Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018-06-13

AUTHORS

Jintai Ding , Scott Fluhrer , Saraswathy Rv

ABSTRACT

Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key reuse has already been pointed out in previous work. The initial attack described by Fluhrer is designed in such a way that it only works on Peikert’s KE protocol and its variants that derives the shared secret from the most significant bits of the approximately equal keys computed by both parties. It does not work on Ding’s key exchange that uses the least significant bits to derive a shared key. The Signal leakage attack relies on changes in the signal sent by the responder reusing his key, in a sequence of key exchange sessions initiated by an attacker with a malformed key. A possible defense against this attack would be to require the initiator of a key exchange to send the signal, which is the one pass case of the KE protocol. In this work, we describe a new attack on Ding’s one pass case without relying on the signal function output but using only the information of whether the final key of both parties agree. We also use LLL reduction to create the adversary’s keys in such a way that the party being compromised cannot identify the attack in trivial ways. This completes the series of attacks on RLWE key exchange with key reuse for all variants in both cases of the initiator and responder sending the signal. Moreover, we show that the previous Signal leakage attack can be made more efficient with fewer queries and how it can be extended to Peikert’s key exchange, which was used in the BCNS implementation and integrated with TLS and a variant used in the New Hope implementation. More... »

PAGES

467-486

Book

TITLE

Information Security and Privacy

ISBN

978-3-319-93637-6
978-3-319-93638-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-93638-3_27

DOI

http://dx.doi.org/10.1007/978-3-319-93638-3_27

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1104575159


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1701", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/17", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Psychology and Cognitive Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of Cincinnati", 
          "id": "https://www.grid.ac/institutes/grid.24827.3b", 
          "name": [
            "University of Cincinnati, Cincinnati, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ding", 
        "givenName": "Jintai", 
        "id": "sg:person.010723403013.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Cisco Systems (United States)", 
          "id": "https://www.grid.ac/institutes/grid.421222.5", 
          "name": [
            "Cisco Systems, San Jose, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Fluhrer", 
        "givenName": "Scott", 
        "id": "sg:person.015571740701.36", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015571740701.36"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Cincinnati", 
          "id": "https://www.grid.ac/institutes/grid.24827.3b", 
          "name": [
            "University of Cincinnati, Cincinnati, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rv", 
        "givenName": "Saraswathy", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/978-3-540-78440-1_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000998300", 
          "https://doi.org/10.1007/978-3-540-78440-1_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-78440-1_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000998300", 
          "https://doi.org/10.1007/978-3-540-78440-1_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-30057-8_28", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004022324", 
          "https://doi.org/10.1007/978-3-642-30057-8_28"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/237814.237838", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006748772"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1060590.1060603", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012332159"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1536414.1536461", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1015599493"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-11659-4_12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021607145", 
          "https://doi.org/10.1007/978-3-319-11659-4_12"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-13190-5_1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1025305533", 
          "https://doi.org/10.1007/978-3-642-13190-5_1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-13190-5_1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1025305533", 
          "https://doi.org/10.1007/978-3-642-13190-5_1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2090236.2090262", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1026066988"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1374376.1374407", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1034725075"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10366-7_35", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040764061", 
