{"id":"https://openalex.org/W2289372344","doi":"https://doi.org/10.1007/s13389-016-0121-x","title":"Implementation of a leakage-resilient ElGamal key encapsulation mechanism","display_name":"Implementation of a leakage-resilient ElGamal key encapsulation mechanism","publication_year":2016,"publication_date":"2016-02-29","ids":{"openalex":"https://openalex.org/W2289372344","doi":"https://doi.org/10.1007/s13389-016-0121-x","mag":"2289372344"},"language":"en","primary_location":{"id":"doi:10.1007/s13389-016-0121-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-016-0121-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011572026","display_name":"David Galindo","orcid":"https://orcid.org/0000-0003-3563-5551"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"David Galindo","raw_affiliation_strings":["School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089125756","display_name":"Johann Gro\u00dfsch\u00e4dl","orcid":"https://orcid.org/0009-0006-3210-3102"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Johann Gro\u00dfsch\u00e4dl","raw_affiliation_strings":["University of Luxembourg, FSTC, 6 rue Richard Coudenhove-Kalergi, 1359, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, FSTC, 6 rue Richard Coudenhove-Kalergi, 1359, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462347","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-8578-2635"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007633970","display_name":"Praveen Kumar Vadnala","orcid":"https://orcid.org/0009-0004-0055-828X"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Praveen Kumar Vadnala","raw_affiliation_strings":["University of Luxembourg, FSTC, 6 rue Richard Coudenhove-Kalergi, 1359, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, FSTC, 6 rue Richard Coudenhove-Kalergi, 1359, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008324213","display_name":"S. Sree Vivek","orcid":"https://orcid.org/0000-0002-8426-0859"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Srinivas Vivek","raw_affiliation_strings":["University of Bristol, Merchant Venturers Building, Woodland Road, Clifton, Bristol, UK"],"affiliations":[{"raw_affiliation_string":"University of Bristol, Merchant Venturers Building, Woodland Road, Clifton, Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011572026"],"corresponding_institution_ids":["https://openalex.org/I79619799"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2390,"currency":"EUR","value_usd":2990},"fwci":3.1105,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.92777586,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"6","issue":"3","first_page":"229","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.6925424933433533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5416572093963623},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4970283806324005},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45775046944618225},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.45520710945129395},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.4499351978302002},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3853805363178253},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3381038308143616},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31203049421310425}],"concepts":[{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.6925424933433533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5416572093963623},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4970283806324005},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45775046944618225},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.45520710945129395},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.4499351978302002},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3853805363178253},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3381038308143616},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31203049421310425},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0}],"mesh":[],"locations_count":8,"locations":[{"id":"doi:10.1007/s13389-016-0121-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-016-0121-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:orbilu.uni.lu:10993/37481","is_oa":false,"landing_page_url":"https://orbilu.uni.lu/handle/10993/37481","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cryptographic Engineering, 6 (3), 229-238 (2016-09)","raw_type":"peer reviewed"},{"id":"pmh:oai:pure.atira.dk:Publications/4fef0ce8-9472-47c5-8355-ca6771da2b47","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/4fef0ce8-9472-47c5-8355-ca6771da2b47","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/4fef0ce8-9472-47c5-8355-ca6771da2b47","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Galindo, D, Gro\u00dfsch\u00e4dl, J, Liu, Z, Vadnala, P K & Vivek, S 2016, 'Implementation of a leakage-resilient ElGamal key encapsulation mechanism', Journal of Cryptographic Engineering, vol. 6, no. 3, pp. 229\u2013238. https://doi.org/10.1007/s13389-016-0121-x","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:publications/4fef0ce8-9472-47c5-8355-ca6771da2b47","is_oa":true,"landing_page_url":"https://research.birmingham.ac.uk/portal/en/publications/implementation-of-a-leakageresilient-elgamal-key-encapsulation-mechanism(4fef0ce8-9472-47c5-8355-ca6771da2b47).