.18
    110 rdf:type schema:Person
    111 sg:person.015327600132.90 schema:affiliation https://www.grid.ac/institutes/grid.254833.b
    112 schema:familyName Persichetti
    113 schema:givenName Edoardo
    114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015327600132.90
    115 rdf:type schema:Person
    116 sg:pub.10.1007/0-387-23483-7_131 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021349612
    117 https://doi.org/10.1007/0-387-23483-7_131
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/978-3-319-04852-9_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040453807
    120 https://doi.org/10.1007/978-3-319-04852-9_11
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/978-3-319-04852-9_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013887799
    123 https://doi.org/10.1007/978-3-319-04852-9_9
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-24638-1_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029805716
    126 https://doi.org/10.1007/978-3-540-24638-1_16
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-540-45146-4_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004401764
    129 https://doi.org/10.1007/978-3-540-45146-4_27
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-642-11799-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041489268
    132 https://doi.org/10.1007/978-3-642-11799-2_21
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-642-13190-5_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040247219
    135 https://doi.org/10.1007/978-3-642-13190-5_7
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-642-14623-7_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040849851
    138 https://doi.org/10.1007/978-3-642-14623-7_3
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/978-3-642-14623-7_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006594902
    141 https://doi.org/10.1007/978-3-642-14623-7_4
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/978-3-642-15031-9_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027621097
    144 https://doi.org/10.1007/978-3-642-15031-9_28
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1007/978-3-642-15317-4_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041512820
    147 https://doi.org/10.1007/978-3-642-15317-4_9
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1007/978-3-642-23951-9_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028987380
    150 https://doi.org/10.1007/978-3-642-23951-9_5
    151 rdf:type schema:CreativeWork
    152 sg:pub.10.1007/978-3-642-25385-0_38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043774376
    153 https://doi.org/10.1007/978-3-642-25385-0_38
    154 rdf:type schema:CreativeWork
    155 sg:pub.10.1007/978-3-642-28914-9_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041004111
    156 https://doi.org/10.1007/978-3-642-28914-9_13
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1007/978-3-642-34047-5_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024908214
    159 https://doi.org/10.1007/978-3-642-34047-5_20
    160 rdf:type schema:CreativeWork
    161 sg:pub.10.1007/978-3-642-34961-4_45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048010039
    162 https://doi.org/10.1007/978-3-642-34961-4_45
    163 rdf:type schema:CreativeWork
    164 sg:pub.10.1007/978-3-642-40084-1_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010980912
    165 https://doi.org/10.1007/978-3-642-40084-1_18
    166 rdf:type schema:CreativeWork
    167 sg:pub.10.1007/978-3-662-44371-2_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008243221
    168 https://doi.org/10.1007/978-3-662-44371-2_25
    169 rdf:type schema:CreativeWork
    170 https://doi.org/10.1109/focs.2008.56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094005302
    171 rdf:type schema:CreativeWork
    172 https://doi.org/10.1109/focs.2010.55 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094492776
    173 rdf:type schema:CreativeWork
    174 https://doi.org/10.1109/focs.2010.56 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093631546
    175 rdf:type schema:CreativeWork
    176 https://doi.org/10.1109/focs.2012.34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095630092
    177 rdf:type schema:CreativeWork
    178 https://doi.org/10.1137/0217015 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062842034
    179 rdf:type schema:CreativeWork
    180 https://www.grid.ac/institutes/grid.12847.38 schema:alternateName University of Warsaw
    181 schema:name University of Warsaw
    182 rdf:type schema:Organization
    183 https://www.grid.ac/institutes/grid.254833.b schema:alternateName Dakota State University
    184 schema:name Dakota State University
    185 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...