{"id":"https://openalex.org/W1528118027","doi":"https://doi.org/10.1007/978-3-642-14712-8_19","title":"Combined Implementation Attack Resistant Exponentiation","display_name":"Combined Implementation Attack Resistant Exponentiation","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1528118027","doi":"https://doi.org/10.1007/978-3-642-14712-8_19","mag":"1528118027"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-14712-8_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-14712-8_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033616437","display_name":"J\u00f6rn-Marc Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"J\u00f6rn-Marc Schmidt","raw_affiliation_strings":["Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","[Graz University of Technology, Institute for Applied Information Processing and Communications, Graz, Austria]"],"affiliations":[{"raw_affiliation_string":"Institute for Applied Information Processing and Communications, Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]},{"raw_affiliation_string":"[Graz University of Technology, Institute for Applied Information Processing and Communications, Graz, Austria]","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005525776","display_name":"Michael Tunstall","orcid":"https://orcid.org/0000-0002-7107-8644"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Tunstall","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Bristol, United Kingdom","Department of Computer Science, University of Bristol, Bristol, United Kingdom;"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Bristol, United Kingdom;","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111606942","display_name":"Roberto Avanzi","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Roberto Avanzi","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046006459","display_name":"Ilya Kizhvatov","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Ilya Kizhvatov","raw_affiliation_strings":["Computer Science and Communications Research Unit, University of Luxembourg, Luxembourg","University of Luxembourg, Computer Science and Communications Research Unit, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Computer Science and Communications Research Unit, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"University of Luxembourg, Computer Science and Communications Research Unit, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088124303","display_name":"Timo Kasper","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Timo Kasper","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080836958","display_name":"David Oswald","orcid":"https://orcid.org/0000-0001-8524-5282"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"David Oswald","raw_affiliation_strings":["Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany"],"affiliations":[{"raw_affiliation_string":"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]},{"raw_affiliation_string":"Ruhr University Bochum Horst G\u00f6rtz Institute for IT Security Bochum Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5033616437"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":3.3904,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.93287923,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8525593280792236},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.8264583349227905},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.5098642706871033},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40476545691490173},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.37237170338630676},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.325480580329895},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3219265639781952},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17572280764579773},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08407554030418396},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07724258303642273}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8525593280792236},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.8264583349227905},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.5098642706871033},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40476545691490173},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.37237170338630676},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.325480580329895},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3219265639781952},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17572280764579773},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08407554030418396},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07724258303642273},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-14712-8_19","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-14712-8_19","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.187.6012","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6012","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.crypto.rub.de/imperia/md/content/texte/publications/conferences/combined_implementation.pdf","raw_type":"text"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/b18a2b09-c666-4199-aa47-f1c8c3c063d8","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/b18a2b09-c666-4199-aa47-f1c8c3c063d8","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Schmidt, J-M, Tunstall, M, Avanzi, R M, Kizhvatov, I, Kasper, T & Oswald, D 2010, Combined Implementation Attack Resistant Exponentiation. in Latincrypt 2010. vol. 6212, Springer Berlin Heidelberg, pp. 305-322. < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001249 >","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8070027540","display_name":null,"funder_award_id":"EP/F039638/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W200116028","https://openalex.org/W1481078266","https://openalex.org/W1481330728","https://openalex.org/W1496363505","https://openalex.org/W1499791368","https://openalex.org/W1501265301","https://openalex.org/W1511843316","https://openalex.org/W1512914916","https://openalex.org/W1520407944","https://openalex.org/W1522276718","https://openalex.org/W1554128539","https://openalex.org/W1570388754","https://openalex.org/W1573553750","https://openalex.org/W1597805936","https://openalex.org/W1607006990","https://openalex.org/W1613874182","https://openalex.org/W1730333074","https://openalex.org/W1915929860","https://openalex.org/W1935672779","https://openalex.org/W1969260620","https://openalex.org/W2006512828","https://openalex.org/W2031571383","https://openalex.org/W2096133993","https://openalex.org/W2099629555","https://openalex.org/W2104841597","https://openalex.org/W2111725598","https://openalex.org/W2125637679","https://openalex.org/W2127262877","https://openalex.org/W2128771831","https://openalex.org/W2146070389","https://openalex.org/W2151279347","https://openalex.org/W2154909745","https://openalex.org/W2155441237","https://openalex.org/W2213307045","https://openalex.org/W2478032277","https://openalex.org/W2478327424","https://openalex.org/W2480510614","https://openalex.org/W2484588551","https://openalex.org/W2484860292","https://openalex.org/W2490955677","https://openalex.org/W2496045601","https://openalex.org/W2497291046","https://openalex.org/W2498906313","https://openalex.org/W2561675875","https://openalex.org/W2808262660","https://openalex.org/W2823896072","https://openalex.org/W2971126390","https://openalex.org/W4237535870","https://openalex.org/W4237544107","https://openalex.org/W4251062109","https://openalex.org/W4252558787","https://openalex.org/W4399339043"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W2107014706","https://openalex.org/W28274153","https://openalex.org/W2736837562","https://openalex.org/W2020808628","https://openalex.org/W2113040119","https://openalex.org/W2767903583"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