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/1330c4dd-120f-4d9e-b712-52974f005e8a","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/1330c4dd-120f-4d9e-b712-52974f005e8a","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Galindo, D, Gro\u00dfsch\u00e4dl, J, Liu, Z, Vadnala, P K & Vivek, S 2016, 'Implementation of a leakage-resilient ElGamal key encapsulation mechanism', Journal of Cryptographic Engineering, vol. 6, no. 3, pp. 229-238. https://doi.org/10.1007/s13389-016-0121-x","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/1330c4dd-120f-4d9e-b712-52974f005e8a","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/1330c4dd-120f-4d9e-b712-52974f005e8a","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Galindo, D, Gro\u00dfsch\u00e4dl, J, Liu, Z, Vadnala, P K & Vivek, S 2016, 'Implementation of a leakage-resilient ElGamal key encapsulation mechanism', Journal of Cryptographic Engineering, vol. 6, no. 3, pp. 229-238. https://doi.org/10.1007/s13389-016-0121-x","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/1330c4dd-120f-4d9e-b712-52974f005e8a","is_oa":true,"landing_page_url":"https://eprint.iacr.org/2014/835","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1007/s13389-016-0121-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s13389-016-0121-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf","source":{"id":"https://openalex.org/S2764800400","display_name":"Journal of Cryptographic Engineering","issn_l":"2190-8508","issn":["2190-8508","2190-8516"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptographic Engineering","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1208334278","display_name":null,"funder_award_id":"EP/L001802/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2289372344.pdf","grobid_xml":"https://content.openalex.org/works/W2289372344.grobid-xml"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W28380714","https://openalex.org/W47178525","https://openalex.org/W111085860","https://openalex.org/W154633427","https://openalex.org/W191000419","https://openalex.org/W236432643","https://openalex.org/W1487143383","https://openalex.org/W1495065856","https://openalex.org/W1508077776","https://openalex.org/W1511843316","https://openalex.org/W1536508214","https://openalex.org/W1547639591","https://openalex.org/W1553083934","https://openalex.org/W1562630396","https://openalex.org/W1584260451","https://openalex.org/W1588518948","https://openalex.org/W1599026900","https://openalex.org/W1603220704","https://openalex.org/W1606729219","https://openalex.org/W1610688607","https://openalex.org/W1613874182","https://openalex.org/W1800093586","https://openalex.org/W1801647650","https://openalex.org/W1832756347","https://openalex.org/W1960421507","https://openalex.org/W2004814164","https://openalex.org/W2061997785","https://openalex.org/W2069900560","https://openalex.org/W2080132708","https://openalex.org/W2106080142","https://openalex.org/W2116556172","https://openalex.org/W2118432793","https://openalex.org/W2131559681","https://openalex.org/W2146813141","https://openalex.org/W2154909745","https://openalex.org/W2164988972","https://openalex.org/W2402256104","https://openalex.org/W2553121834","https://openalex.org/W3030438825","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W1821857592","https://openalex.org/W2057474768","https://openalex.org/W4213010969","https://openalex.org/W3103765022","https://openalex.org/W2119606669","https://openalex.org/W2094893810","https://openalex.org/W4298965518","https://openalex.org/W1806182398","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"Leakage-resilient":[0],"cryptography":[1],"aims":[2],"to":[3,14,52,63,100,123,179,187,227],"extend":[4],"the":[5,10,44,54,68,90,94,104,107,111,121,124,134,140,159,172,181,194,223,241,266],"rigorous":[6],"guarantees":[7],"achieved":[8],"through":[9],"provable":[11],"security":[12,149],"paradigm":[13],"physical":[15],"implementations.":[16],"The":[17,59],"constructions":[18],"designed":[19],"on":[20,106,139,240],"basis":[21],"of":[22,46,89,110,133,142,171,185,237],"this":[23,65,143,154],"new":[24],"approach":[25],"inevitably":[26],"suffer":[27],"from":[28,259],"an":[29,189,206,220],"Achilles":[30],"heel:":[31],"a":[32,39,87,147,168,199,214,234,260],"bounded":[33,91],"leakage":[34,55,92,112,125,156,182,195],"assumption":[35],"is":[36,86,98,198],"needed.":[37],"Currently,":[38],"huge":[40],"gap":[41,66],"exists":[42],"between":[43],"theory":[45],"such":[47],"designs":[48],"and":[49,79,93,117,229,244],"their":[50],"implementation":[51,170,236],"confirm":[53],"resilience":[56],"in":[57,81,114,131,153,174,202,268],"practice.":[58,101],"present":[60,233],"work":[61],"tries":[62],"narrow":[64],"for":[67,151],"leakage-resilient":[69],"bilinear":[70,161],"ElGamal":[71],"key":[72],"encapsulation":[73],"mechanism":[74],"(BEG-KEM)":[75],"proposed":[76],"by":[77,213],"Kiltz":[78],"Pietrzak":[80],"2010.":[82],"Our":[83],"first":[84],"contribution":[85],"variant":[88],"only-computation-leaks":[95],"model":[96,157],"that":[97,120,167,192,210],"closer":[99],"We":[102,145,249],"weaken":[103],"restriction":[105],"image":[108],"size":[109],"functions":[113,126],"these":[115],"models":[116],"only":[118],"insist":[119],"inputs":[122],"have":[127],"sufficient":[128],"min-entropy":[129],"left,":[130],"spite":[132],"leakage,":[135],"with":[136],"no":[137],"limitation":[138],"quantity":[141],"leakage.":[144],"provide":[146,245],"novel":[148],"reduction":[150],"BEG-KEM":[152,175],"relaxed":[155],"using":[158],"generic":[160],"group":[162,225],"axiom.":[163],"Secondly,":[164],"we":[165,204,232],"show":[166],"naive":[169],"exponentiation":[173,190,212],"makes":[176],"it":[177],"impossible":[178],"meet":[180],"bound.":[183],"Instead":[184],"trying":[186],"find":[188],"algorithm":[191],"meets":[193],"axiom":[196],"(which":[197],"non-trivial":[200],"problem":[201],"practice),":[203],"propose":[205],"advanced":[207],"scheme,":[208],"BEG-KEM+,":[209],"avoids":[211],"secret":[215],"value,":[216],"but":[217],"rather":[218],"uses":[219],"encoding":[221],"into":[222,264],"base":[224],"due":[226],"Fouque":[228],"Tibouchi.":[230],"Thirdly,":[231],"software":[235],"BEG-KEM+":[238],"based":[239],"Miracl":[242],"library":[243],"detailed":[246],"experimental":[247],"results.":[248],"also":[250],"assess":[251],"its":[252],"(theoretical)":[253],"resistance":[254],"against":[255],"power":[256],"analysis":[257],"attacks":[258],"practical":[261],"perspective,":[262],"taking":[263],"account":[265],"state-of-the-art":[267],"side-channel":[269],"cryptanalysis.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
