{"id":"https://openalex.org/W1988779308","doi":"https://doi.org/10.3390/e16095144","title":"Nonlinearities in Elliptic Curve Authentication","display_name":"Nonlinearities in Elliptic Curve Authentication","publication_year":2014,"publication_date":"2014-09-25","ids":{"openalex":"https://openalex.org/W1988779308","doi":"https://doi.org/10.3390/e16095144","mag":"1988779308"},"language":"en","primary_location":{"id":"doi:10.3390/e16095144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16095144","pdf_url":"https://www.mdpi.com/1099-4300/16/9/5144/pdf?version=1424785765","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1099-4300/16/9/5144/pdf?version=1424785765","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019829122","display_name":"Ramzi Alsaedi","orcid":null},"institutions":[{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ramzi Alsaedi","raw_affiliation_strings":["Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah Campus, P.O. Box 80203, Jeddah 21589, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah Campus, P.O. Box 80203, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018902199","display_name":"Nicolae Constantinescu","orcid":"https://orcid.org/0000-0001-5136-4849"},"institutions":[{"id":"https://openalex.org/I97553796","display_name":"University of Craiova","ror":"https://ror.org/03s251g81","country_code":"RO","type":"education","lineage":["https://openalex.org/I97553796"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Nicolae Constantinescu","raw_affiliation_strings":["Department of Informatics, University of Craiova, Street A.I Cuza 13, 200585 Craiova, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Craiova, Street A.I Cuza 13, 200585 Craiova, Romania","institution_ids":["https://openalex.org/I97553796"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105977470","display_name":"Vicen\u0163iu D. R\u0103dulescu","orcid":"https://orcid.org/0000-0003-4615-5537"},"institutions":[{"id":"https://openalex.org/I58077936","display_name":"Romanian Academy","ror":"https://ror.org/0561n6946","country_code":"RO","type":"archive","lineage":["https://openalex.org/I58077936"]},{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["RO","SA"],"is_corresponding":true,"raw_author_name":"Vicen\u0163iu R\u0101dulescu","raw_affiliation_strings":["Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah Campus, P.O. Box 80203, Jeddah 21589, Saudi Arabia","Institute of Mathematics \"Simion Stoilow\" of the Romanian Academy, P.O. Box 1-764, 014700 Bucharest, Romania"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah Campus, P.O. Box 80203, Jeddah 21589, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]},{"raw_affiliation_string":"Institute of Mathematics \"Simion Stoilow\" of the Romanian Academy, P.O. Box 1-764, 014700 Bucharest, Romania","institution_ids":["https://openalex.org/I58077936"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5105977470"],"corresponding_institution_ids":["https://openalex.org/I185163786","https://openalex.org/I58077936"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":2.3667,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.90389808,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"9","first_page":"5144","last_page":"5158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6052564382553101},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5456826686859131},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.5346692204475403},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5140146017074585},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.4932960867881775},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4650856852531433},{"id":"https://openalex.org/keywords/witness","display_name":"Witness","score":0.4612528085708618},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4514622986316681},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.4341658353805542},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42324429750442505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40845924615859985},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38361990451812744},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33463022112846375},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.23336493968963623},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19406989216804504},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11420324444770813},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.09456071257591248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6052564382553101},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5456826686859131},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5346692204475403},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5140146017074585},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.4932960867881775},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4650856852531433},{"id":"https://openalex.org/C2776900844","wikidata":"https://www.wikidata.org/wiki/Q8028383","display_name":"Witness","level":2,"score":0.4612528085708618},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4514622986316681},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.4341658353805542},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42324429750442505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40845924615859985},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38361990451812744},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33463022112846375},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.23336493968963623},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19406989216804504},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11420324444770813},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.09456071257591248},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/e16095144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16095144","pdf_url":"https://www.mdpi.com/1099-4300/16/9/5144/pdf?version=1424785765","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bdd7c25e4e8b458db5d52264cf619c68","is_oa":true,"landing_page_url":"https://doaj.org/article/bdd7c25e4e8b458db5d52264cf619c68","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 