{"id":"https://openalex.org/W2710859483","doi":"https://doi.org/10.1109/hst.2017.7951796","title":"Memory-constrained implementation of lattice-based encryption scheme on standard Java Card","display_name":"Memory-constrained implementation of lattice-based encryption scheme on standard Java Card","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2710859483","doi":"https://doi.org/10.1109/hst.2017.7951796","mag":"2710859483"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2017.7951796","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2017.7951796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015656305","display_name":"Ye Yuan","orcid":"https://orcid.org/0000-0002-4506-6295"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Ye Yuan","raw_affiliation_strings":["Graduate School of Mathematics, Kyushu University"],"affiliations":[{"raw_affiliation_string":"Graduate School of Mathematics, Kyushu University","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014137807","display_name":"Kazuhide Fukushima","orcid":"https://orcid.org/0000-0003-2571-0116"},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuhide Fukushima","raw_affiliation_strings":["KDDI Research, Inc"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054965256","display_name":"Shinsaku Kiyomoto","orcid":"https://orcid.org/0000-0003-0268-0532"},"institutions":[{"id":"https://openalex.org/I4210086780","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19","country_code":"JP","type":"government","lineage":["https://openalex.org/I4210086780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shinsaku Kiyomoto","raw_affiliation_strings":["CREST, Japan Science and Technology Agency"],"affiliations":[{"raw_affiliation_string":"CREST, Japan Science and Technology Agency","institution_ids":["https://openalex.org/I4210086780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000004915","display_name":"Tsuyoshi Takagi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsuyoshi Takagi","raw_affiliation_strings":["KDDI Research, Inc"],"affiliations":[{"raw_affiliation_string":"KDDI Research, Inc","institution_ids":["https://openalex.org/I4210164495"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5015656305"],"corresponding_institution_ids":["https://openalex.org/I135598925"],"apc_list":null,"apc_paid":null,"fwci":0.39,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69517145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9230","issue":null,"first_page":"47","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112301826477051},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based cryptography","score":0.6338220238685608},{"id":"https://openalex.org/keywords/java-card","display_name":"Java Card","score":0.6150476336479187},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5779622793197632},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5718931555747986},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5328823328018188},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.47943180799484253},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.465290904045105},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.46291640400886536},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42365992069244385},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3419133126735687},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3332942724227905},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2878720164299011},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1760256290435791},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.157215416431427},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.15409252047538757},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.15329065918922424},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.14390119910240173},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.09359201788902283}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112301826477051},{"id":"https://openalex.org/C137660015","wikidata":"https://www.wikidata.org/wiki/Q6497083","display_name":"Lattice-based cryptography","level":5,"score":0.6338220238685608},{"id":"https://openalex.org/C47747970","wikidata":"https://www.wikidata.org/wiki/Q46101","display_name":"Java Card","level":4,"score":0.6150476336479187},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5779622793197632},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5718931555747986},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5328823328018188},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.47943180799484253},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.465290904045105},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.46291640400886536},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42365992069244385},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3419133126735687},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3332942724227905},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2878720164299011},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1760256290435791},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.157215416431427},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.15409252047538757},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.15329065918922424},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.14390119910240173},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.09359201788902283},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hst.2017.7951796","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2017.7951796","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W103701422","https://openalex.org/W159145550","https://openalex.org/W179223734","https://openalex.org/W1595827207","https://openalex.org/W1598269861","https://openalex.org/W1669999576","https://openalex.org/W1761303171","https://openalex.org/W2038761522","https://openalex.org/W2061949491","https://openalex.org/W2098290658","https://openalex.org/W2123316699","https://openalex.org/W2151954684","https://openalex.org/W2319916405","https://openalex.org/W2401833010","https://openalex.org/W2494078997","https://openalex.org/W3029097307","https://openalex.org/W3121146673","https://openalex.org/W4234053898","https://openalex.org/W4297991408","https://openalex.org/W6607360421","https://openalex.org/W6635737710","https://openalex.org/W6668387570","https://openalex.org/W6713080850","https://openalex.org/W6724049718"],"related_works":["https://openalex.org/W960661423","https://openalex.org/W2374466538","https://openalex.org/W2189241774","https://openalex.org/W1579379285","https://openalex.org/W27115726","https://openalex.org/W790895026","https://openalex.org/W1593110340","https://openalex.org/W2073841385","https://openalex.org/W2186643125","https://openalex.org/W1827849520"],"abstract_inverted_index":{"Since":[0],"NSA":[1],"announced":[2],"the":[3,8,16,20,42,58,80,117,145,178],"plans":[4],"for":[5,61,140],"transitioning":[6],"to":[7,13,48,68,79],"algorithms":[9],"which":[10,184],"are":[11,107,181],"resistant":[12],"attacks":[14],"by":[15,143],"potential":[17],"quantum":[18],"computers,":[19],"interest":[21],"of":[22,24,45,57,120,147],"implementation":[23,44,119],"post-quantum":[25],"cryptography":[26],"(PQC)":[27],"on":[28,93,125,173,190],"various":[29],"devices":[30],"has":[31,63],"emerged.":[32],"Including":[33],"widely":[34],"used":[35],"Java":[36,94,127,174,191],"Card,":[37,95],"memory-constrained":[38],"smart":[39],"cards":[40],"need":[41],"efficient":[43],"encryption":[46,123],"schemes":[47],"resist":[49],"quantum-computing":[50],"attacks.":[51],"Meanwhile,":[52],"lattice-based":[53,105,122,188],"cryptography,":[54],"as":[55],"one":[56],"strongest":[59],"candidates":[60],"PQC,":[62],"attracted":[64],"wide":[65],"attention":[66],"due":[67,78],"their":[69],"applicability":[70],"and":[71,84,96,152,164],"operating":[72],"efficiency":[73],"in":[74,138],"recent":[75],"years.":[76],"However,":[77],"limited":[81],"memory":[82],"resources":[83],"computing":[85],"power,":[86],"long":[87,179],"integer":[88,168],"multiplication":[89,163],"is":[90,132],"a":[91,103,121],"challenge":[92],"it":[97],"had":[98],"been":[99],"considered":[100],"that":[101,161],"only":[102],"few":[104],"cryptosystems":[106],"fitting":[108],"into":[109],"such":[110],"devices.":[111],"In":[112],"this":[113],"paper,":[114],"we":[115,159],"show":[116],"first":[118],"scheme":[124],"standard":[126],"Card":[128,175,192],"whose":[129],"running":[130,186],"time":[131],"nearly":[133],"optimal":[134],"(about":[135],"100":[136],"seconds":[137],"decryption":[139],"128-bit":[141],"security)":[142],"combining":[144],"use":[146],"iterative":[148],"fast":[149],"Fourier":[150],"transform":[151],"improved":[153],"Montgomery":[154],"modular":[155],"multiplication.":[156],"More":[157],"importantly,":[158],"indicate":[160],"polynomial":[162],"over":[165],"signed":[166],"15-bit":[167],"arithmetic":[169],"can":[170],"be":[171],"performed":[172],"even":[176],"if":[177],"integers":[180],"not":[182],"supported,":[183],"makes":[185],"more":[187],"protocols":[189],"achievable.":[193]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
