Systolic inversion algorithms for building cryptographic systems based on security measurement in IoT-based advanced manufacturing

•Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement. Internet of Things (IoTs) have become one of the most popular techniques and widely used in adv...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Measurement : journal of the International Measurement Confederation Ročník 161; s. 107827
Hlavní autor: Yi, Haibo
Médium: Journal Article
Jazyk:angličtina
Vydáno: London Elsevier Ltd 01.09.2020
Elsevier Science Ltd
Témata:
ISSN:0263-2241, 1873-412X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract •Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement. Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing.
AbstractList Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing.
•Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement. Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing.
ArticleNumber 107827
Author Yi, Haibo
Author_xml – sequence: 1
  givenname: Haibo
  surname: Yi
  fullname: Yi, Haibo
  email: haiboyi@szpt.edu.cn
  organization: School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen 518055, China
BookMark eNqNkM1qGzEURkVJIHaad5jS9bj684y8KsW0qSGQRVLITkiaK0dmRnIljWG2efLITBehK690Eef7rnSW6MoHDwh9IXhFMGm-HVYDqDRGGMDnFcX0fN8K2n5CCyJaVnNCX67QAtOG1ZRycoOWKR0wxg3bNAv09jSlHHpnKudPEJMLvlL9PkSXX4dU2RArPbq-c35fmTgdc9hHdXwtfCpBKIhWCbqqxBKYscSm6sOLSmu1C8_1DKnupLwpw6D8aJXJhff7z-jaqj7B3b_zFv359fN5-7t-eLzfbX881IbxTa4tM0Qb1gognDagtdUds51QQlFmOCbCarBrrbGxjBMuWNvxNcNMKy64FuwWfZ17jzH8HSFleQhj9GWlpJxTRjdNywv1faZMDClFsNK4rHLxkqNyvSRYnsXLg_zwTXkWL2fxpWHzX8MxukHF6aLsds5CEXFyEGUyDs7OXASTZRfcBS3vqVusfA
CitedBy_id crossref_primary_10_1007_s10845_021_01782_3
crossref_primary_10_1016_j_measurement_2024_114174
crossref_primary_10_1016_j_measurement_2021_110175
Cites_doi 10.1007/s11042-019-7598-0
10.1016/j.measurement.2014.08.051
10.1016/j.measurement.2011.11.017
10.1109/DSD.2009.161
10.1038/nature23461
10.1109/12.926155
10.1002/ett.3681
10.1007/s11128-016-1316-x
10.1109/12.888047
10.1109/MCOM.2018.1700330
10.1016/j.measurement.2013.06.034
10.1109/MIC.2018.112102200
10.1016/S0263-2241(00)00038-5
10.1016/j.measurement.2013.03.001
10.1007/s10623-007-9073-6
10.1080/07350015.1988.10509635
10.1007/3-540-36400-5_35
10.1109/APCCAS.2006.342505
10.1007/s11265-008-0164-z
10.1016/j.measurement.2017.12.014
10.1109/MSP.2007.176
10.1016/0890-5401(88)90024-7
10.1093/comjnl/bxw008
10.1109/TVLSI.2010.2051343
10.1109/ARITH.2001.930105
10.1109/MCOM.2018.1700882
10.1007/s10916-019-1378-2
10.1109/ITCC.2005.8
10.1016/j.measurement.2012.04.018
10.1016/j.measurement.2016.06.014
10.1109/MSP.2017.3151328
10.1109/12.403725
10.1016/j.measurement.2015.04.015
10.1016/j.measurement.2013.09.031
10.1016/j.comnet.2004.03.033
ContentType Journal Article
Copyright 2020 Elsevier Ltd
Copyright Elsevier Science Ltd. Sep 2020
Copyright_xml – notice: 2020 Elsevier Ltd
– notice: Copyright Elsevier Science Ltd. Sep 2020
DBID AAYXX
CITATION
DOI 10.1016/j.measurement.2020.107827
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Physics
EISSN 1873-412X
ExternalDocumentID 10_1016_j_measurement_2020_107827
S0263224120303651
GroupedDBID --K
--M
.~1
0R~
1B1
1~.
