{"id":"https://openalex.org/W4376480425","doi":"https://doi.org/10.1109/lcomm.2023.3275647","title":"Bit Security Estimation for Leakage-Prone Key Establishment Schemes","display_name":"Bit Security Estimation for Leakage-Prone Key Establishment Schemes","publication_year":2023,"publication_date":"2023-05-12","ids":{"openalex":"https://openalex.org/W4376480425","doi":"https://doi.org/10.1109/lcomm.2023.3275647"},"language":"en","primary_location":{"id":"doi:10.1109/lcomm.2023.3275647","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/lcomm.2023.3275647","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10124043.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10124043.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065691090","display_name":"Marcus de Ree","orcid":"https://orcid.org/0000-0002-7453-4019"},"institutions":[{"id":"https://openalex.org/I128993996","display_name":"University of South Wales","ror":"https://ror.org/02mzn7s88","country_code":"GB","type":"education","lineage":["https://openalex.org/I128993996"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB","PT"],"is_corresponding":true,"raw_author_name":"Marcus de Ree","raw_affiliation_strings":["Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","institution_ids":["https://openalex.org/I128993996"]},{"raw_affiliation_string":"Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K","institution_ids":["https://openalex.org/I55060895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041504979","display_name":"\u0393\u03b5\u03ce\u03c1\u03b3\u03b9\u03bf\u03c2 \u039c\u03b1\u03bd\u03c4\u03ac\u03c2","orcid":"https://orcid.org/0000-0002-8074-0417"},"institutions":[{"id":"https://openalex.org/I128993996","display_name":"University of South Wales","ror":"https://ror.org/02mzn7s88","country_code":"GB","type":"education","lineage":["https://openalex.org/I128993996"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB","PT"],"is_corresponding":false,"raw_author_name":"Georgios Mantas","raw_affiliation_strings":["Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","institution_ids":["https://openalex.org/I128993996"]},{"raw_affiliation_string":"Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K","institution_ids":["https://openalex.org/I55060895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065466622","display_name":"Jonathan Rodr\u0131\u0301guez","orcid":"https://orcid.org/0000-0001-9829-0955"},"institutions":[{"id":"https://openalex.org/I128993996","display_name":"University of South Wales","ror":"https://ror.org/02mzn7s88","country_code":"GB","type":"education","lineage":["https://openalex.org/I128993996"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I55060895","display_name":"University of Greenwich","ror":"https://ror.org/00bmj0a71","country_code":"GB","type":"education","lineage":["https://openalex.org/I55060895"]}],"countries":["GB","PT"],"is_corresponding":false,"raw_author_name":"Jonathan Rodriguez","raw_affiliation_strings":["Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Aveiro, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"Faculty of Computing, Engineering and Science, University of South Wales, Pontypridd CF37 1DL, U.K","institution_ids":["https://openalex.org/I128993996"]},{"raw_affiliation_string":"Faculty of Engineering and Science, University of Greenwich, Chatham Maritime ME4 4TB, U.K","institution_ids":["https://openalex.org/I55060895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065691090"],"corresponding_institution_ids":["https://openalex.org/I128993996","https://openalex.org/I4210120471","https://openalex.org/I55060895"],"apc_list":null,"apc_paid":null,"fwci":0.4823,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63674761,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"27","issue":"7","first_page":"1694","last_page":"1698"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7502975463867188},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.7302209138870239},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5332944393157959},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5070648193359375},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.4878125488758087},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.47979408502578735},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.469299852848053},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.46343857049942017},{"id":"https://openalex.org/keywords/bit-error-rate","display_name":"Bit error