Online template attacks View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2019-04

AUTHORS

Lejla Batina, Łukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall

ABSTRACT

Template attacks are a special kind of side-channel attacks that work in two stages. In a first stage, the attacker builds up a database of template traces collected from a device which is identical to the attacked device, but under the attacker’s control. In the second stage, traces from the target device are compared to the template traces to recover the secret key. In the context of attacking elliptic curve scalar multiplication with template attacks, one can interleave template generation and template matching and reduce the amount of template traces. This paper enhances the power of this technique by defining and applying the concept of online template attacks, a general attack technique with minimal assumptions for an attacker, who has very very limited control over the template device. We show that online template attacks need only one power consumption trace of a scalar multiplication on the target device; they are thus suitable not only against ECDSA and static elliptic curve Diffie–Hellman (ECDH), but also against elliptic curve scalar multiplication in ephemeral ECDH. In addition, online template attacks need only one template trace per scalar bit and they can be applied to a broad variety of scalar multiplication algorithms. To demonstrate the power of online template attacks, we recover scalar bits of a scalar multiplication using the double-and-add-always algorithm on a twisted Edwards curve running on a smartcard with an ATmega163 CPU. More... »

PAGES

1-16

References to SciGraph publications

  • 2001-09-20. Preventing SPA/DPA in ECC Systems Using the Jacobi Form in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2001
  • 2001-09-20. Hessian Elliptic Curves and Side-Channel Attacks in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS — CHES 2001
  • 2015. Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace in TOPICS IN CRYPTOLOGY –- CT-RSA 2015
  • 2012. Localized Electromagnetic Analysis of Cryptographic Implementations in TOPICS IN CRYPTOLOGY – CT-RSA 2012
  • 2016. Dismantling Real-World ECC with Horizontal and Vertical Template Attacks in CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN
  • 2010. Horizontal Correlation Analysis on Exponentiation in INFORMATION AND COMMUNICATIONS SECURITY
  • 2003. A New Class of Collision Attacks and Its Application to DES in FAST SOFTWARE ENCRYPTION
  • 2017. Single-Trace Side-Channel Attacks on Scalar Multiplications with Precomputations in SMART CARD RESEARCH AND ADVANCED APPLICATIONS
  • 2002. Weierstraß Elliptic Curves and Side-Channel Attacks in PUBLIC KEY CRYPTOGRAPHY
  • 2004. Projective Coordinates Leak in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004
  • 2008. Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS – CHES 2008
  • 2004. Smart-Card Implementation of Elliptic Curve Cryptography and DPA-Type Attacks in SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI
  • 2013. Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware in RADIO FREQUENCY IDENTIFICATION
  • 2001. Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm in SMART CARD PROGRAMMING AND SECURITY
  • 2014. Horizontal Collision Correlation Attack on Elliptic Curves in SELECTED AREAS IN CRYPTOGRAPHY -- SAC 2013
  • 2007. Highly Regular Right-to-Left Algorithms for Scalar Multiplication in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007
  • 2013. NaCl on 8-Bit AVR Microcontrollers in PROGRESS IN CRYPTOLOGY – AFRICACRYPT 2013
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s13389-017-0171-8