1~5
29M
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
ABFNM
ABFRF
ABJNI
ABMAC
ABNEU
ABXDB
ABYKQ
ACDAQ
ACFVG
ACGFO
ACGFS
ACIWK
ACNNM
ACRLP
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEFWE
AEGXH
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AIEXJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GS5
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SDF
SDG
SES
SET
SEW
SPC
SPCBC
SPD
SSQ
SST
SSZ
T5K
WUQ
XPP
ZMT
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ACLOT
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c349t-f3c1bc378e1426ebbfbd3fd8a8a23c4018fbef5bb0cf3414837d45303ba484b83
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000535957400003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0263-2241
IngestDate Mon Nov 10 02:57:01 EST 2025
Sat Nov 29 07:22:23 EST 2025
Tue Nov 18 21:45:07 EST 2025
Fri Feb 23 02:47:49 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Internet of Things (IoTs)
Security measurement
Advanced manufacturing
Systolic inversion
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c349t-f3c1bc378e1426ebbfbd3fd8a8a23c4018fbef5bb0cf3414837d45303ba484b83
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2442329674
PQPubID 2047460
ParticipantIDs proquest_journals_2442329674
crossref_citationtrail_10_1016_j_measurement_2020_107827
crossref_primary_10_1016_j_measurement_2020_107827
elsevier_sciencedirect_doi_10_1016_j_measurement_2020_107827
PublicationCentury 2000
PublicationDate September 2020
2020-09-00
20200901
PublicationDateYYYYMMDD 2020-09-01
PublicationDate_xml – month: 09
  year: 2020
  text: September 2020
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Measurement : journal of the International Measurement Confederation
PublicationYear 2020
Publisher Elsevier Ltd
Elsevier Science Ltd
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Science Ltd
References Ke, Leng, He, Maharjan, Yan (b0055) 2018; 56
M.A. Hasan, Efficient computation of multiplicative inverses for cryptographic applications, in: 15th IEEE Symposium on Computer Arithmetic, 2001. Proceedings, 2001, pp. 66–72.
A.A.A. Gutub, New hardware algorithms and designs for Montgomery modular inverse computation in Galois fields GF (p) and GF(2
in: IEEE Asia Pacific Conference on Circuits and Systems, 2006. APCCAS 2006, Dec. 2006, pp. 1492–1495.
Rodríguez-Henríquez, Morales-Luna, Saqib, Cruz-Cortés (b0140) 2007; 45
F. Rodriguez-Henriquez, N. Cruz-Cortes, N.A. Saqib, A fast implementation of multiplicative inversion over GF(2
Ray, Partha Pratim, Internet of things cloud enabled missenard index measurement for indoor occupants, Measurement (2017) S0263224116302950.
Angrisani, Di Lelio, Morabito, Moriello, Vadursi (b0080) 2011; 46
Lakshmi Sangeetha, Bharathi, Balaji Ganesh, Radhakrishnan (b0005) 2017; 117
Jr. Kaliski, B.S. The Montgomery inverse and its applications. Computers, IEEE Transactions on, 44(8):1064–1065, Aug 1995.
D], Ph. D. thesis, Oregon State University, 2002.
Gomez, Arcia-Moret, Crowcroft (b0050) 2018
Kavitha, Alphonse, Venkataramana Reddy (b0085) 2019; 43
Yongsheng Qian, Jinbao Luo, Junwei Zeng, Xiaoming Shao, Weibiao Guo, Study on security features of freeway traffic flow with cellular automata model-taking the number of overtake as an example, Measurement 46(6) (2013) 2035–2042.
Francesco Marino, Corrado Moiso, Matteo Petracca, Pkiot: A public key infrastructure for the internet of things, Trans. Emerg. Telecommun. Technol. (7) 2019.
Piazzalunga, Salvaneschi, Balducci, Jacomuzzi, Moroncelli (b0065) 2007; 5
Yao Yao, Ming Gao, Mo Li, Jian Zhang, Quantum cloning attacks against puf-based quantum authentication systems, Quantum Informat. Process. 15(8) (2016) 3311–3325.
Antunes, Lima, Varum, Andre (b0020) 2012; 45
Y.C. Lee, T.S. Liu, C.I. Wu, W.Y. Lin, Investigation on residual stress and stress-optical coefficient for flexible electronics by photoelasticity, Measurement 45(3) (2012) 311–316.
Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Comput. Networks 46(2) (2004) 253–272.
in: International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005, vol. 1, April 2005, pp. 574–579.
C. Rebeiro, S.S. Roy, D.S. Reddy, D. Mukhopadhyay, Revisiting the Itoh-Tsujii inversion algorithm for FPGA platforms, IEEE Trans. Very Large Scale Integration (VLSI) Syst. (99) (2011) 1–5.
Lee, Chiou (b0195) 2008; 52
Zhe, Choo, Grossschadl (b0045) 2018; 56
Jintai Ding, Albrecht Petzoldt, Current state of multivariate cryptography, IEEE Security & Privacy 15(4) (2017) 28–36.
Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li, Authenticated public key broadcast encryption with short ciphertexts, Multimedia Toolsand Appl. (1) 2019.
Wang, Guo (b0185) 2000; 49
Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yan-Haw Chen, Low complexity architecture for multiplicative inversion in GF(2
Lecture Notes Comput. Sci., (2003) 484–499.
Tilo Pfeifer, Syuhei Kurokawa, Stefan Meyer, Derivation of parameters of global form deviations for 3-dimensional surfaces in actual manufacturing processes, Measurement 29(3) (2001) 179–200.
Yi, Tang (b0115) 2016; 59
Choi, Pak, Ahn, Mo, Song (b0030) 2015; 73
Itoh, Tsujii (b0135) 1988; 78
H.T. Kungt, C.E. Leisersont, Systolic arrays (for VLSI), in: Sparse Matrix Proceedings, 1978, pp. 256. Society for Industrial & Applied, 1979.
Manikandan, Ramar, Willjuice Iruthayarajan, Srinivasagan (b0040) 2014; 47
Larry J. Lockwood, K. Rao Kadiyala, Risk measurement for event-dependent security returns, J. Bus. Econ. Statist. 6(1) (2012) 43–49.
A.P. Fournaris, O. Koufopavlou, One dimensional systolic inversion architecture based on modified GF(2
A.A.A. Gutub, A.F. Tenca, E. Savas, Ç.K. Koç, Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2
Tie Qiao Tang, Wei-Fang Shi, Hua-Yan Shang, Yun-Peng Wang, An extended car-following model with consideration of the reliability of inter-vehicle communication, Measurement 58 (2014) 286–293.
extended Euclidean algorithm, in: 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009. DSD ’09, Aug. 2009, pp. 736–741.
Takagi, Yoshiki, Takagi (b0125) May 2001; 50
Wei (b0190) 1997; 44
Daniel J. Bernstein, Tanja Lange, Post-quantum cryptography, Nature 549(7671) (2017) 188–194.
Blake, Seroussi, Smart (b0150) 1999
Ke (10.1016/j.measurement.2020.107827_b0055) 2018; 56
10.1016/j.measurement.2020.107827_b0120
Wei (10.1016/j.measurement.2020.107827_b0190) 1997; 44
Zhe (10.1016/j.measurement.2020.107827_b0045) 2018; 56
10.1016/j.measurement.2020.107827_b0180
10.1016/j.measurement.2020.107827_b0060
10.1016/j.measurement.2020.107827_b0160
10.1016/j.measurement.2020.107827_b0105
10.1016/j.measurement.2020.107827_b0165
10.1016/j.measurement.2020.107827_b0100
Kavitha (10.1016/j.measurement.2020.107827_b0085) 2019; 43
10.1016/j.measurement.2020.107827_b0145
Lee (10.1016/j.measurement.2020.107827_b0195) 2008; 52
10.1016/j.measurement.2020.107827_b0025
Rodríguez-Henríquez (10.1016/j.measurement.2020.107827_b0140) 2007; 45
Antunes (10.1016/j.measurement.2020.107827_b0020) 2012; 45
Takagi (10.1016/j.measurement.2020.107827_b0125) 2001; 50
Blake (10.1016/j.measurement.2020.107827_b0150) 1999
Lakshmi Sangeetha (10.1016/j.measurement.2020.107827_b0005) 2017; 117
Yi (10.1016/j.measurement.2020.107827_b0115) 2016; 59
10.1016/j.measurement.2020.107827_b0090
Angrisani (10.1016/j.measurement.2020.107827_b0080) 2011; 46
Wang (10.1016/j.measurement.2020.107827_b0185) 2000; 49
Choi (10.1016/j.measurement.2020.107827_b0030) 2015; 73
10.1016/j.measurement.2020.107827_b0095
