Secure Binary Field Multiplication View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hwajeong Seo , Chien-Ning Chen , Zhe Liu , Yasuyuki Nogami , Taehwan Park , Jongseok Choi , Howon Kim

ABSTRACT

Binary field multiplication is the most fundamental building block of binary field Elliptic Curve Cryptography (ECC) and Galois/Counter Mode (GCM). Both bit-wise scanning and Look-Up Table (LUT) based methods are commonly used for binary field multiplication. In terms of Side Channel Attack (SCA), bit-wise scanning exploits insecure branch operations which leaks information in a form of timing and power consumption. On the other hands, LUT based method is regarded as a relatively secure approach because LUT access can be conducted in a regular and atomic form. This ensures a constant time solution as well. In this paper, we conduct the SCA on the LUT based binary field multiplication. The attack exploits the horizontal Correlation Power Analysis (CPA) on weights of LUT. We identify the operand with only a power trace of binary field multiplication. In order to prevent SCA, we also suggest a mask based binary field multiplication which ensures a regular and constant time solution without LUT and branch statements. More... »

PAGES

161-173

References to SciGraph publications

  • 2002-04-26. High-Speed Software Multiplication in F2m in PROGRESS IN CRYPTOLOGY —INDOCRYPT 2000
  • 2010. Horizontal Correlation Analysis on Exponentiation in INFORMATION AND COMMUNICATIONS SECURITY
  • 2005. Elliptic Curve Cryptography in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2004. Correlation Power Analysis with a Leakage Model in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004
  • 2015. Implementing GCM on ARMv8 in TOPICS IN CRYPTOLOGY –- CT-RSA 2015
  • 1999. Differential Power Analysis in ADVANCES IN CRYPTOLOGY — CRYPTO’ 99
  • 1999. Towards Sound Approaches to Counteract Power-Analysis Attacks in ADVANCES IN CRYPTOLOGY — CRYPTO’ 99
  • 2008. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks in WIRELESS SENSOR NETWORKS
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-319-31874-5
    978-3-319-31875-2

