{"id":"https://openalex.org/W2054466230","doi":"https://doi.org/10.1109/recosoc.2013.6581530","title":"On a FPGA-based method for authentication using Edwards curves","display_name":"On a FPGA-based method for authentication using Edwards curves","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2054466230","doi":"https://doi.org/10.1109/recosoc.2013.6581530","mag":"2054466230"},"language":"en","primary_location":{"id":"doi:10.1109/recosoc.2013.6581530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/recosoc.2013.6581530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041174421","display_name":"Andre Himmighofen","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Andre Himmighofen","raw_affiliation_strings":["Easycore GmbH, Erlangen, Germany","easycore GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"Easycore GmbH, Erlangen, Germany","institution_ids":[]},{"raw_affiliation_string":"easycore GmbH, Erlangen, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013163675","display_name":"Bernhard Jungk","orcid":null},"institutions":[{"id":"https://openalex.org/I891521709","display_name":"Daimler (Germany)","ror":"https://ror.org/00m0j3d84","country_code":"DE","type":"company","lineage":["https://openalex.org/I891521709"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bernhard Jungk","raw_affiliation_strings":["easycore GmbH, Daimlerstr. 11, 91058 Erlangen, Germany","easycore GmbH, Erlangen, Germany"],"affiliations":[{"raw_affiliation_string":"easycore GmbH, Daimlerstr. 11, 91058 Erlangen, Germany","institution_ids":["https://openalex.org/I891521709"]},{"raw_affiliation_string":"easycore GmbH, Erlangen, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023193609","display_name":"Steffen Reith","orcid":null},"institutions":[{"id":"https://openalex.org/I4829542","display_name":"RheinMain University of Applied Sciences","ror":"https://ror.org/0378gm372","country_code":"DE","type":"education","lineage":["https://openalex.org/I4829542"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Steffen Reith","raw_affiliation_strings":["Hochschule RheinMain, Theoretische Informatik, Wiesbaden, Germany","Theor. Inf., Hochschule RheinMain, Wiesbaden, Germany"],"affiliations":[{"raw_affiliation_string":"Hochschule RheinMain, Theoretische Informatik, Wiesbaden, Germany","institution_ids":["https://openalex.org/I4829542"]},{"raw_affiliation_string":"Theor. Inf., Hochschule RheinMain, Wiesbaden, Germany","institution_ids":["https://openalex.org/I4829542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041174421"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.81722166,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82675361,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5350","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7771173715591431},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6380482912063599},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6308905482292175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6088382601737976},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.49915599822998047},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4984891414642334},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47985953092575073},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.46911126375198364},{"id":"https://openalex.org/keywords/shared-secret","display_name":"Shared secret","score":0.4536038637161255},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.44066786766052246},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4313907325267792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36429640650749207},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.21378901600837708},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17626997828483582},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11196944117546082},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.07940888404846191}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7771173715591431},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6380482912063599},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6308905482292175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6088382601737976},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.49915599822998047},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4984891414642334},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47985953092575073},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.46911126375198364},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.4536038637161255},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.44066786766052246},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4313907325267792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36429640650749207},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.21378901600837708},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17626997828483582},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11196944117546082},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.07940888404846191},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/recosoc.2013.6581530","is_oa":false,"landing_page_url":"https://doi.org/10.1109/recosoc.2013.6581530","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W127770406","https://openalex.org/W1486898453","https://openalex.org/W1539740938","https://openalex.org/W1589034595","https://openalex.org/W1646354800","https://openalex.org/W1745054520","https://openalex.org/W1880212920","https://openalex.org/W1882430379","https://openalex.org/W1968556724","https://openalex.org/W1971605365","https://openalex.org/W1972442530","https://openalex.org/W1991915713","https://openalex.org/W1994429123","https://openalex.org/W2134258244","https://openalex.org/W2141469508","https://openalex.org/W2148862943","https://openalex.org/W2152005134","https://openalex.org/W2154290215","https://openalex.org/W2154909745","https://openalex.org/W2167712295","https://openalex.org/W2168266147","https://openalex.org/W2169383187","https://openalex.org/W2224364690","https://openalex.org/W2395555281","https://openalex.org/W4241313849","https://openalex.org/W4289127653","https://openalex.org/W6629001131","https://openalex.org/W6682220442","https://openalex.org/W6711840857"],"related_works":["https://openalex.org/W2899793048","https://openalex.org/W2950202488","https://openalex.org/W1594411369","https://openalex.org/W4385887367","https://openalex.org/W2027534055","https://openalex.org/W2604424424","https://openalex.org/W2102905434","https://openalex.org/W2176772889","https://openalex.org/W1687167769","https://openalex.org/W2351645295"],"abstract_inverted_index":{"Modern":[0],"cryptographic":[1,117],"authentication":[2,49],"protocols":[3,50,113],"have":[4,51],"a":[5,19,40,44,54,60,64,133,142,146],"wide":[6],"range":[7],"of":[8,18,76,95,135,158],"real":[9],"world":[10],"applications":[11],"to":[12,31,34,114],"gain":[13,32],"assurance":[14],"about":[15,66],"the":[16,59,81,84,88,93,96,115,122,156],"identity":[17,68],"potential":[20],"communication":[21],"partner.":[22],"For":[23],"example":[24],"they":[25],"are":[26],"used":[27,47,116],"as":[28],"wireless":[29],"keys":[30],"access":[33],"an":[35],"otherwise":[36],"restricted":[37],"place,":[38],"e.g.":[39],"closed":[41],"door":[42],"or":[43],"car.":[45],"Widely":[46],"challenge-response":[48],"very":[52],"often":[53],"shared":[55,89],"secret,":[56,90],"such":[57],"that":[58,80],"prover":[61,82],"can":[62,102],"convince":[63],"verifier":[65,85],"his":[67],"by":[69,105],"using":[70,106],"this":[71,77,139,154,159],"secret.":[72],"The":[73],"major":[74],"drawback":[75],"scheme":[78],"is,":[79],"and":[83,91,109,128,145,152],"both":[86],"know":[87],"thus":[92],"distribution":[94],"secret":[97],"is":[98,150,164],"problematic.":[99],"This":[100,119],"problem":[101],"be":[103],"solved":[104],"asymmetric":[107],"cryptography":[108],"adapting":[110],"suitable":[111],"existing":[112],"primitive.":[118],"paper":[120],"evaluates":[121],"Schnorr":[123],"protocol":[124],"for":[125,138,161],"FPGA":[126],"implementations":[127,163],"adopts":[129],"twisted":[130],"Edwards":[131],"curves,":[132,137],"variant":[134],"elliptic":[136],"study.":[140],"Both":[141],"theoretical":[143],"introduction":[144],"thorough":[147],"practical":[148],"part":[149],"provided":[151],"in":[153],"way":[155],"suitability":[157],"combination":[160],"hardware":[162],"shown.":[165]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
