{"id":"https://openalex.org/W2502355025","doi":"https://doi.org/10.1109/icce-tw.2016.7520896","title":"Efficient operation over F(2 4)2 for security technologies","display_name":"Efficient operation over F(2 4)2 for security technologies","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2502355025","doi":"https://doi.org/10.1109/icce-tw.2016.7520896","mag":"2502355025"},"language":"en","primary_location":{"id":"doi:10.1109/icce-tw.2016.7520896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw.2016.7520896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082090457","display_name":"Norito Jitsui","orcid":null},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Norito Jitsui","raw_affiliation_strings":["Tsushima-naka, Okayama University 1-1-1, Okayama, Japan"],"affiliations":[{"raw_affiliation_string":"Tsushima-naka, Okayama University 1-1-1, Okayama, Japan","institution_ids":["https://openalex.org/I163770644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065515042","display_name":"Yasuyuki Nogami","orcid":"https://orcid.org/0000-0001-6247-0719"},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yasuyuki Nogami","raw_affiliation_strings":["Tsushima-naka, Okayama University 1-1-1, Okayama, Japan"],"affiliations":[{"raw_affiliation_string":"Tsushima-naka, Okayama University 1-1-1, Okayama, Japan","institution_ids":["https://openalex.org/I163770644"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085541661","display_name":"Hwajeong Seo","orcid":"https://orcid.org/0000-0003-0069-9061"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hwajeong Seo","raw_affiliation_strings":["Institute for Infocomm Research, Singapore"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016918201","display_name":"Nasima Begum","orcid":"https://orcid.org/0000-0002-7155-5121"},"institutions":[{"id":"https://openalex.org/I163770644","display_name":"Okayama University","ror":"https://ror.org/02pc6pc55","country_code":"JP","type":"education","lineage":["https://openalex.org/I163770644"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Nasima Begum","raw_affiliation_strings":["Tsushima-naka, Okayama University 1-1-1, Okayama, Japan"],"affiliations":[{"raw_affiliation_string":"Tsushima-naka, Okayama University 1-1-1, Okayama, Japan","institution_ids":["https://openalex.org/I163770644"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082090457"],"corresponding_institution_ids":["https://openalex.org/I163770644"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09786899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3449583053588867}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3449583053588867}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce-tw.2016.7520896","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw.2016.7520896","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1999637406","https://openalex.org/W2007751412","https://openalex.org/W2055722319","https://openalex.org/W6650403822"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Binary":[0],"extension":[1],"field":[2,31],"F":[3,34,48,74,90],"<sub":[4,35,38,41,49,55,61,75,91,97],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[5,8,36,39,42,45,50,53,56,59,62,65,76,79,92,95,98,101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[6,77],"<sup":[7,44,52,58,64,78,94,100],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">8</sup>":[9,80],"is":[10],"recently":[11],"used":[12],"for":[13],"AES":[14],"encryption":[15],"and":[16],"IoT":[17],"(Internet":[18],"of":[19,72],"Things)":[20],"security":[21],"with":[22],"PUF":[23],"(Physical":[24],"Unclonable":[25],"Function).":[26],"The":[27],"calculations":[28,88],"over":[29,73,89],"tower":[30],"such":[32],"as":[33],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">(2</sub>":[37,93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">4</sub>":[40],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">)</sub>":[43,57,63,99],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[46,54,60,66,102],"or":[47],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">((2</sub>":[51],"become":[67],"more":[68],"efficient":[69,87],"than":[70],"that":[71],".":[81,103],"This":[82],"paper":[83],"focuses":[84],"on":[85],"the":[86],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">4</sup>":[96]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
