NEON Implementation of an Attribute-Based Encryption Scheme View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Ana Helena Sánchez , Francisco Rodríguez-Henríquez

ABSTRACT

In 2011, Waters presented a ciphertext-policy attribute- based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen for this protocol lie in the context of mobile devices such a smartphones and tablets, which in a majority of instances are powered by an ARM processor supporting the NEON vector set of instructions. In this paper we present the design of a software cryptographic library that implements a 127-bit security level attribute-based encryption scheme over mobile devices equipped with a 1.4GHz Exynos 4 Cortex-A9 processor and a developing board that hosts a 1.7 GHz Exynos 5 Cortex-A15 processor. For the latter platform and taking advantage of the inherent parallelism of the NEON vector instructions, our library computes a single optimal pairing over a Barreto-Naehrig curve approximately 2 times faster than the best timings previously reported on ARM platforms at this level of security. Further, using a 6-attribute access formula our library is able to encrypt/decrypt a text/ciphertext in less than 7.5mS and 15.67mS, respectively. More... »

PAGES

322-338

References to SciGraph publications

  • 2011. On the Efficient Implementation of Pairing-Based Protocols in CRYPTOGRAPHY AND CODING
  • 2010. Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions in PUBLIC KEY CRYPTOGRAPHY – PKC 2010
  • 2006. Pairing-Friendly Elliptic Curves of Prime Order in SELECTED AREAS IN CRYPTOGRAPHY
  • 2011. Faster Explicit Formulas for Computing Pairings over Ordinary Curves in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2011
  • 2013. Affine Pairings on ARM in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2012
  • 2011. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization in PUBLIC KEY CRYPTOGRAPHY – PKC 2011
  • 2012. Faster Hashing to ${\mathbb G}_2$ in SELECTED AREAS IN CRYPTOGRAPHY
  • 2001-08-02. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • 2008. Exponentiation in Pairing-Friendly Groups Using Homomorphisms in PAIRING-BASED CRYPTOGRAPHY – PAIRING 2008
  • 2013. Efficient Implementation of Bilinear Pairings on ARM Processors in SELECTED AREAS IN CRYPTOGRAPHY
  • Book

    TITLE

    Applied Cryptography and Network Security

    ISBN

    978-3-642-31283-0
    978-3-642-31284-7

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_20

    DOI

    http://dx.doi.org/10.1007/978-3-642-38980-1_20

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1036018547


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Instituto Polit\u00e9cnico Nacional", 
              "id": "https://www.grid.ac/institutes/grid.418275.d", 
              "name": [
                "Computer Science Department, CINVESTAV-IPN, Mexico"
              ], 
              "type": "Organization"
            }, 
            "familyName": "S\u00e1nchez", 
            "givenName": "Ana Helena", 
            "id": "sg:person.015746601433.51", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015746601433.51"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Instituto Polit\u00e9cnico Nacional", 
              "id": "https://www.grid.ac/institutes/grid.418275.d", 
              "name": [
                "Computer Science Department, CINVESTAV-IPN, Mexico"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rodr\u00edguez-Henr\u00edquez", 
            "givenName": "Francisco", 
            "id": "sg:person.012704077153.90", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012704077153.90"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-28496-0_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009484864", 
              "https://doi.org/10.1007/978-3-642-28496-0_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-36334-4_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011350938", 
              "https://doi.org/10.1007/978-3-642-36334-4_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19379-8_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021592316", 
              "https://doi.org/10.1007/978-3-642-19379-8_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19379-8_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021592316", 
              "https://doi.org/10.1007/978-3-642-19379-8_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028884731", 
              "https://doi.org/10.1007/978-3-642-20465-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028884731", 
              "https://doi.org/10.1007/978-3-642-20465-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85538-5_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1032677673", 
              "https://doi.org/10.1007/978-3-540-85538-5_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11693383_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039881626", 
              "https://doi.org/10.1007/11693383_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11693383_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039881626", 
              "https://doi.org/10.1007/11693383_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042795640", 
              "https://doi.org/10.1007/978-3-642-13013-7_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042795640", 
              "https://doi.org/10.1007/978-3-642-13013-7_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044250953", 
              "https://doi.org/10.1007/3-540-44647-8_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1044250953", 
              "https://doi.org/10.1007/3-540-44647-8_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-35999-6_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045637643", 
              "https://doi.org/10.1007/978-3-642-35999-6_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-25516-8_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050305627", 
              "https://doi.org/10.1007/978-3-642-25516-8_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1090/s0025-5718-2012-02625-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1059336775"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/40.502403", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061168196"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/arith.2007.11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1095068885"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013", 
        "datePublishedReg": "2013-01-01", 
        "description": "In 2011, Waters presented a ciphertext-policy attribute- based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user\u2019s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen for this protocol lie in the context of mobile devices such a smartphones and tablets, which in a majority of instances are powered by an ARM processor supporting the NEON vector set of instructions. In this paper we present the design of a software cryptographic library that implements a 127-bit security level attribute-based encryption scheme over mobile devices equipped with a 1.4GHz Exynos 4 Cortex-A9 processor and a developing board that hosts a 1.7 GHz Exynos 5 Cortex-A15 processor. For the latter platform and taking advantage of the inherent parallelism of the NEON vector instructions, our library computes a single optimal pairing over a Barreto-Naehrig curve approximately 2 times faster than the best timings previously reported on ARM platforms at this level of security. Further, using a 6-attribute access formula our library is able to encrypt/decrypt a text/ciphertext in less than 7.5mS and 15.67mS, respectively.", 
        "editor": [
          {
            "familyName": "Bao", 
            "givenName": "Feng", 
            "type": "Person"
          }, 
          {
            "familyName": "Samarati", 
            "givenName": "Pierangela", 
            "type": "Person"
          }, 
          {
            "familyName": "Zhou", 
            "givenName": "Jianying", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-38980-1_20", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-31283-0", 
            "978-3-642-31284-7"
          ], 
          "name": "Applied Cryptography and Network Security", 
          "type": "Book"
        }, 
        "name": "NEON Implementation of an Attribute-Based Encryption Scheme", 
        "pagination": "322-338", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-38980-1_20"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "ab944a77df2dd3c325d93ece22a81bf1a374ab4b30dd4ff052d37bcccdb8def7"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1036018547"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-38980-1_20", 
          "https://app.dimensions.ai/details/publication/pub.1036018547"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:58", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000349_0000000349/records_113641_00000001.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-642-38980-1_20"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_20'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_20'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_20'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_20'


