{"id":"https://openalex.org/W3044711266","doi":"https://doi.org/10.1145/3427228.3427291","title":"Set It and Forget It! Turnkey ECC for Instant Integration","display_name":"Set It and Forget It! Turnkey ECC for Instant Integration","publication_year":2020,"publication_date":"2020-12-07","ids":{"openalex":"https://openalex.org/W3044711266","doi":"https://doi.org/10.1145/3427228.3427291","mag":"3044711266"},"language":"en","primary_location":{"id":"doi:10.1145/3427228.3427291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427291","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2007.11481","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Dmitry Belyavsky","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dmitry Belyavsky","raw_affiliation_strings":["Cryptocom Ltd., Russian Federation"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptocom Ltd., Russian Federation","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Billy Bob Brumley","orcid":null},"institutions":[{"id":"https://openalex.org/I166825849","display_name":"Tampere University","ror":"https://ror.org/033003e23","country_code":"FI","type":"education","lineage":["https://openalex.org/I166825849"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Billy Bob Brumley","raw_affiliation_strings":["Tampere University, Finland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tampere University, Finland","institution_ids":["https://openalex.org/I166825849"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jes\u00fas-Javier Chi-Dom\u00ednguez","orcid":null},"institutions":[{"id":"https://openalex.org/I166825849","display_name":"Tampere University","ror":"https://ror.org/033003e23","country_code":"FI","type":"education","lineage":["https://openalex.org/I166825849"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jes\u00fas-Javier Chi-Dom\u00ednguez","raw_affiliation_strings":["Tampere University, Finland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tampere University, Finland","institution_ids":["https://openalex.org/I166825849"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Luis Rivera-Zamarripa","orcid":null},"institutions":[{"id":"https://openalex.org/I166825849","display_name":"Tampere University","ror":"https://ror.org/033003e23","country_code":"FI","type":"education","lineage":["https://openalex.org/I166825849"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Luis Rivera-Zamarripa","raw_affiliation_strings":["Tampere University, Finland"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tampere University, Finland","institution_ids":["https://openalex.org/I166825849"]}]},{"author_position":"last","author":{"id":null,"display_name":"Igor Ustinov","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Igor Ustinov","raw_affiliation_strings":["Cryptocom Ltd., Russian Federation"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptocom Ltd., Russian Federation","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.321,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82849204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"760","last_page":"771"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.7713000178337097,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.7713000178337097,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.05979999899864197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.04690000042319298,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6403999924659729},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6101999878883362},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5530999898910522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5169000029563904},{"id":"https://openalex.org/keywords/turnkey","display_name":"Turnkey","score":0.5163999795913696},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.49720001220703125},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.47360000014305115},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.46860000491142273},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37599998712539673}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7300999760627747},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6403999924659729},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6101999878883362},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5530999898910522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5169000029563904},{"id":"https://openalex.org/C2777843530","wikidata":"https://www.wikidata.org/wiki/Q1151244","display_name":"Turnkey","level":2,"score":0.5163999795913696},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.49720001220703125},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.47360000014305115},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.46860000491142273},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37599998712539673},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.359499990940094},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3546999990940094},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.3440999984741211},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.34040001034736633},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3402999937534332},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3319999873638153},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32919999957084656},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.3203999996185303},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.31310001015663147},{"id":"https://openalex.org/C2780233296","wikidata":"https://www.wikidata.org/wiki/Q3756229","display_name":"GOST (hash function)","level":2,"score":0.31200000643730164},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2955000102519989},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2581000030040741},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.2565000057220459}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3427228.3427291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3427228.3427291","pdf_url":null,"source":{"id":"https://openalex.org/S4306417673","display_name":"Annual Computer Security Applications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2007.11481","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2007.11481","pdf_url":"https://arxiv.org/pdf/2007.11481","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:trepo.tuni.fi:10024/217035","is_oa":true,"landing_page_url":"https://arxiv.org/abs/2007.11481","pdf_url":"https://arxiv.org/pdf/2007.11481","source":{"id":"https://openalex.org/S7407055260","display_name":"Trepo - Institutional Repository of Tampere University","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference"},{"id":"doi:10.5281/zenodo.4008898","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.4008898","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"doi:10.5281/zenodo.4008899","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.4008899","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2007.11481","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2007.11481","pdf_url":"https://arxiv.org/pdf/2007.11481","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1565021983","display_name":null,"funder_award_id":"804476","funder_id":"https://openalex.org/F4320338352","funder_display_name":"FP7 Ideas: European Research Council"},{"id":"https://openalex.org/G3957910971","display_name":"Side-Channel Aware Engineering","funder_award_id":"804476","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G7842005466","display_name":null,"funder_award_id":"Horizon 2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320338352","display_name":"FP7 Ideas: European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W50107694","https://openalex.org/W1554359822","https://openalex.org/W1592482282","https://openalex.org/W2013613544","https://openalex.org/W2019120991","https://openalex.org/W2156186849","https://openalex.org/W2183171747","https://openalex.org/W2238723624","https://openalex.org/W2286649377","https://openalex.org/W2304355911","https://openalex.org/W2322183081","https://openalex.org/W2400247270","https://openalex.org/W2493726860","https://openalex.org/W2767162229","https://openalex.org/W2889067863","https://openalex.org/W2912732588","https://openalex.org/W2915352631","https://openalex.org/W3044711266","https://openalex.org/W3048806776","https://openalex.org/W3096664316","https://openalex.org/W4206356322","https://openalex.org/W4245982996","https://openalex.org/W4301849883"],"related_works":[],"abstract_inverted_index":{"Historically,":[0],"Elliptic":[1],"Curve":[2],"Cryptography":[3],"(ECC)":[4],"is":[5,15],"an":[6],"active":[7],"field":[8],"of":[9,30,81,94,138],"applied":[10,164],"cryptography":[11,165],"where":[12,32],"recent":[13],"focus":[14],"on":[16,45,120],"high":[17],"speed,":[18],"constant":[19],"time,":[20],"and":[21,37,69,79,92,107,117,130,145,149,168],"formally":[22],"verified":[23],"implementations.":[24],"While":[25],"there":[26],"are":[27,43],"a":[28,46,50,71,150,154],"handful":[29],"outliers":[31],"all":[33,62],"these":[34,42],"concepts":[35],"join":[36],"land":[38],"in":[39,147,153],"real-world":[40,102],"deployments,":[41],"generally":[44],"case-by-case":[47],"basis:":[48],"e.g.":[49],"library":[51],"may":[52],"feature":[53],"such":[54],"X25519":[55],"or":[56],"P-256":[57],"code,":[58],"but":[59],"not":[60],"for":[61,124],"curves.":[63],"In":[64],"this":[65],"work,":[66],"we":[67,134],"propose":[68],"implement":[70],"methodology":[72,96,141],"that":[73],"fully":[74,171],"automates":[75],"the":[76,85,90,108,136,160,173],"implementation,":[77],"testing,":[78],"integration":[80],"ECC":[82],"stacks":[83],"with":[84],"above":[86],"properties.":[87],"We":[88],"demonstrate":[89],"flexibility":[91],"applicability":[93],"our":[95,139],"by":[97,142],"seamlessly":[98],"integrating":[99],"into":[100],"three":[101],"projects:":[103],"OpenSSL,":[104,148],"Mozilla\u2019s":[105],"NSS,":[106],"GOST":[109],"OpenSSL":[110],"Engine,":[111],"achieving":[112],"roughly":[113],"9.5x,":[114],"4.5x,":[115],"13.3x,":[116],"3.7x":[118],"speedup":[119],"any":[121],"given":[122],"curve":[123],"key":[125,127],"generation,":[126],"agreement,":[128],"signing,":[129],"verifying,":[131],"respectively.":[132],"Furthermore,":[133],"showcase":[135],"efficacy":[137],"testing":[140],"uncovering":[143],"flaws":[144],"vulnerabilities":[146],"specification-level":[151],"vulnerability":[152],"Russian":[155],"standard.":[156],"Our":[157],"work":[158],"bridges":[159],"gap":[161],"between":[162],"significant":[163],"research":[166],"results":[167],"deployed":[169],"software,":[170],"automating":[172],"process.":[174]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-02T08:42:23.175194","created_date":"2020-07-29T00:00:00"}