    DOI

    http://dx.doi.org/10.1007/s13389-017-0171-8

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1091198747


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Radboud University Nijmegen", 
              "id": "https://www.grid.ac/institutes/grid.5590.9", 
              "name": [
                "Radboud University Nijmegen, PO Box 9010, 6500 GL, Nijmegen, The Netherlands"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Batina", 
            "givenName": "Lejla", 
            "id": "sg:person.011204763147.44", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011204763147.44"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Riscure, Delftechpark 49, 2628 XJ, Delft, The Netherlands"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chmielewski", 
            "givenName": "\u0141ukasz", 
            "id": "sg:person.07775053302.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07775053302.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Radboud University Nijmegen", 
              "id": "https://www.grid.ac/institutes/grid.5590.9", 
              "name": [
                "Radboud University Nijmegen, PO Box 9010, 6500 GL, Nijmegen, The Netherlands"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Papachristodoulou", 
            "givenName": "Louiza", 
            "id": "sg:person.015335205677.14", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015335205677.14"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Radboud University Nijmegen", 
              "id": "https://www.grid.ac/institutes/grid.5590.9", 
              "name": [
                "Radboud University Nijmegen, PO Box 9010, 6500 GL, Nijmegen, The Netherlands"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Schwabe", 
            "givenName": "Peter", 
            "id": "sg:person.010637555557.91", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Rambus Cryptography Research Division, 425 Market Street 11th Floor, 94105, San Francisco, CA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Tunstall", 
            "givenName": "Michael", 
            "id": "sg:person.014502570447.36", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014502570447.36"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-24676-3_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003365947", 
              "https://doi.org/10.1007/978-3-540-24676-3_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-24676-3_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003365947", 
              "https://doi.org/10.1007/978-3-540-24676-3_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-38553-7_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009383266", 
              "https://doi.org/10.1007/978-3-642-38553-7_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010510449", 
              "https://doi.org/10.1007/3-540-44709-1_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010510449", 
              "https://doi.org/10.1007/3-540-44709-1_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-43283-0_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011652322", 
              "https://doi.org/10.1007/978-3-319-43283-0_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85053-3_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012813986", 
              "https://doi.org/10.1007/978-3-540-85053-3_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-27954-6_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022218582", 
              "https://doi.org/10.1007/978-3-642-27954-6_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45664-3_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023007500", 
              "https://doi.org/10.1007/3-540-45664-3_24"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028107487", 
              "https://doi.org/10.1007/3-540-44709-1_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44709-1_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028107487", 
              "https://doi.org/10.1007/3-540-44709-1_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/1-4020-8147-2_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029042728", 
              "https://doi.org/10.1007/1-4020-8147-2_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034399384", 
              "https://doi.org/10.1007/978-3-540-39887-5_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-39887-5_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034399384", 
              "https://doi.org/10.1007/978-3-540-39887-5_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-41332-2_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034909048", 
              "https://doi.org/10.1007/978-3-642-41332-2_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45418-7_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036508743", 
              "https://doi.org/10.1007/3-540-45418-7_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-17650-0_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037662158", 
              "https://doi.org/10.1007/978-3-642-17650-0_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16715-2_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1041673862", 
              "https://doi.org/10.1007/978-3-319-16715-2_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-43414-7_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047089875", 
              "https://doi.org/10.1007/978-3-662-43414-7_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74735-2_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049482356", 
              "https://doi.org/10.1007/978-3-540-74735-2_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74735-2_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049482356", 
              "https://doi.org/10.1007/978-3-540-74735-2_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tc.2004.13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061533986"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-54669-8_9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084717729", 
              "https://doi.org/10.1007/978-3-319-54669-8_9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/cis.2014.66", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094500492"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-04", 
        "datePublishedReg": "2019-04-01", 
        "description": "Template attacks are a special kind of side-channel attacks that work in two stages. In a first stage, the attacker builds up a database of template traces collected from a device which is identical to the attacked device, but under the attacker\u2019s control. In the second stage, traces from the target device are compared to the template traces to recover the secret key. In the context of attacking elliptic curve scalar multiplication with template attacks, one can interleave template generation and template matching and reduce the amount of template traces. This paper enhances the power of this technique by defining and applying the concept of online template attacks, a general attack technique with minimal assumptions for an attacker, who has very very limited control over the template device. We show that online template attacks need only one power consumption trace of a scalar multiplication on the target device; they are thus suitable not only against ECDSA and static elliptic curve Diffie\u2013Hellman (ECDH), but also against elliptic curve scalar multiplication in ephemeral ECDH. In addition, online template attacks need only one template trace per scalar bit and they can be applied to a broad variety of scalar multiplication algorithms. To demonstrate the power of online template attacks, we recover scalar bits of a scalar multiplication using the double-and-add-always algorithm on a twisted Edwards curve running on a smartcard with an ATmega163 CPU.", 
        "genre": "research_article", 
        "id": "sg:pub.10.1007/s13389-017-0171-8", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1136625", 
            "issn": [
              "2190-8508", 
              "2190-8516"
            ], 
            "name": "Journal of Cryptographic Engineering", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "1", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "9"
          }
        ], 
        "name": "Online template attacks", 
        "pagination": "1-16", 
        "productId": [
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "5f5bd76b427711c7ceb563d1c3b7cc5e33426c3dae329a0bedad2f723611995c"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s13389-017-0171-8"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1091198747"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s13389-017-0171-8", 
          "https://app.dimensions.ai/details/publication/pub.1091198747"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2019-04-11T14:18", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000372_0000000372/records_117100_00000003.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://link.springer.com/10.1007%2Fs13389-017-0171-8"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0171-8'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0171-8'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0171-8'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s13389-017-0171-8'


