NEON Crypto View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2012

AUTHORS

Daniel J. Bernstein , Peter Schwabe

ABSTRACT

NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing NaCl suite of high-security cryptographic primitives at the following speeds: 5.60 cycles per byte (1.14 Gbps) to encrypt using a shared secret key, 2.30 cycles per byte (2.78 Gbps) to authenticate using a shared secret key, 527102 cycles (1517/second) to compute a shared secret key for a new public key, 624846 cycles (1280/second) to verify a signature, and 244655 cycles (3269/second) to sign a message. These speeds make no use of secret branches and no use of secret memory addresses. More... »

PAGES

320-339

References to SciGraph publications

  • 1994. On the Relation Between A-Codes and Codes Correcting Independent Errors in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’93
  • 2008. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2009. Fast Elliptic-Curve Cryptography on the Cell Broadband Engine in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2009
  • 2011. The Software Performance of Authenticated-Encryption Modes in FAST SOFTWARE ENCRYPTION
  • 2010-01. Efficient Cache Attacks on AES, and Countermeasures in JOURNAL OF CRYPTOLOGY
  • 2009. Faster and Timing-Attack Resistant AES-GCM in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009
  • 2001. Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction in INFORMATION SECURITY AND CRYPTOLOGY — ICISC 2000
  • 2001-07-13. An Integrity Check Value Algorithm for Stream Ciphers in ADVANCES IN CRYPTOLOGY — CRYPTO’ 93
  • 1999-04-15. Software Performance of Universal Hash Functions in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’99
  • 2010. New Results on Instruction Cache Attacks in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, CHES 2010
  • 2012. A Cache Timing Attack on AES in Virtualization Environments in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2001-07-13. On Fast and Provably Secure Message Authentication Based on Universal Hashing in ADVANCES IN CRYPTOLOGY — CRYPTO ’96
  • 2004. CWC: A High-Performance Conventional Authenticated Encryption Mode in FAST SOFTWARE ENCRYPTION
  • 2009. MAC Reforgeability in FAST SOFTWARE ENCRYPTION
  • Book

