{"id":"https://openalex.org/W2890042408","doi":"https://doi.org/10.3390/cryptography2030023","title":"A Secure Algorithm for Inversion Modulo 2k","display_name":"A Secure Algorithm for Inversion Modulo 2k","publication_year":2018,"publication_date":"2018-09-13","ids":{"openalex":"https://openalex.org/W2890042408","doi":"https://doi.org/10.3390/cryptography2030023","mag":"2890042408"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030023","pdf_url":"https://www.mdpi.com/2410-387X/2/3/23/pdf?version=1536830436","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/3/23/pdf?version=1536830436","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087523477","display_name":"S. de la Fe","orcid":"https://orcid.org/0000-0003-2346-2163"},"institutions":[{"id":"https://openalex.org/I123044942","display_name":"Universitat Aut\u00f2noma de Barcelona","ror":"https://ror.org/052g8jq94","country_code":"ES","type":"education","lineage":["https://openalex.org/I123044942"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Sadiel De la Fe","raw_affiliation_strings":["Applus Laboratories, Bellaterra, 08193 Barcelona, Spain","Department of Microelectronics and Electronic Systems, Universitat Aut\u00f2noma de Barcelona, 08193 Barcelona, Spain"],"raw_orcid":"https://orcid.org/0000-0003-2346-2163","affiliations":[{"raw_affiliation_string":"Applus Laboratories, Bellaterra, 08193 Barcelona, Spain","institution_ids":[]},{"raw_affiliation_string":"Department of Microelectronics and Electronic Systems, Universitat Aut\u00f2noma de Barcelona, 08193 Barcelona, Spain","institution_ids":["https://openalex.org/I123044942"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081722696","display_name":"Carles Ferrer","orcid":"https://orcid.org/0000-0002-1475-8790"},"institutions":[{"id":"https://openalex.org/I123044942","display_name":"Universitat Aut\u00f2noma de Barcelona","ror":"https://ror.org/052g8jq94","country_code":"ES","type":"education","lineage":["https://openalex.org/I123044942"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Carles Ferrer","raw_affiliation_strings":["Department of Microelectronics and Electronic Systems, Universitat Aut\u00f2noma de Barcelona, 08193 Barcelona, Spain"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Microelectronics and Electronic Systems, Universitat Aut\u00f2noma de Barcelona, 08193 Barcelona, Spain","institution_ids":["https://openalex.org/I123044942"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087523477"],"corresponding_institution_ids":["https://openalex.org/I123044942"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.4111,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72315422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2","issue":"3","first_page":"23","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.8853354454040527},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.6525437831878662},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.6054790019989014},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5839173793792725},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5583885908126831},{"id":"https://openalex.org/keywords/modulo-operation","display_name":"Modulo operation","score":0.5138452649116516},{"id":"https://openalex.org/keywords/moduli","display_name":"Moduli","score":0.506583571434021},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.47591739892959595},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.46826794743537903},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.4252264201641083},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42408400774002075},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.414675235748291},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41034039855003357},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3687583804130554},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32860392332077026},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31695556640625},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.2644607424736023},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17706996202468872},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11152854561805725},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.09970614314079285},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07508903741836548},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.06720659136772156}],"concepts":[{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.8853354454040527},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.6525437831878662},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.6054790019989014},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5839173793792725},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5583885908126831},{"id":"https://openalex.org/C183448482","wikidata":"https://www.wikidata.org/wiki/Q1799665","display_name":"Modulo