          "https://doi.org/10.1007/978-3-642-10366-7_35"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-10366-7_35", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040764061", 
          "https://doi.org/10.1007/978-3-642-10366-7_35"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-662-46803-6_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048054998", 
          "https://doi.org/10.1007/978-3-662-46803-6_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-662-46803-6_24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1048054998", 
          "https://doi.org/10.1007/978-3-662-46803-6_24"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-22792-9_29", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049197805", 
          "https://doi.org/10.1007/978-3-642-22792-9_29"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-22792-9_29", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049197805", 
          "https://doi.org/10.1007/978-3-642-22792-9_29"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-03356-8_35", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1053603939", 
          "https://doi.org/10.1007/978-3-642-03356-8_35"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1976.1055638", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061647862"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1137/s0097539705447360", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062879617"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1137/s0097539795293172", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1062880065"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-59879-6_10", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1089973373", 
          "https://doi.org/10.1007/978-3-319-59879-6_10"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2015.40", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095735144"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccchina.2017.8330379", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1103274086"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018-06-13", 
    "datePublishedReg": "2018-06-13", 
    "description": "Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key reuse has already been pointed out in previous work. The initial attack described by Fluhrer is designed in such a way that it only works on Peikert\u2019s KE protocol and its variants that derives the shared secret from the most significant bits of the approximately equal keys computed by both parties. It does not work on Ding\u2019s key exchange that uses the least significant bits to derive a shared key. The Signal leakage attack relies on changes in the signal sent by the responder reusing his key, in a sequence of key exchange sessions initiated by an attacker with a malformed key. A possible defense against this attack would be to require the initiator of a key exchange to send the signal, which is the one pass case of the KE protocol. In this work, we describe a new attack on Ding\u2019s one pass case without relying on the signal function output but using only the information of whether the final key of both parties agree. We also use LLL reduction to create the adversary\u2019s keys in such a way that the party being compromised cannot identify the attack in trivial ways. This completes the series of attacks on RLWE key exchange with key reuse for all variants in both cases of the initiator and responder sending the signal. Moreover, we show that the previous Signal leakage attack can be made more efficient with fewer queries and how it can be extended to Peikert\u2019s key exchange, which was used in the BCNS implementation and integrated with TLS and a variant used in the New Hope implementation.", 
    "editor": [
      {
        "familyName": "Susilo", 
        "givenName": "Willy", 
        "type": "Person"
      }, 
      {
        "familyName": "Yang", 
        "givenName": "Guomin", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-93638-3_27", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-93637-6", 
        "978-3-319-93638-3"
      ], 
      "name": "Information Security and Privacy", 
      "type": "Book"
    }, 
    "name": "Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage", 
    "pagination": "467-486", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-93638-3_27"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "90a8cb41b786f2e6628f3ac3ceb878c594c732eb9665493533043d9fb48195b0"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1104575159"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-93638-3_27", 
      "https://app.dimensions.ai/details/publication/pub.1104575159"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000325_0000000325/records_100806_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-319-93638-3_27"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-93638-3_27'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-93638-3_27'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-93638-3_27'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-93638-3_27'