    TITLE

    Cryptographic Hardware and Embedded Systems – CHES 2012

    ISBN

    978-3-642-33026-1
    978-3-642-33027-8

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-33027-8_19

    DOI

    http://dx.doi.org/10.1007/978-3-642-33027-8_19

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1030639334


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "University of Illinois at Chicago", 
              "id": "https://www.grid.ac/institutes/grid.185648.6", 
              "name": [
                "Department of Computer Science, University of Illinois at Chicago, Chicago, IL\u00a060607\u20137045, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Bernstein", 
            "givenName": "Daniel J.", 
            "id": "sg:person.011105222633.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011105222633.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Academia Sinica", 
              "id": "https://www.grid.ac/institutes/grid.28665.3f", 
              "name": [
                "Research Center for Information Technology Innovation and Institute of Information Science, Academia Sinica, 128 Section 2 Academia Road, Taipei, 115-29, Taiwan"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Schwabe", 
            "givenName": "Peter", 
            "id": "sg:person.010637555557.91", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-48329-2_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002609893", 
              "https://doi.org/10.1007/3-540-48329-2_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48329-2_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002609893", 
              "https://doi.org/10.1007/3-540-48329-2_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-32946-3_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002898329", 
              "https://doi.org/10.1007/978-3-642-32946-3_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02384-2_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004091122", 
              "https://doi.org/10.1007/978-3-642-02384-2_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005478912", 
              "https://doi.org/10.1007/978-3-642-21702-9_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005478912", 
              "https://doi.org/10.1007/978-3-642-21702-9_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48910-x_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016200742", 
              "https://doi.org/10.1007/3-540-48910-x_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48910-x_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016200742", 
              "https://doi.org/10.1007/3-540-48910-x_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-009-9049-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017461552", 
              "https://doi.org/10.1007/s00145-009-9049-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-009-9049-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017461552", 
              "https://doi.org/10.1007/s00145-009-9049-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-009-9049-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017461552", 
              "https://doi.org/10.1007/s00145-009-9049-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25937-4_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025543015", 
              "https://doi.org/10.1007/978-3-540-25937-4_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-25937-4_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025543015", 
              "https://doi.org/10.1007/978-3-540-25937-4_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68697-5_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038146356", 
              "https://doi.org/10.1007/3-540-68697-5_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-68697-5_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038146356", 
              "https://doi.org/10.1007/3-540-68697-5_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-04138-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038763693", 
              "https://doi.org/10.1007/978-3-642-04138-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046226105", 
              "https://doi.org/10.1007/978-3-642-15031-9_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-15031-9_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046226105", 
              "https://doi.org/10.1007/978-3-642-15031-9_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48285-7_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047397879", 
              "https://doi.org/10.1007/3-540-48285-7_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050205979", 
              "https://doi.org/10.1007/978-3-642-03317-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03317-9_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050205979", 
              "https://doi.org/10.1007/978-3-642-03317-9_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85174-5_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052308435", 
              "https://doi.org/10.1007/978-3-540-85174-5_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45247-8_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053507667", 
              "https://doi.org/10.1007/3-540-45247-8_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/sasp.2011.5941077", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094136200"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2012", 
        "datePublishedReg": "2012-01-01", 
        "description": "NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing NaCl suite of high-security cryptographic primitives at the following speeds: 5.60 cycles per byte (1.14 Gbps) to encrypt using a shared secret key, 2.30 cycles per byte (2.78 Gbps) to authenticate using a shared secret key, 527102 cycles (1517/second) to compute a shared secret key for a new public key, 624846 cycles (1280/second) to verify a signature, and 244655 cycles (3269/second) to sign a message. These speeds make no use of secret branches and no use of secret memory addresses.", 
        "editor": [
          {
            "familyName": "Prouff", 
            "givenName": "Emmanuel", 
            "type": "Person"
          }, 
          {
            "familyName": "Schaumont", 
            "givenName": "Patrick", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-33027-8_19", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-33026-1", 
            "978-3-642-33027-8"
          ], 
          "name": "Cryptographic Hardware and Embedded Systems \u2013 CHES 2012", 
          "type": "Book"
        }, 
        "name": "NEON Crypto", 
        "pagination": "320-339", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-33027-8_19"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "91f643f96e51ff964d5ada2fc245b5cab3fe9f86ae85ce2a9a95fdf2f0e28650"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1030639334"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-33027-8_19", 
          "https://app.dimensions.ai/details/publication/pub.1030639334"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T17:01", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000052.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-33027-8_19"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-33027-8_19'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-33027-8_19'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-33027-8_19'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-33027-8_19'


     

    This table displays all metadata directly associated to this object as RDF triples.