rate","score":0.4104389548301697},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4039599299430847},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38807255029678345},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.33310946822166443},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.1361476480960846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7502975463867188},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.7302209138870239},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5332944393157959},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5070648193359375},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.4878125488758087},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.47979408502578735},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.469299852848053},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.46343857049942017},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.4104389548301697},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4039599299430847},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38807255029678345},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.33310946822166443},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.1361476480960846},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lcomm.2023.3275647","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/lcomm.2023.3275647","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10124043.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},{"id":"pmh:oai:gala.gre.ac.uk:42732","is_oa":true,"landing_page_url":null,"pdf_url":"http://gala.gre.ac.uk/id/eprint/42732/7/42732%20MANTAS_Bit_Security_Estimation_For_Leakage-Prone_Key_Establishment_Schemes_%28AAM%29_2023.pdf","source":{"id":"https://openalex.org/S4306401244","display_name":"Greenwich Academic Literature Archive (University of Greenwich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I55060895","host_organization_name":"University of Greenwich","host_organization_lineage":["https://openalex.org/I55060895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":{"id":"doi:10.1109/lcomm.2023.3275647","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/lcomm.2023.3275647","pdf_url":"https://ieeexplore.ieee.org/ielx7/4234/5534602/10124043.pdf","source":{"id":"https://openalex.org/S147316732","display_name":"IEEE Communications Letters","issn_l":"1089-7798","issn":["1089-7798","1558-2558","2373-7891"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Letters","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7599999904632568}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4376480425.pdf","grobid_xml":"https://content.openalex.org/works/W4376480425.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W142045744","https://openalex.org/W949353694","https://openalex.org/W1482852000","https://openalex.org/W1483547755","https://openalex.org/W1864236529","https://openalex.org/W1870509456","https://openalex.org/W2003723516","https://openalex.org/W2043769961","https://openalex.org/W2054496355","https://openalex.org/W2091729149","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2115650836","https://openalex.org/W2123097583","https://openalex.org/W2142795465","https://openalex.org/W2205960012","https://openalex.org/W2284320790","https://openalex.org/W2942518062","https://openalex.org/W2945217752","https://openalex.org/W2963204963","https://openalex.org/W3007256892","https://openalex.org/W3020735853","https://openalex.org/W3099515973","https://openalex.org/W4315629554","https://openalex.org/W6628729985"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W189451467","https://openalex.org/W3123987581","https://openalex.org/W2358406440","https://openalex.org/W2352435628","https://openalex.org/W3096760981","https://openalex.org/W151758239","https://openalex.org/W3175365978","https://openalex.org/W3011894940","https://openalex.org/W2748715212"],"abstract_inverted_index":{"The":[0],"security":[1,126],"guarantees":[2],"of":[3,58,93,107,111,124,127,140,150],"cryptographic":[4],"primitives":[5],"are":[6,14],"subject":[7],"to":[8,119,136,145],"the":[9,18,25,90,108,121,138],"assumption":[10,35],"that":[11,61,88],"established":[12,50],"keys":[13],"known":[15,29],"only":[16],"by":[17,30],"legitimate":[19],"users":[20],"and":[21,84,101],"no":[22],"information":[23,46,94],"about":[24,48],"key":[26,42,51,75],"bits":[27],"is":[28,62],"illegitimate":[31],"users.":[32],"Unfortunately,":[33],"this":[34,78],"may":[36],"not":[37],"be":[38],"applicable":[39],"in":[40,72,105],"leakage-prone":[41,129],"establishment":[43],"schemes.":[44],"Namely,":[45],"leakage":[47,95],"an":[49,59,73],"(defined":[52],"as":[53],"a":[54,82,85,97,128,141,147],"bit":[55,99,112,125,130,142,151],"inference":[56],"rate":[57],"adversary":[60],"strictly":[63],"greater":[64],"than":[65],"50%)":[66],"reduces":[67],"its":[68],"computational":[69],"effort":[70],"required":[71],"exhaustive":[74],"search.":[76],"In":[77],"letter,":[79],"we":[80],"present":[81],"methodology":[83],"polynomial-time":[86],"algorithm":[87],"determines":[89],"exact":[91],"impact":[92],"on":[96],"generated":[98],"sequence":[100,131,143],"expressed":[102],"these":[103],"findings":[104],"terms":[106],"achieved":[109,122],"level":[110,123,149],"security.":[113,152],"Additional":[114],"simulation":[115],"results":[116],"enable":[117,134],"us":[118,135],"determine":[120,137],"or,":[132],"conversely,":[133],"length":[139],"necessary":[144],"achieve":[146],"selected":[148]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