 

This table displays all metadata directly associated to this object as RDF triples.

152 TRIPLES      23 PREDICATES      45 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-93638-3_27 schema:about anzsrc-for:17
2 anzsrc-for:1701
3 schema:author Nba975b35407d42aeb3d1c17dc5d117b0
4 schema:citation sg:pub.10.1007/978-3-319-11659-4_12
5 sg:pub.10.1007/978-3-319-59879-6_10
6 sg:pub.10.1007/978-3-540-78440-1_10
7 sg:pub.10.1007/978-3-642-03356-8_35
8 sg:pub.10.1007/978-3-642-10366-7_35
9 sg:pub.10.1007/978-3-642-13190-5_1
10 sg:pub.10.1007/978-3-642-22792-9_29
11 sg:pub.10.1007/978-3-642-30057-8_28
12 sg:pub.10.1007/978-3-662-46803-6_24
13 https://doi.org/10.1109/iccchina.2017.8330379
14 https://doi.org/10.1109/sp.2015.40
15 https://doi.org/10.1109/tit.1976.1055638
16 https://doi.org/10.1137/s0097539705447360
17 https://doi.org/10.1137/s0097539795293172
18 https://doi.org/10.1145/1060590.1060603
19 https://doi.org/10.1145/1374376.1374407
20 https://doi.org/10.1145/1536414.1536461
21 https://doi.org/10.1145/2090236.2090262
22 https://doi.org/10.1145/237814.237838
23 schema:datePublished 2018-06-13
24 schema:datePublishedReg 2018-06-13
25 schema:description Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key reuse has already been pointed out in previous work. The initial attack described by Fluhrer is designed in such a way that it only works on Peikert’s KE protocol and its variants that derives the shared secret from the most significant bits of the approximately equal keys computed by both parties. It does not work on Ding’s key exchange that uses the least significant bits to derive a shared key. The Signal leakage attack relies on changes in the signal sent by the responder reusing his key, in a sequence of key exchange sessions initiated by an attacker with a malformed key. A possible defense against this attack would be to require the initiator of a key exchange to send the signal, which is the one pass case of the KE protocol. In this work, we describe a new attack on Ding’s one pass case without relying on the signal function output but using only the information of whether the final key of both parties agree. We also use LLL reduction to create the adversary’s keys in such a way that the party being compromised cannot identify the attack in trivial ways. This completes the series of attacks on RLWE key exchange with key reuse for all variants in both cases of the initiator and responder sending the signal. Moreover, we show that the previous Signal leakage attack can be made more efficient with fewer queries and how it can be extended to Peikert’s key exchange, which was used in the BCNS implementation and integrated with TLS and a variant used in the New Hope implementation.
26 schema:editor N3ed50328638442828e69e6a77cc3305f
27 schema:genre chapter
28 schema:inLanguage en
29 schema:isAccessibleForFree false
30 schema:isPartOf N135f32d12ec14870aae5592f632401cd
31 schema:name Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage
32 schema:pagination 467-486
33 schema:productId N3b71c2b096e1462a825638f906c21d65
34 N768c36e823584e079472042e49782339
35 Ne71fd32c95a14eb5abccc99e14ab1775
36 schema:publisher N467a020e97e44209998e1f9faeb11c43
37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1104575159
38 https://doi.org/10.1007/978-3-319-93638-3_27
39 schema:sdDatePublished 2019-04-16T05:01
40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
41 schema:sdPublisher N690f245ea94b4a8387bb352fdb80900d
42 schema:url https://link.springer.com/10.1007%2F978-3-319-93638-3_27
43 sgo:license sg:explorer/license/
44 sgo:sdDataset chapters
45 rdf:type schema:Chapter
46 N0aa045bb29cd470a8a89706ee90443d0 schema:familyName Yang
47 schema:givenName Guomin
48 rdf:type schema:Person
49 N135f32d12ec14870aae5592f632401cd schema:isbn 978-3-319-93637-6
50 978-3-319-93638-3
51 schema:name Information Security and Privacy
52 rdf:type schema:Book
53 N3b71c2b096e1462a825638f906c21d65 schema:name dimensions_id
54 schema:value pub.1104575159
55 rdf:type schema:PropertyValue
56 N3ed50328638442828e69e6a77cc3305f rdf:first N8872dea3ef5e40c7890b2e5ac997d5bf
57 rdf:rest N67876b2ca97f4b8f9f948320f8f2421d
58 N467a020e97e44209998e1f9faeb11c43 schema:location Cham
59 schema:name Springer International Publishing
60 rdf:type schema:Organisation
61 N59a5c4b937c34667b9d665a1da9adc9e rdf:first sg:person.015571740701.36
62 rdf:rest N7ea37302104a4fa39092224cd9031ef4
63 N67876b2ca97f4b8f9f948320f8f2421d rdf:first N0aa045bb29cd470a8a89706ee90443d0
64 rdf:rest rdf:nil
65 N690f245ea94b4a8387bb352fdb80900d schema:name Springer Nature - SN SciGraph project
66 rdf:type schema:Organization
67 N768c36e823584e079472042e49782339 schema:name doi
68 schema:value 10.1007/978-3-319-93638-3_27