16, Iss 9, Pp 5144-5158 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/e16095144","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e16095144","pdf_url":"https://www.mdpi.com/1099-4300/16/9/5144/pdf?version=1424785765","source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1988779308.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W153171884","https://openalex.org/W239595814","https://openalex.org/W1482196702","https://openalex.org/W1496801598","https://openalex.org/W1500237345","https://openalex.org/W1508193711","https://openalex.org/W1592482282","https://openalex.org/W1595293097","https://openalex.org/W1660562555","https://openalex.org/W1979215153","https://openalex.org/W1989258293","https://openalex.org/W1992506132","https://openalex.org/W2004814164","https://openalex.org/W2008272678","https://openalex.org/W2022609500","https://openalex.org/W2026025311","https://openalex.org/W2028358228","https://openalex.org/W2036378739","https://openalex.org/W2046569422","https://openalex.org/W2075252632","https://openalex.org/W2088421867","https://openalex.org/W2091020476","https://openalex.org/W2133432179","https://openalex.org/W2157604883","https://openalex.org/W2283585904","https://openalex.org/W2490813647","https://openalex.org/W2499543211","https://openalex.org/W6635808058","https://openalex.org/W6695603773","https://openalex.org/W6823963155","https://openalex.org/W6989467372"],"related_works":["https://openalex.org/W2890518300","https://openalex.org/W2366687089","https://openalex.org/W2031177322","https://openalex.org/W4226476440","https://openalex.org/W1577956677","https://openalex.org/W2584223401","https://openalex.org/W2950233671","https://openalex.org/W2527434421","https://openalex.org/W2517682547","https://openalex.org/W2234636045"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,17,57,67,124,134,143,166,186,211,214,233,236],"construct":[3],"the":[4,45,50,55,59,64,69,75,88,158,167,174,193,196,226],"border":[5],"solutions":[6],"for":[7,24,195],"nonsupersingular":[8],"elliptic":[9,51,248],"curve":[10,52],"equations,":[11],"some":[12,32],"common":[13],"used":[14],"models":[15],"need":[16,120,139,232],"be":[18,104],"adapted":[19],"from":[20],"linear":[21],"treated":[22],"cases":[23],"use":[25],"in":[26,40,61,94,106,110,114,156],"particular":[27],"nonlinear":[28],"cases.":[29],"There":[30],"are":[31,112],"approaches":[33],"that":[34,118,206],"conclude":[35],"with":[36,63],"these":[37],"solutions.":[38],"Optimization":[39],"this":[41,126,145],"area":[42],"means":[43],"finding":[44],"majority":[46],"of":[47,78,85,92,201],"points":[48],"on":[49,136,245],"and":[53,247],"minimizing":[54],"time":[56,66],"compute":[58,68,74],"solution":[60,77],"contrast":[62],"necessary":[65],"inverse":[70],"solution.":[71],"We":[72,169,239],"can":[73],"positive":[76],"PDE":[79],"(partial":[80],"differential":[81],"equation)":[82],"like":[83,147],"oscillations":[84],"f(s)/s":[86],"around":[87],"principal":[89],"eigenvalue":[90],"\u03bb1":[91],"-\u0394":[93],"H":[95],"0":[96],"1":[97],"(\u03a9).Translating":[98],"mathematics":[99],"into":[100],"cryptographic":[101],"applications":[102],"will":[103],"relevant":[105],"everyday":[107],"life,":[108],"where":[109,173,229],"there":[111],"situations":[113],"which":[115],"two":[116,131],"parts":[117],"communicate":[119],"a":[121,148,164,171,187,203],"third":[122,151,188],"part":[123,152,189],"confirm":[125,144],"process.":[127,160,198],"For":[128],"example,":[129],"if":[130,207],"persons":[132],"want":[133],"agree":[135],"something":[137],"they":[138],"an":[140,241],"impartial":[141],"person":[142,218],"agreement,":[146],"notary.":[149],"This":[150],"does":[153],"not":[154,178],"influence":[155],"anyway":[157],"communication":[159],"It":[161],"is":[162,205],"just":[163],"witness":[165],"agreement.":[168],"present":[170],"system":[172,204],"communicating":[175],"parties":[176],"do":[177],"authenticate":[179,234],"one":[180,217,223],"another.":[181],"Each":[182],"party":[183],"authenticates":[184],"itself":[185],"who":[190],"also":[191],"sends":[192],"keys":[194],"encryption/decryption":[197],"Another":[199],"advantage":[200],"such":[202],"someone":[208],"(sender)":[209],"wants":[210],"transmit":[212],"messages":[213],"more":[215],"than":[216],"(receivers),":[219],"he":[220,230],"needs":[221],"only":[222],"authentication,":[224],"unlike":[225],"classic":[227],"systems":[228],"would":[231],"himself":[235],"each":[237],"receiver.":[238],"propose":[240],"authentication":[242],"method":[243],"based":[244],"zero-knowledge":[246],"curves.":[249]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-01-15T23:16:33.117629","created_date":"2025-10-10T00:00:00"}