     

    This table displays all metadata directly associated to this object as RDF triples.

    167 TRIPLES      21 PREDICATES      46 URIs      19 LITERALS      7 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s13389-017-0171-8 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N2d18c17f4f42454a9c9263b3c5d09769
    4 schema:citation sg:pub.10.1007/1-4020-8147-2_8
    5 sg:pub.10.1007/3-540-44709-1_32
    6 sg:pub.10.1007/3-540-44709-1_33
    7 sg:pub.10.1007/3-540-45418-7_18
    8 sg:pub.10.1007/3-540-45664-3_24
    9 sg:pub.10.1007/978-3-319-16715-2_23
    10 sg:pub.10.1007/978-3-319-43283-0_6
    11 sg:pub.10.1007/978-3-319-54669-8_9
    12 sg:pub.10.1007/978-3-540-24676-3_16
    13 sg:pub.10.1007/978-3-540-39887-5_16
    14 sg:pub.10.1007/978-3-540-74735-2_10
    15 sg:pub.10.1007/978-3-540-85053-3_2
    16 sg:pub.10.1007/978-3-642-17650-0_5
    17 sg:pub.10.1007/978-3-642-27954-6_15
    18 sg:pub.10.1007/978-3-642-38553-7_9
    19 sg:pub.10.1007/978-3-642-41332-2_9
    20 sg:pub.10.1007/978-3-662-43414-7_28
    21 https://doi.org/10.1109/cis.2014.66
    22 https://doi.org/10.1109/tc.2004.13
    23 schema:datePublished 2019-04
    24 schema:datePublishedReg 2019-04-01
    25 schema:description Template attacks are a special kind of side-channel attacks that work in two stages. In a first stage, the attacker builds up a database of template traces collected from a device which is identical to the attacked device, but under the attacker’s control. In the second stage, traces from the target device are compared to the template traces to recover the secret key. In the context of attacking elliptic curve scalar multiplication with template attacks, one can interleave template generation and template matching and reduce the amount of template traces. This paper enhances the power of this technique by defining and applying the concept of online template attacks, a general attack technique with minimal assumptions for an attacker, who has very very limited control over the template device. We show that online template attacks need only one power consumption trace of a scalar multiplication on the target device; they are thus suitable not only against ECDSA and static elliptic curve Diffie–Hellman (ECDH), but also against elliptic curve scalar multiplication in ephemeral ECDH. In addition, online template attacks need only one template trace per scalar bit and they can be applied to a broad variety of scalar multiplication algorithms. To demonstrate the power of online template attacks, we recover scalar bits of a scalar multiplication using the double-and-add-always algorithm on a twisted Edwards curve running on a smartcard with an ATmega163 CPU.
    26 schema:genre research_article
    27 schema:inLanguage en
    28 schema:isAccessibleForFree true
    29 schema:isPartOf N5a90560f77ea45b7aa4004c3ca0b10c8
    30 N7989a90ef5f74d38ab3636de995faf3d
    31 sg:journal.1136625
    32 schema:name Online template attacks
    33 schema:pagination 1-16
    34 schema:productId N3d8a048c9c2b4fe3bc42a9bc71fd6c73
    35 N659f7ef31f4146bca84d5ecd69e511ec
    36 N687ba3fd3f7e496985631c2a0432b235
    37 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091198747
    38 https://doi.org/10.1007/s13389-017-0171-8
    39 schema:sdDatePublished 2019-04-11T14:18
    40 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    41 schema:sdPublisher N8a33f6d2babf4c828d560c661399efa2
    42 schema:url https://link.springer.com/10.1007%2Fs13389-017-0171-8
    43 sgo:license sg:explorer/license/
    44 sgo:sdDataset articles
    45 rdf:type schema:ScholarlyArticle