69 rdf:type schema:PropertyValue
70 N7c69c08dd7fe4bc2ab52e3c31bdc2220 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
71 schema:familyName Rv
72 schema:givenName Saraswathy
73 rdf:type schema:Person
74 N7ea37302104a4fa39092224cd9031ef4 rdf:first N7c69c08dd7fe4bc2ab52e3c31bdc2220
75 rdf:rest rdf:nil
76 N8872dea3ef5e40c7890b2e5ac997d5bf schema:familyName Susilo
77 schema:givenName Willy
78 rdf:type schema:Person
79 Nba975b35407d42aeb3d1c17dc5d117b0 rdf:first sg:person.010723403013.04
80 rdf:rest N59a5c4b937c34667b9d665a1da9adc9e
81 Ne71fd32c95a14eb5abccc99e14ab1775 schema:name readcube_id
82 schema:value 90a8cb41b786f2e6628f3ac3ceb878c594c732eb9665493533043d9fb48195b0
83 rdf:type schema:PropertyValue
84 anzsrc-for:17 schema:inDefinedTermSet anzsrc-for:
85 schema:name Psychology and Cognitive Sciences
86 rdf:type schema:DefinedTerm
87 anzsrc-for:1701 schema:inDefinedTermSet anzsrc-for:
88 schema:name Psychology
89 rdf:type schema:DefinedTerm
90 sg:person.010723403013.04 schema:affiliation https://www.grid.ac/institutes/grid.24827.3b
91 schema:familyName Ding
92 schema:givenName Jintai
93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010723403013.04
94 rdf:type schema:Person
95 sg:person.015571740701.36 schema:affiliation https://www.grid.ac/institutes/grid.421222.5
96 schema:familyName Fluhrer
97 schema:givenName Scott
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015571740701.36
99 rdf:type schema:Person
100 sg:pub.10.1007/978-3-319-11659-4_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021607145
101 https://doi.org/10.1007/978-3-319-11659-4_12
102 rdf:type schema:CreativeWork
103 sg:pub.10.1007/978-3-319-59879-6_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1089973373
104 https://doi.org/10.1007/978-3-319-59879-6_10
105 rdf:type schema:CreativeWork
106 sg:pub.10.1007/978-3-540-78440-1_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000998300
107 https://doi.org/10.1007/978-3-540-78440-1_10
108 rdf:type schema:CreativeWork
109 sg:pub.10.1007/978-3-642-03356-8_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053603939
110 https://doi.org/10.1007/978-3-642-03356-8_35
111 rdf:type schema:CreativeWork
112 sg:pub.10.1007/978-3-642-10366-7_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040764061
113 https://doi.org/10.1007/978-3-642-10366-7_35
114 rdf:type schema:CreativeWork
115 sg:pub.10.1007/978-3-642-13190-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025305533
116 https://doi.org/10.1007/978-3-642-13190-5_1
117 rdf:type schema:CreativeWork
118 sg:pub.10.1007/978-3-642-22792-9_29 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049197805
119 https://doi.org/10.1007/978-3-642-22792-9_29
120 rdf:type schema:CreativeWork
121 sg:pub.10.1007/978-3-642-30057-8_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004022324
122 https://doi.org/10.1007/978-3-642-30057-8_28
123 rdf:type schema:CreativeWork
124 sg:pub.10.1007/978-3-662-46803-6_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048054998
125 https://doi.org/10.1007/978-3-662-46803-6_24
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/iccchina.2017.8330379 schema:sameAs https://app.dimensions.ai/details/publication/pub.1103274086
128 rdf:type schema:CreativeWork
129 https://doi.org/10.1109/sp.2015.40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095735144
130 rdf:type schema:CreativeWork
131 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1137/s0097539705447360 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062879617
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1137/s0097539795293172 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880065
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1145/1060590.1060603 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012332159
138 rdf:type schema:CreativeWork
139 https://doi.org/10.1145/1374376.1374407 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034725075
140 rdf:type schema:CreativeWork
141 https://doi.org/10.1145/1536414.1536461 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015599493
142 rdf:type schema:CreativeWork
143 https://doi.org/10.1145/2090236.2090262 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026066988
144 rdf:type schema:CreativeWork
145 https://doi.org/10.1145/237814.237838 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006748772
146 rdf:type schema:CreativeWork
147 https://www.grid.ac/institutes/grid.24827.3b schema:alternateName University of Cincinnati
148 schema:name University of Cincinnati, Cincinnati, USA
149 rdf:type schema:Organization
150 https://www.grid.ac/institutes/grid.421222.5 schema:alternateName Cisco Systems (United States)
151 schema:name Cisco Systems, San Jose, USA
152 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...