{"id":"https://openalex.org/W1969149791","doi":"https://doi.org/10.1145/1555284.1555300","title":"Fastest parallel molecular algorithms for the elliptic curve discrete logarithm problem over GF(2n)","display_name":"Fastest parallel molecular algorithms for the elliptic curve discrete logarithm problem over GF(2n)","publication_year":2009,"publication_date":"2009-06-19","ids":{"openalex":"https://openalex.org/W1969149791","doi":"https://doi.org/10.1145/1555284.1555300","mag":"1969149791"},"language":"en","primary_location":{"id":"doi:10.1145/1555284.1555300","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1555284.1555300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075354411","display_name":"Gennaro Iaccarino","orcid":"https://orcid.org/0000-0002-7776-7379"},"institutions":[{"id":"https://openalex.org/I2802934434","display_name":"The Microsoft Research - University of Trento Centre for Computational and Systems Biology","ror":"https://ror.org/04kcgyj43","country_code":"IT","type":"nonprofit","lineage":["https://openalex.org/I1290206253","https://openalex.org/I193223587","https://openalex.org/I2802934434","https://openalex.org/I4210164937"]},{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Gennaro Iaccarino","raw_affiliation_strings":["The Microsoft Research - University of Trento - Centre for Computational and Systems Biology, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"The Microsoft Research - University of Trento - Centre for Computational and Systems Biology, Trento, Italy","institution_ids":["https://openalex.org/I2802934434","https://openalex.org/I193223587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076382228","display_name":"Tommaso Mazza","orcid":"https://orcid.org/0000-0003-0434-8533"},"institutions":[{"id":"https://openalex.org/I193223587","display_name":"University of Trento","ror":"https://ror.org/05trd4x28","country_code":"IT","type":"education","lineage":["https://openalex.org/I193223587"]},{"id":"https://openalex.org/I2802934434","display_name":"The Microsoft Research - University of Trento Centre for Computational and Systems Biology","ror":"https://ror.org/04kcgyj43","country_code":"IT","type":"nonprofit","lineage":["https://openalex.org/I1290206253","https://openalex.org/I193223587","https://openalex.org/I2802934434","https://openalex.org/I4210164937"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Tommaso Mazza","raw_affiliation_strings":["The Microsoft Research - University of Trento - Centre for Computational and Systems Biology, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"The Microsoft Research - University of Trento - Centre for Computational and Systems Biology, Trento, Italy","institution_ids":["https://openalex.org/I2802934434","https://openalex.org/I193223587"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075354411"],"corresponding_institution_ids":["https://openalex.org/I193223587","https://openalex.org/I2802934434"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.06830106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"95","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7828265428543091},{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.7148576378822327},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5647507309913635},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5573900938034058},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5335289239883423},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5149350762367249},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5112254619598389},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.5108494162559509},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.4963245987892151},{"id":"https://openalex.org/keywords/counting-points-on-elliptic-curves","display_name":"Counting points on elliptic curves","score":0.49549901485443115},{"id":"https://openalex.org/keywords/subset-sum-problem","display_name":"Subset sum problem","score":0.49315327405929565},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.4870367646217346},{"id":"https://openalex.org/keywords/hessian-form-of-an-elliptic-curve","display_name":"Hessian form of an elliptic curve","score":0.43596720695495605},{"id":"https://openalex.org/keywords/hyperelliptic-curve-cryptography","display_name":"Hyperelliptic curve cryptography","score":0.43577560782432556},{"id":"https://openalex.org/keywords/multiplier","display_name":"Multiplier (economics)","score":0.4280547797679901},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.4261585772037506},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4210661053657532},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.37148040533065796},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17954429984092712},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.09893542528152466}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7828265428543091},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.7148576378822327},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5647507309913635},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5573900938034058},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5335289239883423},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5149350762367249},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5112254619598389},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5108494162559509},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.4963245987892151},{"id":"https://openalex.org/C68782407","wikidata":"https://www.wikidata.org/wiki/Q5177153","display_name":"Counting