{"id":"https://openalex.org/W55636942","doi":"https://doi.org/10.1007/978-3-642-27257-8_7","title":"Redundant Modular Reduction Algorithms","display_name":"Redundant Modular Reduction Algorithms","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W55636942","doi":"https://doi.org/10.1007/978-3-642-27257-8_7","mag":"55636942"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-27257-8_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-27257-8_7","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-27257-8_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-27257-8_7.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057556892","display_name":"Vincent Dupaquis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vincent Dupaquis","raw_affiliation_strings":["Inside Secure, Avenue Victoire, 13790, Rousset, France"],"affiliations":[{"raw_affiliation_string":"Inside Secure, Avenue Victoire, 13790, Rousset, France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074492497","display_name":"Alexandre Venelli","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Alexandre Venelli","raw_affiliation_strings":["Inside Secure, Avenue Victoire, 13790, Rousset, France"],"affiliations":[{"raw_affiliation_string":"Inside Secure, Avenue Victoire, 13790, Rousset, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057556892"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":5.5928,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.96406924,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.8424705862998962},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7647480368614197},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7336400747299194},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6221746802330017},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5231267809867859},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49776914715766907},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.460823655128479},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.45816072821617126},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19984498620033264},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1818256378173828}],"concepts":[{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.8424705862998962},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7647480368614197},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7336400747299194},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6221746802330017},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5231267809867859},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49776914715766907},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.460823655128479},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.45816072821617126},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19984498620033264},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1818256378173828},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-642-27257-8_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-27257-8_7","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-27257-8_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01596301v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01596301","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.102-114, &#x27E8;10.1007/978-3-642-27257-8_7&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-27257-8_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-27257-8_7","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-27257-8_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W55636942.pdf","grobid_xml":"https://content.openalex.org/works/W55636942.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W153171884","https://openalex.org/W1498685334","https://openalex.org/W1511374591","https://openalex.org/W1515200869","https://openalex.org/W1528118027","https://openalex.org/W1540529576","https://openalex.org/W1565942289","https://openalex.org/W1579766512","https://openalex.org/W1613874182","https://openalex.org/W1660562555","https://openalex.org/W2004814164","https://openalex.org/W2031571383","https://openalex.org/W2045682094","https://openalex.org/W2052435632","https://openalex.org/W2145428071","https://openalex.org/W2145829971","https://openalex.org/W2148862943","https://openalex.org/W2154909745","https://openalex.org/W2478327424","https://openalex.org/W2480498986","https://openalex.org/W2484860292","https://openalex.org/W2488547546","https://openalex.org/W2496045601","https://openalex.org/W2497291046","https://openalex.org/W2561675875","https://openalex.org/W2950340889","https://openalex.org/W4235346328","https://openalex.org/W4237544107","https://openalex.org/W4289127653"],"related_works":["https://openalex.org/W2004522261","https://openalex.org/W1533979697","https://openalex.org/W4388212011","https://openalex.org/W2117623867","https://openalex.org/W2255754718","https://openalex.org/W2790517530","https://openalex.org/W2047843551","https://openalex.org/W2140653398","https://openalex.org/W2170171009","https://openalex.org/W3113453580"],"abstract_inverted_index":{"We":[0,41],"present":[1],"modular":[2,17,59],"reduction":[3,24,50,60,77],"algorithms":[4,51,63],"over":[5],"finite":[6],"fields":[7],"of":[8,15,38],"large":[9],"characteristic":[10],"that":[11],"allow":[12],"the":[13,34,45],"use":[14],"redundant":[16,67],"arithmetic.":[18],"This":[19,82],"technique":[20],"provides":[21],"constant":[22],"time":[23],"algorithms.":[25,96],"Moreover,":[26],"it":[27],"can":[28],"also":[29],"be":[30],"used":[31],"to":[32,44,54,88],"strengthen":[33],"differential":[35],"side-channel":[36],"resistance":[37],"asymmetric":[39],"cryptosystems.":[40],"propose":[42],"modifications":[43],"classic":[46],"Montgomery":[47],"and":[48,57],"Barrett":[49],"in":[52,86],"order":[53,87],"have":[55],"efficient":[56],"resistant":[58],"methods.":[61],"Our":[62],"are":[64,72],"called":[65],"dynamic":[66],"reductions":[68],"as":[69],"random":[70],"masks":[71],"intrinsically":[73],"added":[74],"within":[75],"each":[76],"for":[78],"a":[79],"small":[80],"overhead.":[81],"property":[83],"is":[84],"useful":[85],"thwart":[89],"recent":[90],"refined":[91],"attacks":[92],"on":[93],"public":[94],"key":[95]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
