iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1145/1366110.1366126
{"id":"https://openalex.org/W2143185330","doi":"https://doi.org/10.1145/1366110.1366126","title":"A GF(p) elliptic curve group operator resistant against side channel attacks","display_name":"A GF(p) elliptic curve group operator resistant against side channel attacks","publication_year":2008,"publication_date":"2008-05-04","ids":{"openalex":"https://openalex.org/W2143185330","doi":"https://doi.org/10.1145/1366110.1366126","mag":"2143185330"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1366110.1366126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051982414","display_name":"Santosh K. Ghosh","orcid":"https://orcid.org/0000-0001-5669-7853"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Santosh Ghosh","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India;"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India;","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103710775","display_name":"Monjur Alam","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Monjur Alam","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India;"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India;","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113681745","display_name":"Dipanwita RoyChowdhury","orcid":null},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dipanwita RoyChowdhury","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India;"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India;","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103023953","display_name":"Indranil Sengupta","orcid":"https://orcid.org/0000-0002-5438-6653"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Indranil SenGupta","raw_affiliation_strings":["Indian Institute of Technology Kharagpur, Kharagpur, India;"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Kharagpur, Kharagpur, India;","institution_ids":["https://openalex.org/I145894827"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.276,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":4,"citation_normalized_percentile":{"value":0.529183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":76,"max":78},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.9868,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.6454637},{"id":"https://openalex.org/keywords/side-channel-attacks","display_name":"Side-Channel Attacks","score":0.557431},{"id":"https://openalex.org/keywords/power-analysis","display_name":"Power analysis","score":0.50142455},{"id":"https://openalex.org/keywords/elliptic-curves","display_name":"Elliptic Curves","score":0.500046},{"id":"https://openalex.org/keywords/tripling-oriented-doche\u2013icart\u2013kohel-curve","display_name":"Tripling-oriented Doche\u2013Icart\u2013Kohel curve","score":0.41853815}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.8212758},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.6454637},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.61087155},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.57903945},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5785263},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.5104698},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.50142455},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.49519125},{"id":"https://openalex.org/C117121985","wikidata":"https://www.wikidata.org/wiki/Q78380999","display_name":"Elliptic curve point multiplication","level":3,"score":0.4923619},{"id":"https://openalex.org/C37055786","wikidata":"https://www.wikidata.org/wiki/Q7843607","display_name":"Tripling-oriented Doche\u2013Icart\u2013Kohel curve","level":5,"score":0.41853815},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41337958},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.40173754},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3903172},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3340268},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3264897},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32567823},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.30847216},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14670098},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.119760156},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.108021975},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.08029327}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1366110.1366126","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1482218422","https://openalex.org/W1508193711","https://openalex.org/W1565369953","https://openalex.org/W1577129943","https://openalex.org/W1613874182","https://openalex.org/W1798101321","https://openalex.org/W1880212920","https://openalex.org/W1981998307","https://openalex.org/W1983289232","https://openalex.org/W2003736153","https://openalex.org/W2036378739","https://openalex.org/W2110487967","https://openalex.org/W2113018982","https://openalex.org/W2124489059","https://openalex.org/W2126541236","https://openalex.org/W2127115545","https://openalex.org/W2154909745"],"related_works":["https://openalex.org/W3203056599","https://openalex.org/W3184353839","https://openalex.org/W3153552368","https://openalex.org/W2540980044","https://openalex.org/W2392460858","https://openalex.org/W2384258366","https://openalex.org/W2188111145","https://openalex.org/W2166201516","https://openalex.org/W2102786134","https://openalex.org/W2070245645"],"abstract_inverted_index":{"This":[0],"paper":[1],"deals":[2],"with":[3,83],"FPGA":[4],"and":[5,48,72,77],"ASIC":[6],"implementations":[7],"of":[8,20,40,63],"side-channel":[9,78],"attack":[10],"resistant":[11],"elliptic":[12],"curve":[13],"cryptosystems":[14],"defined":[15],"over":[16],"GF(p).":[17],"The":[18],"elegance":[19],"the":[21,25],"design":[22,69],"lies":[23],"in":[24,32,54],"fact":[26],"that":[27],"all":[28],"operations":[29,51],"are":[30,52,58,81],"performed":[31,53,59],"binary":[33],"number":[34],"system,":[35],"thus":[36],"reducing":[37],"conversion":[38],"overheads":[39],"existing":[41,85],"architectures.":[42],"In":[43],"our":[44],"implementation,":[45],"point":[46,49],"addition":[47],"doubling":[50],"affine":[55],"coordinates.":[56],"They":[57],"using":[60],"same":[61],"amount":[62],"computation,":[64],"which":[65],"provides":[66],"a":[67],"secure":[68],"against":[70],"timing":[71],"power":[73],"analysis":[74,79],"attacks.":[75],"Implementation":[76],"results":[80],"compared":[82],"related":[84],"designs.":[86]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2143185330","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-10-18T20:38:44.992647","created_date":"2016-06-24"}