    139 TRIPLES      23 PREDICATES      42 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-33027-8_19 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author Nd216bdcc5e1c4bcdb31bbe0fb1316ba9
    4 schema:citation sg:pub.10.1007/3-540-45247-8_7
    5 sg:pub.10.1007/3-540-48285-7_1
    6 sg:pub.10.1007/3-540-48329-2_4
    7 sg:pub.10.1007/3-540-48910-x_3
    8 sg:pub.10.1007/3-540-68697-5_24
    9 sg:pub.10.1007/978-3-540-25937-4_26
    10 sg:pub.10.1007/978-3-540-85174-5_9
    11 sg:pub.10.1007/978-3-642-02384-2_23
    12 sg:pub.10.1007/978-3-642-03317-9_21
    13 sg:pub.10.1007/978-3-642-04138-9_1
    14 sg:pub.10.1007/978-3-642-15031-9_8
    15 sg:pub.10.1007/978-3-642-21702-9_18
    16 sg:pub.10.1007/978-3-642-32946-3_23
    17 sg:pub.10.1007/s00145-009-9049-y
    18 https://doi.org/10.1109/sasp.2011.5941077
    19 schema:datePublished 2012
    20 schema:datePublishedReg 2012-01-01
    21 schema:description NEON is a vector instruction set included in a large fraction of new ARM-based tablets and smartphones. This paper shows that NEON supports high-security cryptography at surprisingly high speeds; normally data arrives at lower speeds, giving the CPU time to handle tasks other than cryptography. In particular, this paper explains how to use a single 800MHz Cortex A8 core to compute the existing NaCl suite of high-security cryptographic primitives at the following speeds: 5.60 cycles per byte (1.14 Gbps) to encrypt using a shared secret key, 2.30 cycles per byte (2.78 Gbps) to authenticate using a shared secret key, 527102 cycles (1517/second) to compute a shared secret key for a new public key, 624846 cycles (1280/second) to verify a signature, and 244655 cycles (3269/second) to sign a message. These speeds make no use of secret branches and no use of secret memory addresses.
    22 schema:editor Nbfbed1bc7b364bba871cebfa05b9ab96
    23 schema:genre chapter
    24 schema:inLanguage en
    25 schema:isAccessibleForFree true
    26 schema:isPartOf N0570bd9465ac4e06b33ebe2362a3e732
    27 schema:name NEON Crypto
    28 schema:pagination 320-339
    29 schema:productId N48ebf0ac879143f2a6c9b2620e3cd4b4
    30 N8adf320bd1554d6daf263a084af28acc
    31 Ne30f3f4f27af4a44901aaed0309c9eb7
    32 schema:publisher N593c39f268724c798d9964ee21160dde
    33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030639334
    34 https://doi.org/10.1007/978-3-642-33027-8_19
    35 schema:sdDatePublished 2019-04-15T17:01
    36 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    37 schema:sdPublisher N0c215413d6ce4b5faaa39da02b1fd053
    38 schema:url http://link.springer.com/10.1007/978-3-642-33027-8_19
    39 sgo:license sg:explorer/license/
    40 sgo:sdDataset chapters
    41 rdf:type schema:Chapter
    42 N0570bd9465ac4e06b33ebe2362a3e732 schema:isbn 978-3-642-33026-1
    43 978-3-642-33027-8
    44 schema:name Cryptographic Hardware and Embedded Systems – CHES 2012
    45 rdf:type schema:Book
    46 N0c215413d6ce4b5faaa39da02b1fd053 schema:name Springer Nature - SN SciGraph project
    47 rdf:type schema:Organization
    48 N3cac5788db9140679f78d67903b7f678 schema:familyName Schaumont
    49 schema:givenName Patrick
    50 rdf:type schema:Person
    51 N48ebf0ac879143f2a6c9b2620e3cd4b4 schema:name doi
    52 schema:value 10.1007/978-3-642-33027-8_19
    53 rdf:type schema:PropertyValue
    54 N593c39f268724c798d9964ee21160dde schema:location Berlin, Heidelberg
    55 schema:name Springer Berlin Heidelberg
    56 rdf:type schema:Organisation
    57 N6d4a6188b4934bb7921d8df1991256e5 rdf:first sg:person.010637555557.91
    58 rdf:rest rdf:nil
    59 N8adf320bd1554d6daf263a084af28acc schema:name readcube_id
    60 schema:value 91f643f96e51ff964d5ada2fc245b5cab3fe9f86ae85ce2a9a95fdf2f0e28650
    61 rdf:type schema:PropertyValue
    62 N961c7a1ec27c4176bdd7a61e79e41944 rdf:first N3cac5788db9140679f78d67903b7f678
    63 rdf:rest rdf:nil
    64 N9c260745978e4ec6868f45d081810252 schema:familyName Prouff
    65 schema:givenName Emmanuel
    66 rdf:type schema:Person
    67 Nbfbed1bc7b364bba871cebfa05b9ab96 rdf:first N9c260745978e4ec6868f45d081810252
    68 rdf:rest N961c7a1ec27c4176bdd7a61e79e41944
    69 Nd216bdcc5e1c4bcdb31bbe0fb1316ba9 rdf:first sg:person.011105222633.26
    70 rdf:rest N6d4a6188b4934bb7921d8df1991256e5