    46 N0d7b79d8ef5c4fd1ad6e716731e64169 rdf:first sg:person.015335205677.14
    47 rdf:rest N29198705691c42be94799841f800469a
    48 N11d1137b34f144b5b1ba92f2cec0ee8c schema:name Riscure, Delftechpark 49, 2628 XJ, Delft, The Netherlands
    49 rdf:type schema:Organization
    50 N1369fcb63b7a4c1f8faaeb92fd44b8bd rdf:first sg:person.014502570447.36
    51 rdf:rest rdf:nil
    52 N29198705691c42be94799841f800469a rdf:first sg:person.010637555557.91
    53 rdf:rest N1369fcb63b7a4c1f8faaeb92fd44b8bd
    54 N2d18c17f4f42454a9c9263b3c5d09769 rdf:first sg:person.011204763147.44
    55 rdf:rest N437096c40fd44b4d9e0053f5ece60c80
    56 N3d8a048c9c2b4fe3bc42a9bc71fd6c73 schema:name doi
    57 schema:value 10.1007/s13389-017-0171-8
    58 rdf:type schema:PropertyValue
    59 N437096c40fd44b4d9e0053f5ece60c80 rdf:first sg:person.07775053302.37
    60 rdf:rest N0d7b79d8ef5c4fd1ad6e716731e64169
    61 N5a90560f77ea45b7aa4004c3ca0b10c8 schema:volumeNumber 9
    62 rdf:type schema:PublicationVolume
    63 N659f7ef31f4146bca84d5ecd69e511ec schema:name dimensions_id
    64 schema:value pub.1091198747
    65 rdf:type schema:PropertyValue
    66 N687ba3fd3f7e496985631c2a0432b235 schema:name readcube_id
    67 schema:value 5f5bd76b427711c7ceb563d1c3b7cc5e33426c3dae329a0bedad2f723611995c
    68 rdf:type schema:PropertyValue
    69 N71fbc01b5ea64fc2a6b982359616c9a9 schema:name Rambus Cryptography Research Division, 425 Market Street 11th Floor, 94105, San Francisco, CA, USA
    70 rdf:type schema:Organization
    71 N7989a90ef5f74d38ab3636de995faf3d schema:issueNumber 1
    72 rdf:type schema:PublicationIssue
    73 N8a33f6d2babf4c828d560c661399efa2 schema:name Springer Nature - SN SciGraph project
    74 rdf:type schema:Organization
    75 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    76 schema:name Information and Computing Sciences
    77 rdf:type schema:DefinedTerm
    78 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    79 schema:name Artificial Intelligence and Image Processing
    80 rdf:type schema:DefinedTerm
    81 sg:journal.1136625 schema:issn 2190-8508
    82 2190-8516
    83 schema:name Journal of Cryptographic Engineering
    84 rdf:type schema:Periodical
    85 sg:person.010637555557.91 schema:affiliation https://www.grid.ac/institutes/grid.5590.9
    86 schema:familyName Schwabe
    87 schema:givenName Peter
    88 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91
    89 rdf:type schema:Person
    90 sg:person.011204763147.44 schema:affiliation https://www.grid.ac/institutes/grid.5590.9
    91 schema:familyName Batina
    92 schema:givenName Lejla
    93 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011204763147.44
    94 rdf:type schema:Person
    95 sg:person.014502570447.36 schema:affiliation N71fbc01b5ea64fc2a6b982359616c9a9
    96 schema:familyName Tunstall
    97 schema:givenName Michael
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014502570447.36
    99 rdf:type schema:Person
    100 sg:person.015335205677.14 schema:affiliation https://www.grid.ac/institutes/grid.5590.9
    101 schema:familyName Papachristodoulou
    102 schema:givenName Louiza
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015335205677.14
    104 rdf:type schema:Person
    105 sg:person.07775053302.37 schema:affiliation N11d1137b34f144b5b1ba92f2cec0ee8c
    106 schema:familyName Chmielewski
    107 schema:givenName Łukasz
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07775053302.37
    109 rdf:type schema:Person
    110 sg:pub.10.1007/1-4020-8147-2_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029042728