     

    This table displays all metadata directly associated to this object as RDF triples.

    131 TRIPLES      23 PREDICATES      40 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-38980-1_20 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nbad7fa067b6b45b9ba42c0491b850713
    4 schema:citation sg:pub.10.1007/11693383_22
    5 sg:pub.10.1007/3-540-44647-8_11
    6 sg:pub.10.1007/978-3-540-85538-5_15
    7 sg:pub.10.1007/978-3-642-13013-7_13
    8 sg:pub.10.1007/978-3-642-19379-8_4
    9 sg:pub.10.1007/978-3-642-20465-4_5
    10 sg:pub.10.1007/978-3-642-25516-8_18
    11 sg:pub.10.1007/978-3-642-28496-0_25
    12 sg:pub.10.1007/978-3-642-35999-6_11
    13 sg:pub.10.1007/978-3-642-36334-4_13
    14 https://doi.org/10.1090/s0025-5718-2012-02625-1
    15 https://doi.org/10.1109/40.502403
    16 https://doi.org/10.1109/arith.2007.11
    17 schema:datePublished 2013
    18 schema:datePublishedReg 2013-01-01
    19 schema:description In 2011, Waters presented a ciphertext-policy attribute- based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen for this protocol lie in the context of mobile devices such a smartphones and tablets, which in a majority of instances are powered by an ARM processor supporting the NEON vector set of instructions. In this paper we present the design of a software cryptographic library that implements a 127-bit security level attribute-based encryption scheme over mobile devices equipped with a 1.4GHz Exynos 4 Cortex-A9 processor and a developing board that hosts a 1.7 GHz Exynos 5 Cortex-A15 processor. For the latter platform and taking advantage of the inherent parallelism of the NEON vector instructions, our library computes a single optimal pairing over a Barreto-Naehrig curve approximately 2 times faster than the best timings previously reported on ARM platforms at this level of security. Further, using a 6-attribute access formula our library is able to encrypt/decrypt a text/ciphertext in less than 7.5mS and 15.67mS, respectively.
    20 schema:editor Nba97d0994f1b4257aa1bf6818534052a
    21 schema:genre chapter
    22 schema:inLanguage en
    23 schema:isAccessibleForFree true
    24 schema:isPartOf N5515b5ea01c64c8ea46c917ddf5df6c0
    25 schema:name NEON Implementation of an Attribute-Based Encryption Scheme
    26 schema:pagination 322-338
    27 schema:productId N5e9ae577f9d8478e87314e45bafe1199
    28 N7eb17a3e86324bae99c99c8d3b7e818d
    29 N9ae359e65a8044f3892d3bb73e4c7e17
    30 schema:publisher Naf98450ca36940338b924367a92f135b
    31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036018547
    32 https://doi.org/10.1007/978-3-642-38980-1_20
    33 schema:sdDatePublished 2019-04-16T05:58
    34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    35 schema:sdPublisher Nb8a0a5c1814e42eb9897468033a2a7c9
    36 schema:url https://link.springer.com/10.1007%2F978-3-642-38980-1_20
    37 sgo:license sg:explorer/license/
    38 sgo:sdDataset chapters
    39 rdf:type schema:Chapter
    40 N0153b0143cd14fc5b0f9ab8e8697cc61 rdf:first sg:person.012704077153.90
    41 rdf:rest rdf:nil
    42 N1895e23316e44535b40e55dc0b64e715 schema:familyName Bao
    43 schema:givenName Feng
    44 rdf:type schema:Person
    45 N472448aa854e46338e18dee7a9bed53f rdf:first N9fecee50fc4b455581bde85ead6500b8
    46 rdf:rest Nace742d041b34eeca0244a2c15fb7652
    47 N5515b5ea01c64c8ea46c917ddf5df6c0 schema:isbn 978-3-642-31283-0
    48 978-3-642-31284-7
    49 schema:name Applied Cryptography and Network Security
    50 rdf:type schema:Book
    51 N595d3f10dab74458b1f9b12ac89acdff schema:familyName Zhou
    52 schema:givenName Jianying
    53 rdf:type schema:Person
    54 N5e9ae577f9d8478e87314e45bafe1199 schema:name dimensions_id
    55 schema:value pub.1036018547
    56 rdf:type schema:PropertyValue
    57 N7eb17a3e86324bae99c99c8d3b7e818d schema:name doi
    58 schema:value 10.1007/978-3-642-38980-1_20
    59 rdf:type schema:PropertyValue
    60 N9ae359e65a8044f3892d3bb73e4c7e17 schema:name readcube_id
    61 schema:value ab944a77df2dd3c325d93ece22a81bf1a374ab4b30dd4ff052d37bcccdb8def7
    62 rdf:type schema:PropertyValue
