ASC-1: An Authenticated Encryption Stream Cipher View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Goce Jakimoski , Samant Khajuria

ABSTRACT

The goal of the modes of operation for authenticated encryption is to achieve faster encryption and message authentication by performing both the encryption and the message authentication in a single pass as opposed to the traditional encrypt-then-mac approach, which requires two passes. Unfortunately, the use of a block cipher as a building block limits the performance of the authenticated encryption schemes to at most one message block per block cipher evaluation. In this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly to LEX, ASC-1 uses leak extraction from different AES rounds to compute the key material that is XOR-ed with the message to compute the ciphertext. Unlike LEX, the ASC-1 operates in a CFB fashion to compute an authentication tag over the encrypted message. We argue that ASC-1 is secure by reducing its (IND-CCA , INT-CTXT) security to the problem of distinguishing the case when the round keys are uniformly random from the case when the round keys are generated by a key scheduling algorithm. More... »

PAGES

356-372

References to SciGraph publications

  • 2001-04-15. Encryption Modes with Almost Free Message Integrity in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2003. Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES in FAST SOFTWARE ENCRYPTION
  • 1996. New structure of block ciphers with provable security against differential and linear cryptanalysis in FAST SOFTWARE ENCRYPTION
  • 2001-04-15. New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2000-10-27. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2000
  • 2003. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive in FAST SOFTWARE ENCRYPTION
  • 2007. The Design of a Stream Cipher LEX in SELECTED AREAS IN CRYPTOGRAPHY
  • 2008. A New Attack on the LEX Stream Cipher in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008
  • 2002-01-18. Provable Security against Differential and Linear Cryptanalysis for the SPN Structure in FAST SOFTWARE ENCRYPTION
  • 2005. A New MAC Construction ALRED and a Specific Instance ALPHA-MAC in FAST SOFTWARE ENCRYPTION
  • 2002. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes in FAST SOFTWARE ENCRYPTION
  • 2007. On Efficient Message Authentication Via Block Cipher Design Techniques in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2007
  • 2001. Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael in SELECTED AREAS IN CRYPTOGRAPHY
  • 2006. Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations in FAST SOFTWARE ENCRYPTION
  • 2002. On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2006. Resynchronization Attacks on WG and LEX in FAST SOFTWARE ENCRYPTION
  • 2001-07-13. Bucket Hashing and its Application to Fast Message Authentication in ADVANCES IN CRYPTOLOGY — CRYPT0’ 95
  • Book

