{"id":"https://openalex.org/W6929579480","doi":"https://doi.org/10.5075/epfl-thesis-10505","title":"Green Cryptography and Other Optimisations","display_name":"Green Cryptography and Other Optimisations","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W6929579480","doi":"https://doi.org/10.5075/epfl-thesis-10505"},"language":"en","primary_location":{"id":"pmh:oai:infoscience.epfl.ch:305444","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/201108","pdf_url":"https://infoscience.epfl.ch/bitstreams/1b5af519-b30f-409f-bd65-3c43cc18dde7/download","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://infoscience.epfl.ch/bitstreams/1b5af519-b30f-409f-bd65-3c43cc18dde7/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Caforio, Andrea Felice","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Caforio, Andrea Felice","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T11290","display_name":"Preterm Birth and Chorioamnionitis","score":0.19840000569820404,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11290","display_name":"Preterm Birth and Chorioamnionitis","score":0.19840000569820404,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11060","display_name":"Infant Development and Preterm Care","score":0.08659999817609787,"subfield":{"id":"https://openalex.org/subfields/2735","display_name":"Pediatrics, Perinatology and Child Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T13258","display_name":"Williams Syndrome Research","score":0.05290000140666962,"subfield":{"id":"https://openalex.org/subfields/2806","display_name":"Developmental Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7279000282287598},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.5691999793052673},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4982999861240387},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4212999939918518},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.41909998655319214},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.3849000036716461},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.3801000118255615},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.37220001220703125},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.36419999599456787}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7305999994277954},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7279000282287598},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.5691999793052673},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5393999814987183},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4982999861240387},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4212999939918518},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.41909998655319214},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.3849000036716461},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3801000118255615},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37689998745918274},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.37220001220703125},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.36419999599456787},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.35409998893737793},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.3521000146865845},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28519999980926514},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2651999890804291},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2581000030040741},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2567000091075897},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.2551000118255615}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:infoscience.epfl.ch:305444","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/201108","pdf_url":"https://infoscience.epfl.ch/bitstreams/1b5af519-b30f-409f-bd65-3c43cc18dde7/download","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},{"id":"doi:10.5075/epfl-thesis-10505","is_oa":true,"landing_page_url":"https://doi.org/10.5075/epfl-thesis-10505","pdf_url":null,"source":{"id":"https://openalex.org/S4306400488","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:305444","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/201108","pdf_url":"https://infoscience.epfl.ch/bitstreams/1b5af519-b30f-409f-bd65-3c43cc18dde7/download","source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doctoral thesis"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8130862712860107,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W6929579480.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,39,144,246],"spectral":[1],"decomposition":[2],"of":[3,13,48,51,77,82,129,135,154,163,182,211,228,231,240,258,270,332,336],"cryptography":[4],"into":[5],"its":[6],"life-giving":[7],"components":[8],"yields":[9],"an":[10,119,157,170,241,297,324],"interlaced":[11],"network":[12],"tangential":[14],"and":[15,54,65,105,201,309],"orthogonal":[16],"disciplines":[17,254],"that":[18,121,185,213,301],"are":[19,186],"nonetheless":[20],"invariably":[21],"grounded":[22],"by":[23,168,177],"the":[24,36,46,49,62,75,102,133,151,161,179,203,218,226,238,266,271,289,306,315,319],"same":[25],"denominator:":[26],"their":[27,66],"implementation":[28,269,331],"on":[29,110,150,327],"commodity":[30],"computing":[31],"platforms":[32],"where":[33],"efficiency":[34],"is":[35,147,302,321],"overarching":[37],"dogma.":[38],"term":[40],"efficiency,":[41],"however,":[42],"only":[43,58],"vaguely":[44],"captures":[45],"intricacies":[47],"field":[50],"cryptographic":[52,111,155],"optimisation":[53,127,164,325],"can":[55],"be":[56],"gauged":[57],"in":[59,74,85,118,160,251,288,305,314],"relation":[60],"to":[61,132,197,216],"underlying":[63],"architectures":[64],"corresponding":[67],"metrics.":[68],"In":[69,96],"software,":[70],"these":[71],"criteria":[72],"come":[73],"form":[76],"memory":[78],"or":[79,93],"instruction":[80],"cycles":[81],"minimisation.":[83],"Whereas":[84],"hardware":[86,112],"environments,":[87],"designers":[88],"commonly":[89],"target":[90],"circuit":[91],"area":[92],"latency":[94],"reductions.":[95],"this":[97,209,235],"thesis,":[98],"we":[99,264,295],"blissfully":[100],"ignore":[101],"software":[103],"realm":[104],"fully":[106],"concentrate":[107],"our":[108,194,278],"efforts":[109],"implementations,":[113],"i.e.,":[114],"application-specific":[115],"integrated":[116],"circuits,":[117,156],"undertaking":[120],"encompasses":[122],"endeavours":[123],"ranging":[124],"from":[125],"classic":[126],"work":[128,326],"existing":[130],"algorithms":[131,212,282],"conception":[134],"novel":[136],"constructions.":[137],"This":[138],"thesis":[139,320],"unfolds":[140],"over":[141,196],"two":[142],"books:":[143],"first":[145,204],"book":[146,248],"a":[148,328,333],"treatise":[149],"energy":[152,171,206],"consumption":[153],"under-represented":[158],"metric":[159],"canon":[162],"literature.":[165],"We":[166,191,233,275],"commence":[167],"devising":[169],"model":[172,207],"for":[173,208,225,283],"authenticated":[174,298],"encryption":[175,227,281,299],"schemes":[176,184],"investigating":[178],"consumptive":[180],"behaviour":[181],"lightweight":[183,334],"bootstrapped":[187],"via":[188],"block":[189,259,337],"ciphers.":[190,338],"then":[192,276],"turn":[193],"gazes":[195],"hardware-based":[198],"stream":[199,222,244],"ciphers":[200],"propose":[202],"heuristic":[205],"class":[210],"enables":[214],"us":[215],"design":[217,296],"currently":[219],"most":[220],"energy-efficient":[221,242],"cipher":[223,260],"suited":[224],"larger":[229],"bulks":[230],"data.":[232],"conclude":[234],"section":[236],"with":[237,323],"proposal":[239],"small-state":[243],"cipher.":[245],"second":[247],"gathers":[249],"contributions":[250],"various":[252],"other":[253],"such":[255],"as":[256,286],"serialisation":[257],"circuits":[261],"through":[262],"which":[263],"obtain":[265],"smallest":[267],"known":[268],"Advanced":[272],"Encryption":[273],"Standard.":[274],"divert":[277],"attention":[279],"toward":[280],"high-throughput":[284],"networks,":[285],"found":[287],"upcoming":[290],"6G":[291],"telecommunication":[292],"channels.":[293],"And":[294],"scheme":[300],"both":[303],"secure":[304],"post-quantum":[307],"setting":[308],"reaches":[310],"unparalleled":[311],"throughput":[312],"rates":[313],"Terabit":[316],"range.":[317],"Ultimately,":[318],"concluded":[322],"side-channel-protected":[329],"threshold":[330],"family":[335]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