points on elliptic curves","level":5,"score":0.49549901485443115},{"id":"https://openalex.org/C109275537","wikidata":"https://www.wikidata.org/wiki/Q1154420","display_name":"Subset sum problem","level":3,"score":0.49315327405929565},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.4870367646217346},{"id":"https://openalex.org/C104993295","wikidata":"https://www.wikidata.org/wiki/Q17023345","display_name":"Hessian form of an elliptic curve","level":5,"score":0.43596720695495605},{"id":"https://openalex.org/C166780011","wikidata":"https://www.wikidata.org/wiki/Q3005926","display_name":"Hyperelliptic curve cryptography","level":5,"score":0.43577560782432556},{"id":"https://openalex.org/C124584101","wikidata":"https://www.wikidata.org/wiki/Q1053266","display_name":"Multiplier (economics)","level":2,"score":0.4280547797679901},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.4261585772037506},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4210661053657532},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.37148040533065796},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17954429984092712},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.09893542528152466},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C113138325","wikidata":"https://www.wikidata.org/wiki/Q864457","display_name":"Knapsack problem","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1555284.1555300","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1555284.1555300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320337392","display_name":"Division of Electrical, Communications and Cyber Systems","ror":"https://ror.org/01krpsy48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W205176504","https://openalex.org/W1491459594","https://openalex.org/W1503140737","https://openalex.org/W1522228241","https://openalex.org/W1536145320","https://openalex.org/W1538333734","https://openalex.org/W1583449596","https://openalex.org/W1589201628","https://openalex.org/W1605030470","https://openalex.org/W1977312644","https://openalex.org/W1985581245","https://openalex.org/W2016241422","https://openalex.org/W2034142421","https://openalex.org/W2036378739","https://openalex.org/W2122420606","https://openalex.org/W2122465391","https://openalex.org/W2126466006","https://openalex.org/W2129553292","https://openalex.org/W2155372306","https://openalex.org/W2183747241","https://openalex.org/W2807018778","https://openalex.org/W4210871175","https://openalex.org/W4236843783","https://openalex.org/W6636133598"],"related_works":["https://openalex.org/W2188057592","https://openalex.org/W3153552368","https://openalex.org/W2178481614","https://openalex.org/W2115373027","https://openalex.org/W1576069665","https://openalex.org/W2395639392","https://openalex.org/W2546557231","https://openalex.org/W4294164022","https://openalex.org/W1999800851","https://openalex.org/W1565266559"],"abstract_inverted_index":{"Cryptography":[0],"based":[1,99],"on":[2,100],"Elliptic":[3,50],"Curves":[4],"(ECC)":[5],"has":[6],"emerged":[7],"as":[8,67,74,148],"an":[9],"effective":[10],"alternative":[11],"to":[12,25,34,92],"the":[13,26,57,121,154,161],"existing":[14],"public-key":[15],"cryptosystems":[16],"(RSA":[17],"and":[18,37,77,108,115,137,157],"DSA).":[19],"Its":[20],"success":[21],"was":[22,65,98],"due":[23],"both":[24],"fact":[27],"that":[28,38],"no":[29],"fast":[30],"algorithms":[31],"were":[32],"known":[33],"break":[35],"it":[36,94],"exceptional":[39],"security":[40],"levels":[41],"could":[42],"be":[43],"obtained":[44],"by":[45],"using":[46],"short":[47],"keys.":[48],"The":[49],"Curve":[51],"Discrete":[52],"Logarithm":[53],"(ECDL)":[54],"problem":[55,71,156],"is":[56,120],"cornerstone":[58],"of":[59,61,153,164],"much":[60],"present-day":[62],"ECCs.":[63],"It":[64,97],"classifed":[66],"a":[68,75,81,88,105,109,149],"computationally":[69],"intractable":[70],"and,":[72],"consequently,":[73],"reliable":[76],"unbreakable":[78],"cryptosystem.":[79],"In":[80,124],"recent":[82],"work,":[83],"Li":[84],"et":[85],"al.":[86],"built":[87],"molecular":[89],"computer":[90],"designed":[91],"solve":[93],"over":[95],"GF(2n).":[96],"two":[101,130],"DNA-inspired":[102],"al":[103],"gorithms:":[104],"parallel":[106,110,151],"adder":[107],"multiplier,":[111],"working":[112,134],"in":[113,135],"O(n)":[114],"O(n2)":[116],"respectively,":[117],"where":[118],"n":[119],"input":[122],"size.":[123],"this":[125],"paper,":[126],"we":[127,144,159],"first":[128],"present":[129],"faster":[131],"biological":[132],"implementations,":[133],"O(log(n))":[136],"O(n":[138],"\u2022":[139],"log(n))respectively":[140],"(worst":[141],"case).":[142],"Then,":[143],"propose":[145],"our":[146],"model":[147],"reference":[150],"solution":[152],"ECDL":[155],"finally":[158],"highlight":[160],"computational":[162],"power":[163],"such":[165],"natureinspired":[166],"paradigm.":[167]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