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_14

    DOI

    http://dx.doi.org/10.1007/978-3-319-31875-2_14

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1039900683


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Seo", 
            "givenName": "Hwajeong", 
            "id": "sg:person.015101423711.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Physical Analysis and Cryptographic Engineering (PACE), Nanyang Technological University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chen", 
            "givenName": "Chien-Ning", 
            "id": "sg:person.07704702402.00", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07704702402.00"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Luxembourg", 
              "id": "https://www.grid.ac/institutes/grid.16008.3f", 
              "name": [
                "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Zhe", 
            "id": "sg:person.013144776623.84", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Okayama University", 
              "id": "https://www.grid.ac/institutes/grid.261356.5", 
              "name": [
                "Graduate School of Natural Science and Technology, Okayama University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Nogami", 
            "givenName": "Yasuyuki", 
            "id": "sg:person.012253411571.23", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012253411571.23"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Park", 
            "givenName": "Taehwan", 
            "id": "sg:person.014133561767.73", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Choi", 
            "givenName": "Jongseok", 
            "id": "sg:person.016515567115.78", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kim", 
            "givenName": "Howon", 
            "id": "sg:person.010610076315.82", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-48405-1_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005179729", 
              "https://doi.org/10.1007/3-540-48405-1_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16715-2_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009262612", 
              "https://doi.org/10.1007/978-3-319-16715-2_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/0-387-23483-7_131", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021349612", 
              "https://doi.org/10.1007/0-387-23483-7_131"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44495-5_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025775208", 
              "https://doi.org/10.1007/3-540-44495-5_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44495-5_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025775208", 
              "https://doi.org/10.1007/3-540-44495-5_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/sec.779", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027427614"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038588160", 
              "https://doi.org/10.1007/978-3-540-77690-1_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-77690-1_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038588160", 
              "https://doi.org/10.1007/978-3-540-77690-1_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1002/sec.1237", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038769696"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48405-1_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040315853", 
              "https://doi.org/10.1007/3-540-48405-1_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046806925", 
              "https://doi.org/10.1007/978-3-540-28632-5_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28632-5_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046806925", 
              "https://doi.org/10.1007/978-3-540-28632-5_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/j.comcom.2010.05.013", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049861377"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1093/ietisy/e91-d.5.1338", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1059672560"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1587/transinf.e92.d.909", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1068093435"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1587/transinf.e92.d.909", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1068093435"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3934/amc.2010.4.169", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1071730649"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2016", 
        "datePublishedReg": "2016-01-01", 
        "description": "Binary field multiplication is the most fundamental building block of binary field Elliptic Curve Cryptography (ECC) and Galois/Counter Mode (GCM). Both bit-wise scanning and Look-Up Table (LUT) based methods are commonly used for binary field multiplication. In terms of Side Channel Attack (SCA), bit-wise scanning exploits insecure branch operations which leaks information in a form of timing and power consumption. On the other hands, LUT based method is regarded as a relatively secure approach because LUT access can be conducted in a regular and atomic form. This ensures a constant time solution as well. In this paper, we conduct the SCA on the LUT based binary field multiplication. The attack exploits the horizontal Correlation Power Analysis (CPA) on weights of LUT. We identify the operand with only a power trace of binary field multiplication. In order to prevent SCA, we also suggest a mask based binary field multiplication which ensures a regular and constant time solution without LUT and branch statements.", 
        "editor": [
          {
            "familyName": "Kim", 
            "givenName": "Ho-won", 
            "type": "Person"
          }, 
          {
            "familyName": "Choi", 
            "givenName": "Dooho", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-31875-2_14", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-31874-5", 
            "978-3-319-31875-2"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Secure Binary Field Multiplication", 
        "pagination": "161-173", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-31875-2_14"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "be11f179962a3b81f004375078ae034b38aa3e3912fd4948c1587de98b1fd7f9"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1039900683"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-31875-2_14", 
          "https://app.dimensions.ai/details/publication/pub.1039900683"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T17:15", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000268.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-31875-2_14"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_14'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_14'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_14'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_14'


     

    This table displays all metadata directly associated to this object as RDF triples.