    TITLE

    Selected Areas in Cryptography

    ISBN

    978-3-642-28495-3
    978-3-642-28496-0

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_21

    DOI

    http://dx.doi.org/10.1007/978-3-642-28496-0_21

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1028371451


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Stevens Institute of Technology", 
              "id": "https://www.grid.ac/institutes/grid.217309.e", 
              "name": [
                "Stevens Institute of Technology, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jakimoski", 
            "givenName": "Goce", 
            "id": "sg:person.014651573510.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014651573510.47"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Aalborg University", 
              "id": "https://www.grid.ac/institutes/grid.5117.2", 
              "name": [
                "Aalborg University, Denmark"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Khajuria", 
            "givenName": "Samant", 
            "id": "sg:person.012441622470.20", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012441622470.20"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-44750-4_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000318950", 
              "https://doi.org/10.1007/3-540-44750-4_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44750-4_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000318950", 
              "https://doi.org/10.1007/3-540-44750-4_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001443284", 
              "https://doi.org/10.1007/978-3-540-39887-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001443284", 
              "https://doi.org/10.1007/978-3-540-39887-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11502760_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003311452", 
              "https://doi.org/10.1007/11502760_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11502760_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003311452", 
              "https://doi.org/10.1007/11502760_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-76900-2_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006933896", 
              "https://doi.org/10.1007/978-3-540-76900-2_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-76900-2_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006933896", 
              "https://doi.org/10.1007/978-3-540-76900-2_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45473-x_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007553455", 
              "https://doi.org/10.1007/3-540-45473-x_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74462-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014642914", 
              "https://doi.org/10.1007/978-3-540-74462-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74462-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014642914", 
              "https://doi.org/10.1007/978-3-540-74462-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/501983.502011", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020514401"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89255-7_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020675717", 
              "https://doi.org/10.1007/978-3-540-89255-7_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-89255-7_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020675717", 
              "https://doi.org/10.1007/978-3-540-89255-7_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-60865-6_54", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031379986", 
              "https://doi.org/10.1007/3-540-60865-6_54"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032504785", 
              "https://doi.org/10.1007/3-540-44987-6_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032504785", 
              "https://doi.org/10.1007/3-540-44987-6_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033008788", 
              "https://doi.org/10.1007/3-540-44987-6_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033008788", 
              "https://doi.org/10.1007/3-540-44987-6_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45537-x_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034859615", 
              "https://doi.org/10.1007/3-540-45537-x_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035298156", 
              "https://doi.org/10.1007/978-3-540-39887-5_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035298156", 
              "https://doi.org/10.1007/978-3-540-39887-5_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44448-3_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037503497", 
              "https://doi.org/10.1007/3-540-44448-3_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44448-3_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037503497", 
              "https://doi.org/10.1007/3-540-44448-3_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042248550", 
              "https://doi.org/10.1007/11799313_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042248550", 
              "https://doi.org/10.1007/11799313_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36178-2_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043364837", 
              "https://doi.org/10.1007/3-540-36178-2_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44706-7_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044242491", 
              "https://doi.org/10.1007/3-540-44706-7_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44706-7_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044242491", 
              "https://doi.org/10.1007/3-540-44706-7_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050928943", 
              "https://doi.org/10.1007/11799313_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11799313_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050928943", 
              "https://doi.org/10.1007/11799313_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1049/iet-ifs:20060161", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1056828817"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.4218/etrij.01.0101.0402", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1072377801"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012", 
        "datePublishedReg": "2012-01-01", 
        "description": "The goal of the modes of operation for authenticated encryption is to achieve faster encryption and message authentication by performing both the encryption and the message authentication in a single pass as opposed to the traditional encrypt-then-mac approach, which requires two passes. Unfortunately, the use of a block cipher as a building block limits the performance of the authenticated encryption schemes to at most one message block per block cipher evaluation. In this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly to LEX, ASC-1 uses leak extraction from different AES rounds to compute the key material that is XOR-ed with the message to compute the ciphertext. Unlike LEX, the ASC-1 operates in a CFB fashion to compute an authentication tag over the encrypted message. We argue that ASC-1 is secure by reducing its (IND-CCA , INT-CTXT) security to the problem of distinguishing the case when the round keys are uniformly random from the case when the round keys are generated by a key scheduling algorithm.", 
        "editor": [
          {
            "familyName": "Miri", 
            "givenName": "Ali", 
            "type": "Person"
          }, 
          {
            "familyName": "Vaudenay", 
            "givenName": "Serge", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-28496-0_21", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-28495-3", 
            "978-3-642-28496-0"
          ], 
          "name": "Selected Areas in Cryptography", 
          "type": "Book"
        }, 
        "name": "ASC-1: An Authenticated Encryption Stream Cipher", 
        "pagination": "356-372", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-28496-0_21"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "872809d2dd614c661d391fd59bb60f793897984586b936164eab6c64afeca517"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1028371451"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-28496-0_21", 
          "https://app.dimensions.ai/details/publication/pub.1028371451"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T17:14", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000260.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-28496-0_21"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_21'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_21'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_21'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-28496-0_21'


     

    This table displays all metadata directly associated to this object as RDF triples.