    63 N9fecee50fc4b455581bde85ead6500b8 schema:familyName Samarati
    64 schema:givenName Pierangela
    65 rdf:type schema:Person
    66 Nace742d041b34eeca0244a2c15fb7652 rdf:first N595d3f10dab74458b1f9b12ac89acdff
    67 rdf:rest rdf:nil
    68 Naf98450ca36940338b924367a92f135b schema:location Berlin, Heidelberg
    69 schema:name Springer Berlin Heidelberg
    70 rdf:type schema:Organisation
    71 Nb8a0a5c1814e42eb9897468033a2a7c9 schema:name Springer Nature - SN SciGraph project
    72 rdf:type schema:Organization
    73 Nba97d0994f1b4257aa1bf6818534052a rdf:first N1895e23316e44535b40e55dc0b64e715
    74 rdf:rest N472448aa854e46338e18dee7a9bed53f
    75 Nbad7fa067b6b45b9ba42c0491b850713 rdf:first sg:person.015746601433.51
    76 rdf:rest N0153b0143cd14fc5b0f9ab8e8697cc61
    77 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    78 schema:name Information and Computing Sciences
    79 rdf:type schema:DefinedTerm
    80 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    81 schema:name Computer Software
    82 rdf:type schema:DefinedTerm
    83 sg:person.012704077153.90 schema:affiliation https://www.grid.ac/institutes/grid.418275.d
    84 schema:familyName Rodríguez-Henríquez
    85 schema:givenName Francisco
    86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012704077153.90
    87 rdf:type schema:Person
    88 sg:person.015746601433.51 schema:affiliation https://www.grid.ac/institutes/grid.418275.d
    89 schema:familyName Sánchez
    90 schema:givenName Ana Helena
    91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015746601433.51
    92 rdf:type schema:Person
    93 sg:pub.10.1007/11693383_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039881626
    94 https://doi.org/10.1007/11693383_22
    95 rdf:type schema:CreativeWork
    96 sg:pub.10.1007/3-540-44647-8_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044250953
    97 https://doi.org/10.1007/3-540-44647-8_11
    98 rdf:type schema:CreativeWork
    99 sg:pub.10.1007/978-3-540-85538-5_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032677673
    100 https://doi.org/10.1007/978-3-540-85538-5_15
    101 rdf:type schema:CreativeWork
    102 sg:pub.10.1007/978-3-642-13013-7_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042795640
    103 https://doi.org/10.1007/978-3-642-13013-7_13
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/978-3-642-19379-8_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021592316
    106 https://doi.org/10.1007/978-3-642-19379-8_4
    107 rdf:type schema:CreativeWork
    108 sg:pub.10.1007/978-3-642-20465-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028884731
    109 https://doi.org/10.1007/978-3-642-20465-4_5
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-642-25516-8_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050305627
    112 https://doi.org/10.1007/978-3-642-25516-8_18
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-642-28496-0_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009484864
    115 https://doi.org/10.1007/978-3-642-28496-0_25
    116 rdf:type schema:CreativeWork
    117 sg:pub.10.1007/978-3-642-35999-6_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045637643
    118 https://doi.org/10.1007/978-3-642-35999-6_11
    119 rdf:type schema:CreativeWork
    120 sg:pub.10.1007/978-3-642-36334-4_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011350938
    121 https://doi.org/10.1007/978-3-642-36334-4_13
    122 rdf:type schema:CreativeWork
    123 https://doi.org/10.1090/s0025-5718-2012-02625-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1059336775
    124 rdf:type schema:CreativeWork
    125 https://doi.org/10.1109/40.502403 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061168196
    126 rdf:type schema:CreativeWork
    127 https://doi.org/10.1109/arith.2007.11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095068885
    128 rdf:type schema:CreativeWork
    129 https://www.grid.ac/institutes/grid.418275.d schema:alternateName Instituto Politécnico Nacional
    130 schema:name Computer Science Department, CINVESTAV-IPN, Mexico
    131 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...