    170 TRIPLES      23 PREDICATES      41 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-31875-2_14 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N69477389978f44d386355250aaf737a0
    4 schema:citation sg:pub.10.1007/0-387-23483-7_131
    5 sg:pub.10.1007/3-540-44495-5_18
    6 sg:pub.10.1007/3-540-48405-1_25
    7 sg:pub.10.1007/3-540-48405-1_26
    8 sg:pub.10.1007/978-3-319-16715-2_9
    9 sg:pub.10.1007/978-3-540-28632-5_2
    10 sg:pub.10.1007/978-3-540-77690-1_19
    11 sg:pub.10.1007/978-3-642-17650-0_5
    12 https://doi.org/10.1002/sec.1237
    13 https://doi.org/10.1002/sec.779
    14 https://doi.org/10.1016/j.comcom.2010.05.013
    15 https://doi.org/10.1093/ietisy/e91-d.5.1338
    16 https://doi.org/10.1587/transinf.e92.d.909
    17 https://doi.org/10.3934/amc.2010.4.169
    18 schema:datePublished 2016
    19 schema:datePublishedReg 2016-01-01
    20 schema:description Binary field multiplication is the most fundamental building block of binary field Elliptic Curve Cryptography (ECC) and Galois/Counter Mode (GCM). Both bit-wise scanning and Look-Up Table (LUT) based methods are commonly used for binary field multiplication. In terms of Side Channel Attack (SCA), bit-wise scanning exploits insecure branch operations which leaks information in a form of timing and power consumption. On the other hands, LUT based method is regarded as a relatively secure approach because LUT access can be conducted in a regular and atomic form. This ensures a constant time solution as well. In this paper, we conduct the SCA on the LUT based binary field multiplication. The attack exploits the horizontal Correlation Power Analysis (CPA) on weights of LUT. We identify the operand with only a power trace of binary field multiplication. In order to prevent SCA, we also suggest a mask based binary field multiplication which ensures a regular and constant time solution without LUT and branch statements.
    21 schema:editor N01f4827af287476694f32d7aa1182d2a
    22 schema:genre chapter
    23 schema:inLanguage en
    24 schema:isAccessibleForFree false
    25 schema:isPartOf N2f8355a61c89486cb9a61cfe47c8dd5a
    26 schema:name Secure Binary Field Multiplication
    27 schema:pagination 161-173
    28 schema:productId N49a96e5bfb994128bfd77d7203984bb3
    29 N5259f42b2c17417f91472b76a6177092
    30 N5833b8cfe57f47638620f4614a42439e
    31 schema:publisher N519b7aa6c50243f386b8d89bbec2b543
    32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039900683
    33 https://doi.org/10.1007/978-3-319-31875-2_14
    34 schema:sdDatePublished 2019-04-15T17:15
    35 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    36 schema:sdPublisher N91877ebdf506455fba0a3ca49cd52845
    37 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_14
    38 sgo:license sg:explorer/license/
    39 sgo:sdDataset chapters
    40 rdf:type schema:Chapter
    41 N01f4827af287476694f32d7aa1182d2a rdf:first Nb297f355450f4a78adaf5e3e08ff295b
    42 rdf:rest Nfa1a3701412b4ea4a8c7b053acd1b6bf
    43 N19a4542dcb054f16bad72826eab27e82 schema:familyName Choi
    44 schema:givenName Dooho
    45 rdf:type schema:Person
    46 N26458c0838d74aceb63352c8f20c2381 rdf:first sg:person.014133561767.73
    47 rdf:rest N819b3f945b2a4b7e896dbda10a36ba53
    48 N2f8355a61c89486cb9a61cfe47c8dd5a schema:isbn 978-3-319-31874-5
    49 978-3-319-31875-2
    50 schema:name Information Security Applications
    51 rdf:type schema:Book
    52 N49a96e5bfb994128bfd77d7203984bb3 schema:name dimensions_id
    53 schema:value pub.1039900683
    54 rdf:type schema:PropertyValue
    55 N519b7aa6c50243f386b8d89bbec2b543 schema:location Cham
    56 schema:name Springer International Publishing
    57 rdf:type schema:Organisation
    58 N5259f42b2c17417f91472b76a6177092 schema:name readcube_id
    59 schema:value be11f179962a3b81f004375078ae034b38aa3e3912fd4948c1587de98b1fd7f9
    60 rdf:type schema:PropertyValue
    61 N5833b8cfe57f47638620f4614a42439e schema:name doi
    62 schema:value 10.1007/978-3-319-31875-2_14
    63 rdf:type schema:PropertyValue
    64 N66df285498e94797b6040cc3ae47d086 rdf:first sg:person.013144776623.84
    65 rdf:rest N70db057e268b4268b37446d24c9ab16e
    66 N66e957d12a7a453485494f8a5c9c3231 rdf:first sg:person.010610076315.82
    67 rdf:rest rdf:nil
    68 N69477389978f44d386355250aaf737a0 rdf:first sg:person.015101423711.26
    69 rdf:rest Na1207748c2284068af738d6716614dcf
    70 N70db057e268b4268b37446d24c9ab16e rdf:first sg:person.012253411571.23
    71 rdf:rest N26458c0838d74aceb63352c8f20c2381
    72 N819b3f945b2a4b7e896dbda10a36ba53 rdf:first sg:person.016515567115.78
    73 rdf:rest N66e957d12a7a453485494f8a5c9c3231
    74 N91877ebdf506455fba0a3ca49cd52845 schema:name Springer Nature - SN SciGraph project
    75 rdf:type schema:Organization
    76 N97f5490497664e4ba38c4f8ae0ab3108 schema:name Physical Analysis and Cryptographic Engineering (PACE), Nanyang Technological University
    77 rdf:type schema:Organization
    78 Na1207748c2284068af738d6716614dcf rdf:first sg:person.07704702402.00
    79 rdf:rest N66df285498e94797b6040cc3ae47d086