    157 TRIPLES      23 PREDICATES      47 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-28496-0_21 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N9f4327a111914c7491fb52e329c22da7
    4 schema:citation sg:pub.10.1007/11502760_1
    5 sg:pub.10.1007/11799313_15
    6 sg:pub.10.1007/11799313_27
    7 sg:pub.10.1007/3-540-36178-2_11
    8 sg:pub.10.1007/3-540-44448-3_41
    9 sg:pub.10.1007/3-540-44706-7_19
    10 sg:pub.10.1007/3-540-44750-4_3
    11 sg:pub.10.1007/3-540-44987-6_26
    12 sg:pub.10.1007/3-540-44987-6_32
    13 sg:pub.10.1007/3-540-45473-x_8
    14 sg:pub.10.1007/3-540-45537-x_9
    15 sg:pub.10.1007/3-540-60865-6_54
    16 sg:pub.10.1007/978-3-540-39887-5_19
    17 sg:pub.10.1007/978-3-540-39887-5_24
    18 sg:pub.10.1007/978-3-540-74462-7_6
    19 sg:pub.10.1007/978-3-540-76900-2_14
    20 sg:pub.10.1007/978-3-540-89255-7_33
    21 https://doi.org/10.1049/iet-ifs:20060161
    22 https://doi.org/10.1145/501983.502011
    23 https://doi.org/10.4218/etrij.01.0101.0402
    24 schema:datePublished 2012
    25 schema:datePublishedReg 2012-01-01
    26 schema:description The goal of the modes of operation for authenticated encryption is to achieve faster encryption and message authentication by performing both the encryption and the message authentication in a single pass as opposed to the traditional encrypt-then-mac approach, which requires two passes. Unfortunately, the use of a block cipher as a building block limits the performance of the authenticated encryption schemes to at most one message block per block cipher evaluation. In this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly to LEX, ASC-1 uses leak extraction from different AES rounds to compute the key material that is XOR-ed with the message to compute the ciphertext. Unlike LEX, the ASC-1 operates in a CFB fashion to compute an authentication tag over the encrypted message. We argue that ASC-1 is secure by reducing its (IND-CCA , INT-CTXT) security to the problem of distinguishing the case when the round keys are uniformly random from the case when the round keys are generated by a key scheduling algorithm.
    27 schema:editor N4155c8df520e4c098a85751630b59e95
    28 schema:genre chapter
    29 schema:inLanguage en
    30 schema:isAccessibleForFree true
    31 schema:isPartOf N03cb88f7b4bc40299d6e500c0c24cb7a
    32 schema:name ASC-1: An Authenticated Encryption Stream Cipher
    33 schema:pagination 356-372
    34 schema:productId N39c633396f3049b5900fcfccfca61465
    35 N45ec927fe662490caaadbb2ad0debe4f
    36 Nf635aa6e320d48c89f28c02d229a4fde
    37 schema:publisher N135ef6722e424050972a4fa626c5feb0
    38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028371451
    39 https://doi.org/10.1007/978-3-642-28496-0_21
    40 schema:sdDatePublished 2019-04-15T17:14
    41 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    42 schema:sdPublisher N603314cc9c394ee289c4d1f03635e3ae
    43 schema:url http://link.springer.com/10.1007/978-3-642-28496-0_21
    44 sgo:license sg:explorer/license/
    45 sgo:sdDataset chapters
    46 rdf:type schema:Chapter
    47 N03cb88f7b4bc40299d6e500c0c24cb7a schema:isbn 978-3-642-28495-3
    48 978-3-642-28496-0
    49 schema:name Selected Areas in Cryptography
    50 rdf:type schema:Book
    51 N0ef6f35a384a495aa9ac1cbc9a35d1c1 schema:familyName Vaudenay
    52 schema:givenName Serge
    53 rdf:type schema:Person
    54 N0ffaeca3f4534d66a3edd40ce141a9cd schema:familyName Miri
    55 schema:givenName Ali
    56 rdf:type schema:Person
    57 N135ef6722e424050972a4fa626c5feb0 schema:location Berlin, Heidelberg
    58 schema:name Springer Berlin Heidelberg
    59 rdf:type schema:Organisation
    60 N39c633396f3049b5900fcfccfca61465 schema:name dimensions_id
    61 schema:value pub.1028371451
    62 rdf:type schema:PropertyValue
    63 N4155c8df520e4c098a85751630b59e95 rdf:first N0ffaeca3f4534d66a3edd40ce141a9cd
    64 rdf:rest Nd49ed237e179446f90e2192fef7dedf5
    65 N45ec927fe662490caaadbb2ad0debe4f schema:name doi
    66 schema:value 10.1007/978-3-642-28496-0_21
    67 rdf:type schema:PropertyValue
    68 N603314cc9c394ee289c4d1f03635e3ae schema:name Springer Nature - SN SciGraph project
    69 rdf:type schema:Organization
    70 N800e0ed96b4a4a308b25965d2088a909 rdf:first sg:person.012441622470.20
    71 rdf:rest rdf:nil
    72 N9f4327a111914c7491fb52e329c22da7 rdf:first sg:person.014651573510.47
    73 rdf:rest N800e0ed96b4a4a308b25965d2088a909
    74 Nd49ed237e179446f90e2192fef7dedf5 rdf:first N0ef6f35a384a495aa9ac1cbc9a35d1c1
    75 rdf:rest rdf:nil
    76 Nf635aa6e320d48c89f28c02d229a4fde schema:name readcube_id
    77 schema:value 872809d2dd614c661d391fd59bb60f793897984586b936164eab6c64afeca517
