{"id":"https://openalex.org/W2295891328","doi":"https://doi.org/10.5220/0005511801940201","title":"A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange","display_name":"A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295891328","doi":"https://doi.org/10.5220/0005511801940201","mag":"2295891328"},"language":"en","primary_location":{"id":"doi:10.5220/0005511801940201","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005511801940201","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005511801940201","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027569958","display_name":"Luigi Maria Bottasso","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Luigi Maria Bottasso","raw_affiliation_strings":["AgustaWestland, Italy"],"affiliations":[{"raw_affiliation_string":"AgustaWestland, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5027569958"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.20761016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"194","last_page":"201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7426767349243164},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.733533501625061},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6697956323623657},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.6568601131439209},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6160542368888855},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.5529475808143616},{"id":"https://openalex.org/keywords/id-based-cryptography","display_name":"ID-based cryptography","score":0.5251523852348328},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5105991959571838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4764968752861023},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.262165367603302},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.25690513849258423}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7426767349243164},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.733533501625061},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6697956323623657},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.6568601131439209},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6160542368888855},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.5529475808143616},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.5251523852348328},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5105991959571838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4764968752861023},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.262165367603302},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.25690513849258423}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005511801940201","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005511801940201","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005511801940201","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005511801940201","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W43667552","https://openalex.org/W141600038","https://openalex.org/W1498993177","https://openalex.org/W1880212920","https://openalex.org/W2005936791","https://openalex.org/W2319324897"],"related_works":["https://openalex.org/W3201596224","https://openalex.org/W4226182343","https://openalex.org/W2372901083","https://openalex.org/W2611715963","https://openalex.org/W2982287142","https://openalex.org/W2404540745","https://openalex.org/W2150220050","https://openalex.org/W2534382314","https://openalex.org/W2888183313","https://openalex.org/W4255752674"],"abstract_inverted_index":{"A":[0],"new":[1],"library":[2],"of":[3,17,27,40,70,85,101,123,141],"modular":[4],"arithmetic":[5],"and":[6,11,25,44,62,83],"cryptographic":[7],"functions":[8],"was":[9,50],"coded,":[10],"then":[12],"used":[13,92],"for":[14,52],"the":[15,23,78,86,102,139],"development":[16],"a":[18,28,131],"crypto":[19],"tool.":[20],"We":[21],"present":[22],"architecture":[24],"functionality":[26],"hybrid":[29],"ECC-AES":[30],"cryptosystem":[31],"which":[32],"can":[33],"be":[34],"quickly":[35],"deployed":[36],"even":[37],"in":[38,54,93,115],"absence":[39],"Public":[41],"Key":[42],"Infrastructures":[43],"associated":[45,73,129],"Certification":[46],"Authorities.":[47],"The":[48,110,126],"tool":[49],"conceived":[51],"use":[53,122],"combination":[55],"with":[56,72,80,120,130],"readily":[57],"available":[58],"resources,":[59],"e.g.":[60],"email":[61],"possibly":[63],"social":[64],"networks.":[65],"It":[66],"allows":[67],"secure":[68],"exchange":[69],"files":[71],"ECDSA":[74],"digital":[75],"signature,":[76],"providing":[77],"user":[79],"substantial":[81],"flexibility":[82],"control":[84],"security":[87],"settings.":[88],"Established":[89],"protocols":[90],"were":[91],"an":[94,107],"original":[95],"way,":[96],"notably":[97],"exploiting":[98],"direct":[99],"embedding":[100],"AES":[103],"session":[104],"key":[105],"into":[106],"elliptic":[108],"curve.":[109],"code":[111],"has":[112],"been":[113],"developed":[114],"C++":[116],"entirely":[117],"from":[118],"scratch,":[119],"no":[121],"pre-existing":[124],"libraries.":[125],"implementation":[127],"is":[128],"web":[132],"site":[133],"http://www.elcrypto.com,":[134],"www.elcrypto.com":[135],"aimed":[136],"at":[137],"promoting":[138],"benefits":[140],"Elliptic":[142],"Curve":[143],"Cryptography.":[144]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