    80 Nb297f355450f4a78adaf5e3e08ff295b schema:familyName Kim
    81 schema:givenName Ho-won
    82 rdf:type schema:Person
    83 Nfa1a3701412b4ea4a8c7b053acd1b6bf rdf:first N19a4542dcb054f16bad72826eab27e82
    84 rdf:rest rdf:nil
    85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    86 schema:name Information and Computing Sciences
    87 rdf:type schema:DefinedTerm
    88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    89 schema:name Data Format
    90 rdf:type schema:DefinedTerm
    91 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    92 schema:familyName Kim
    93 schema:givenName Howon
    94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
    95 rdf:type schema:Person
    96 sg:person.012253411571.23 schema:affiliation https://www.grid.ac/institutes/grid.261356.5
    97 schema:familyName Nogami
    98 schema:givenName Yasuyuki
    99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012253411571.23
    100 rdf:type schema:Person
    101 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
    102 schema:familyName Liu
    103 schema:givenName Zhe
    104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
    105 rdf:type schema:Person
    106 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    107 schema:familyName Park
    108 schema:givenName Taehwan
    109 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
    110 rdf:type schema:Person
    111 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    112 schema:familyName Seo
    113 schema:givenName Hwajeong
    114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
    115 rdf:type schema:Person
    116 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    117 schema:familyName Choi
    118 schema:givenName Jongseok
    119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
    120 rdf:type schema:Person
    121 sg:person.07704702402.00 schema:affiliation N97f5490497664e4ba38c4f8ae0ab3108
    122 schema:familyName Chen
    123 schema:givenName Chien-Ning
    124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07704702402.00
    125 rdf:type schema:Person
    126 sg:pub.10.1007/0-387-23483-7_131 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021349612
    127 https://doi.org/10.1007/0-387-23483-7_131
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/3-540-44495-5_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025775208
    130 https://doi.org/10.1007/3-540-44495-5_18
    131 rdf:type schema:CreativeWork
    132 sg:pub.10.1007/3-540-48405-1_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005179729
    133 https://doi.org/10.1007/3-540-48405-1_25
    134 rdf:type schema:CreativeWork
    135 sg:pub.10.1007/3-540-48405-1_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040315853
    136 https://doi.org/10.1007/3-540-48405-1_26
    137 rdf:type schema:CreativeWork
    138 sg:pub.10.1007/978-3-319-16715-2_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009262612
    139 https://doi.org/10.1007/978-3-319-16715-2_9
    140 rdf:type schema:CreativeWork
    141 sg:pub.10.1007/978-3-540-28632-5_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046806925
    142 https://doi.org/10.1007/978-3-540-28632-5_2
    143 rdf:type schema:CreativeWork
    144 sg:pub.10.1007/978-3-540-77690-1_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038588160
    145 https://doi.org/10.1007/978-3-540-77690-1_19
    146 rdf:type schema:CreativeWork
    147 sg:pub.10.1007/978-3-642-17650-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037662158
    148 https://doi.org/10.1007/978-3-642-17650-0_5
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1002/sec.1237 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038769696
    151 rdf:type schema:CreativeWork
    152 https://doi.org/10.1002/sec.779 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027427614
    153 rdf:type schema:CreativeWork
    154 https://doi.org/10.1016/j.comcom.2010.05.013 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049861377
    155 rdf:type schema:CreativeWork
    156 https://doi.org/10.1093/ietisy/e91-d.5.1338 schema:sameAs https://app.dimensions.ai/details/publication/pub.1059672560
    157 rdf:type schema:CreativeWork
    158 https://doi.org/10.1587/transinf.e92.d.909 schema:sameAs https://app.dimensions.ai/details/publication/pub.1068093435
    159 rdf:type schema:CreativeWork
    160 https://doi.org/10.3934/amc.2010.4.169 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730649
    161 rdf:type schema:CreativeWork
    162 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
    163 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
    164 rdf:type schema:Organization
    165 https://www.grid.ac/institutes/grid.261356.5 schema:alternateName Okayama University
    166 schema:name Graduate School of Natural Science and Technology, Okayama University
    167 rdf:type schema:Organization
    168 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
    169 schema:name School of Computer Science and Engineering, Pusan National University
    170 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...