    78 rdf:type schema:PropertyValue
    79 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Information and Computing Sciences
    81 rdf:type schema:DefinedTerm
    82 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    83 schema:name Data Format
    84 rdf:type schema:DefinedTerm
    85 sg:person.012441622470.20 schema:affiliation https://www.grid.ac/institutes/grid.5117.2
    86 schema:familyName Khajuria
    87 schema:givenName Samant
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012441622470.20
    89 rdf:type schema:Person
    90 sg:person.014651573510.47 schema:affiliation https://www.grid.ac/institutes/grid.217309.e
    91 schema:familyName Jakimoski
    92 schema:givenName Goce
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014651573510.47
    94 rdf:type schema:Person
    95 sg:pub.10.1007/11502760_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003311452
    96 https://doi.org/10.1007/11502760_1
    97 rdf:type schema:CreativeWork
    98 sg:pub.10.1007/11799313_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042248550
    99 https://doi.org/10.1007/11799313_15
    100 rdf:type schema:CreativeWork
    101 sg:pub.10.1007/11799313_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050928943
    102 https://doi.org/10.1007/11799313_27
    103 rdf:type schema:CreativeWork
    104 sg:pub.10.1007/3-540-36178-2_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043364837
    105 https://doi.org/10.1007/3-540-36178-2_11
    106 rdf:type schema:CreativeWork
    107 sg:pub.10.1007/3-540-44448-3_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037503497
    108 https://doi.org/10.1007/3-540-44448-3_41
    109 rdf:type schema:CreativeWork
    110 sg:pub.10.1007/3-540-44706-7_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044242491
    111 https://doi.org/10.1007/3-540-44706-7_19
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/3-540-44750-4_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000318950
    114 https://doi.org/10.1007/3-540-44750-4_3
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44987-6_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032504785
    117 https://doi.org/10.1007/3-540-44987-6_26
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-44987-6_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033008788
    120 https://doi.org/10.1007/3-540-44987-6_32
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-45473-x_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007553455
    123 https://doi.org/10.1007/3-540-45473-x_8
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/3-540-45537-x_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034859615
    126 https://doi.org/10.1007/3-540-45537-x_9
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/3-540-60865-6_54 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031379986
    129 https://doi.org/10.1007/3-540-60865-6_54
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-540-39887-5_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001443284
    132 https://doi.org/10.1007/978-3-540-39887-5_19
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-540-39887-5_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035298156
    135 https://doi.org/10.1007/978-3-540-39887-5_24
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-540-74462-7_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014642914
    138 https://doi.org/10.1007/978-3-540-74462-7_6
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/978-3-540-76900-2_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006933896
    141 https://doi.org/10.1007/978-3-540-76900-2_14
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/978-3-540-89255-7_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020675717
    144 https://doi.org/10.1007/978-3-540-89255-7_33
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1049/iet-ifs:20060161 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056828817
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/501983.502011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020514401
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.4218/etrij.01.0101.0402 schema:sameAs https://app.dimensions.ai/details/publication/pub.1072377801
    151 rdf:type schema:CreativeWork
    152 https://www.grid.ac/institutes/grid.217309.e schema:alternateName Stevens Institute of Technology
    153 schema:name Stevens Institute of Technology, USA
    154 rdf:type schema:Organization
    155 https://www.grid.ac/institutes/grid.5117.2 schema:alternateName Aalborg University
    156 schema:name Aalborg University, Denmark
    157 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...