    71 Ne30f3f4f27af4a44901aaed0309c9eb7 schema:name dimensions_id
    72 schema:value pub.1030639334
    73 rdf:type schema:PropertyValue
    74 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Information and Computing Sciences
    76 rdf:type schema:DefinedTerm
    77 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    78 schema:name Data Format
    79 rdf:type schema:DefinedTerm
    80 sg:person.010637555557.91 schema:affiliation https://www.grid.ac/institutes/grid.28665.3f
    81 schema:familyName Schwabe
    82 schema:givenName Peter
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91
    84 rdf:type schema:Person
    85 sg:person.011105222633.26 schema:affiliation https://www.grid.ac/institutes/grid.185648.6
    86 schema:familyName Bernstein
    87 schema:givenName Daniel J.
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011105222633.26
    89 rdf:type schema:Person
    90 sg:pub.10.1007/3-540-45247-8_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053507667
    91 https://doi.org/10.1007/3-540-45247-8_7
    92 rdf:type schema:CreativeWork
    93 sg:pub.10.1007/3-540-48285-7_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047397879
    94 https://doi.org/10.1007/3-540-48285-7_1
    95 rdf:type schema:CreativeWork
    96 sg:pub.10.1007/3-540-48329-2_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002609893
    97 https://doi.org/10.1007/3-540-48329-2_4
    98 rdf:type schema:CreativeWork
    99 sg:pub.10.1007/3-540-48910-x_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016200742
    100 https://doi.org/10.1007/3-540-48910-x_3
    101 rdf:type schema:CreativeWork
    102 sg:pub.10.1007/3-540-68697-5_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038146356
    103 https://doi.org/10.1007/3-540-68697-5_24
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/978-3-540-25937-4_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025543015
    106 https://doi.org/10.1007/978-3-540-25937-4_26
    107 rdf:type schema:CreativeWork
    108 sg:pub.10.1007/978-3-540-85174-5_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052308435
    109 https://doi.org/10.1007/978-3-540-85174-5_9
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-642-02384-2_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004091122
    112 https://doi.org/10.1007/978-3-642-02384-2_23
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-642-03317-9_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050205979
    115 https://doi.org/10.1007/978-3-642-03317-9_21
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/978-3-642-04138-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038763693
    118 https://doi.org/10.1007/978-3-642-04138-9_1
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/978-3-642-15031-9_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046226105
    121 https://doi.org/10.1007/978-3-642-15031-9_8
    122 rdf:type schema:CreativeWork
    123 sg:pub.10.1007/978-3-642-21702-9_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005478912
    124 https://doi.org/10.1007/978-3-642-21702-9_18
    125 rdf:type schema:CreativeWork
    126 sg:pub.10.1007/978-3-642-32946-3_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002898329
    127 https://doi.org/10.1007/978-3-642-32946-3_23
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/s00145-009-9049-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1017461552
    130 https://doi.org/10.1007/s00145-009-9049-y
    131 rdf:type schema:CreativeWork
    132 https://doi.org/10.1109/sasp.2011.5941077 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094136200
    133 rdf:type schema:CreativeWork
    134 https://www.grid.ac/institutes/grid.185648.6 schema:alternateName University of Illinois at Chicago
    135 schema:name Department of Computer Science, University of Illinois at Chicago, Chicago, IL 60607–7045, USA
    136 rdf:type schema:Organization
    137 https://www.grid.ac/institutes/grid.28665.3f schema:alternateName Academia Sinica
    138 schema:name Research Center for Information Technology Innovation and Institute of Information Science, Academia Sinica, 128 Section 2 Academia Road, Taipei, 115-29, Taiwan
    139 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...