    111 https://doi.org/10.1007/1-4020-8147-2_8
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/3-540-44709-1_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010510449
    114 https://doi.org/10.1007/3-540-44709-1_32
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-44709-1_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028107487
    117 https://doi.org/10.1007/3-540-44709-1_33
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-45418-7_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036508743
    120 https://doi.org/10.1007/3-540-45418-7_18
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-45664-3_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023007500
    123 https://doi.org/10.1007/3-540-45664-3_24
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-319-16715-2_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041673862
    126 https://doi.org/10.1007/978-3-319-16715-2_23
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-319-43283-0_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011652322
    129 https://doi.org/10.1007/978-3-319-43283-0_6
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-319-54669-8_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084717729
    132 https://doi.org/10.1007/978-3-319-54669-8_9
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-540-24676-3_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003365947
    135 https://doi.org/10.1007/978-3-540-24676-3_16
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-540-39887-5_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034399384
    138 https://doi.org/10.1007/978-3-540-39887-5_16
    139 rdf:type schema:CreativeWork
    140 sg:pub.10.1007/978-3-540-74735-2_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049482356
    141 https://doi.org/10.1007/978-3-540-74735-2_10
    142 rdf:type schema:CreativeWork
    143 sg:pub.10.1007/978-3-540-85053-3_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012813986
    144 https://doi.org/10.1007/978-3-540-85053-3_2
    145 rdf:type schema:CreativeWork
    146 sg:pub.10.1007/978-3-642-17650-0_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037662158
    147 https://doi.org/10.1007/978-3-642-17650-0_5
    148 rdf:type schema:CreativeWork
    149 sg:pub.10.1007/978-3-642-27954-6_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022218582
    150 https://doi.org/10.1007/978-3-642-27954-6_15
    151 rdf:type schema:CreativeWork
    152 sg:pub.10.1007/978-3-642-38553-7_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009383266
    153 https://doi.org/10.1007/978-3-642-38553-7_9
    154 rdf:type schema:CreativeWork
    155 sg:pub.10.1007/978-3-642-41332-2_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034909048
    156 https://doi.org/10.1007/978-3-642-41332-2_9
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1007/978-3-662-43414-7_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047089875
    159 https://doi.org/10.1007/978-3-662-43414-7_28
    160 rdf:type schema:CreativeWork
    161 https://doi.org/10.1109/cis.2014.66 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094500492
    162 rdf:type schema:CreativeWork
    163 https://doi.org/10.1109/tc.2004.13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061533986
    164 rdf:type schema:CreativeWork
    165 https://www.grid.ac/institutes/grid.5590.9 schema:alternateName Radboud University Nijmegen
    166 schema:name Radboud University Nijmegen, PO Box 9010, 6500 GL, Nijmegen, The Netherlands
    167 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...