operation","level":2,"score":0.5138452649116516},{"id":"https://openalex.org/C121089165","wikidata":"https://www.wikidata.org/wiki/Q6889796","display_name":"Moduli","level":2,"score":0.506583571434021},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.47591739892959595},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.46826794743537903},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.4252264201641083},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42408400774002075},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.414675235748291},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41034039855003357},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3687583804130554},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32860392332077026},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31695556640625},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2644607424736023},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17706996202468872},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11152854561805725},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.09970614314079285},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07508903741836548},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.06720659136772156},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/cryptography2030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030023","pdf_url":"https://www.mdpi.com/2410-387X/2/3/23/pdf?version=1536830436","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:ddd.uab.cat:216906","is_oa":true,"landing_page_url":"https://ddd.uab.cat/record/216906","pdf_url":"https://ddd.uab.cat/record/216906","source":{"id":"https://openalex.org/S4306400380","display_name":"Dip\u00f2sit Digital de Documents de la UAB (Universitat Aut\u00f2noma de Barcelona)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I123044942","host_organization_name":"Universitat Aut\u00f2noma de Barcelona","host_organization_lineage":["https://openalex.org/I123044942"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"pmh:oai:dnet:uabarcelona_::979322200cfbc8ec62a0fd7a8e52702f","is_oa":true,"landing_page_url":"http://ddd.uab.cat/record/216906","pdf_url":null,"source":{"id":"https://openalex.org/S4306402641","display_name":"LA Referencia (Red Federada de Repositorios Institucionales de Publicaciones Cient\u00edficas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4383465926","host_organization_name":"LA Referencia","host_organization_lineage":["https://openalex.org/I4383465926"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:doaj.org/article:8eb89867ec604a85be0e76f8067a4a5c","is_oa":true,"landing_page_url":"https://doaj.org/article/8eb89867ec604a85be0e76f8067a4a5c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 3, p 23 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/3/23/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2030023","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030023","pdf_url":"https://www.mdpi.com/2410-387X/2/3/23/pdf?version=1536830436","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2890042408.pdf","grobid_xml":"https://content.openalex.org/works/W2890042408.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1971605365","https://openalex.org/W2004814164","https://openalex.org/W2029092135","https://openalex.org/W2056778557","https://openalex.org/W2123923527","https://openalex.org/W2133708535","https://openalex.org/W2154909745","https://openalex.org/W2186784347","https://openalex.org/W2462151092","https://openalex.org/W2483894624","https://openalex.org/W4232836212","https://openalex.org/W6959140152"],"related_works":["https://openalex.org/W126207292","https://openalex.org/W2070252991","https://openalex.org/W4310294424","https://openalex.org/W2096889687","https://openalex.org/W1506998470","https://openalex.org/W2125596308","https://openalex.org/W4381743479","https://openalex.org/W2530574867","https://openalex.org/W143006135","https://openalex.org/W1981011893"],"abstract_inverted_index":{"Modular":[0],"inversions":[1,28,142],"are":[2,83],"widely":[3],"employed":[4],"in":[5,46],"public":[6],"key":[7],"crypto-systems,":[8],"and":[9,87,97],"it":[10,115],"is":[11,65,71,146,162],"known":[12,153],"that":[13,69,114,124],"they":[14],"imply":[15],"a":[16,24,41,57,72,106,125,138],"bottleneck":[17],"due":[18],"to":[19,95,119,130],"the":[20,38,47,62,75,81,90,110,132,149,159,166],"expensive":[21],"computation.":[22],"Recently,":[23],"new":[25],"algorithm":[26,52],"for":[27,141],"modulo":[29,143],"p":[30,86,96],"k":[31,145],"was":[32],"proposed,":[33,147],"which":[34],"may":[35,60],"speed":[36],"up":[37],"calculation":[39],"of":[40,109,151,157],"modulus":[42],"dependent":[43,92],"quantity":[44],"used":[45,118],"Montgomery":[48,79],"multiplication.":[49],"The":[50],"original":[51,167],"lacks":[53],"security":[54,107],"countermeasures;":[55],"thus,":[56],"straightforward":[58],"implementation":[59],"expose":[61],"input.":[63],"This":[64,103],"an":[66],"issue":[67],"if":[68],"input":[70],"secret.":[73],"In":[74,136,155],"RSA-CRT":[76],"signature":[77],"using":[78],"multiplication,":[80],"moduli":[82,91],"secrets":[84],"(primes":[85],"q).":[88],"Therefore,":[89],"quantities":[93],"related":[94],"q":[98],"must":[99],"be":[100,117],"securely":[101],"computed.":[102],"paper":[104],"presents":[105],"analysis":[108],"novel":[111],"method":[112],"considering":[113],"might":[116],"compute":[120],"secrets.":[121],"We":[122],"demonstrate":[123],"Side":[126],"Channel":[127],"Analysis":[128],"leads":[129],"disclose":[131],"data":[133],"being":[134],"manipulated.":[135],"consequence,":[137],"secure":[139,160],"variant":[140,161],"2":[144],"through":[148],"application":[150],"two":[152],"countermeasures.":[154],"terms":[156],"performance,":[158],"still":[163],"comparable":[164],"with":[165],"one.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