10.1016/j.measurement.2020.107827_b0075
10.1016/j.measurement.2020.107827_b0130
10.1016/j.measurement.2020.107827_b0010
10.1016/j.measurement.2020.107827_b0175
10.1016/j.measurement.2020.107827_b0070
10.1016/j.measurement.2020.107827_b0170
10.1016/j.measurement.2020.107827_b0015
Piazzalunga (10.1016/j.measurement.2020.107827_b0065) 2007; 5
10.1016/j.measurement.2020.107827_b0110
10.1016/j.measurement.2020.107827_b0155
10.1016/j.measurement.2020.107827_b0035
Gomez (10.1016/j.measurement.2020.107827_b0050) 2018
Manikandan (10.1016/j.measurement.2020.107827_b0040) 2014; 47
Itoh (10.1016/j.measurement.2020.107827_b0135) 1988; 78
References_xml – reference: Daniel J. Bernstein, Tanja Lange, Post-quantum cryptography, Nature 549(7671) (2017) 188–194.
– reference: Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yan-Haw Chen, Low complexity architecture for multiplicative inversion in GF(2
– reference: A.A.A. Gutub, A.F. Tenca, E. Savas, Ç.K. Koç, Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2
– volume: 52
  start-page: 313
  year: 2008
  end-page: 324
  ident: b0195
  article-title: New bit-parallel systolic architectures for computing multiplication, multiplicative inversion and division in GF(2
  publication-title: J. Signal Process. Syst.
– reference: ) extended Euclidean algorithm, in: 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009. DSD ’09, Aug. 2009, pp. 736–741.
– reference: A.P. Fournaris, O. Koufopavlou, One dimensional systolic inversion architecture based on modified GF(2
– volume: 73
  start-page: 262
  year: 2015
  end-page: 274
  ident: b0030
  article-title: New preceding vehicle tracking algorithm based on optimal unbiased finite memory filter
  publication-title: Measurement
– reference: Francesco Marino, Corrado Moiso, Matteo Petracca, Pkiot: A public key infrastructure for the internet of things, Trans. Emerg. Telecommun. Technol. (7) 2019.
– reference: A.A.A. Gutub, New hardware algorithms and designs for Montgomery modular inverse computation in Galois fields GF (p) and GF(2
– volume: 117
  start-page: 80
  year: 2017
  end-page: 89
  ident: b0005
  article-title: Particle swarm optimization tuned cascade control system in an internet of things (iot) environment
  publication-title: Measurement
– reference: F. Rodriguez-Henriquez, N. Cruz-Cortes, N.A. Saqib, A fast implementation of multiplicative inversion over GF(2
– reference: Jintai Ding, Albrecht Petzoldt, Current state of multivariate cryptography, IEEE Security & Privacy 15(4) (2017) 28–36.
– reference: ). D], Ph. D. thesis, Oregon State University, 2002.
– reference: Tilo Pfeifer, Syuhei Kurokawa, Stefan Meyer, Derivation of parameters of global form deviations for 3-dimensional surfaces in actual manufacturing processes, Measurement 29(3) (2001) 179–200.
– volume: 45
  start-page: 1695
  year: 2012
  end-page: 1705
  ident: b0020
  article-title: Optical fiber sensors for static and dynamic health monitoring of civil engineering infrastructures: Abode wall case study
  publication-title: Measurement
– volume: 78
  start-page: 171
  year: 1988
  end-page: 177
  ident: b0135
  article-title: A fast algorithm for computing multiplicative inverses in GF(2
  publication-title: Inf. Comput.
– reference: M.A. Hasan, Efficient computation of multiplicative inverses for cryptographic applications, in: 15th IEEE Symposium on Computer Arithmetic, 2001. Proceedings, 2001, pp. 66–72.
– reference: Jr. Kaliski, B.S. The Montgomery inverse and its applications. Computers, IEEE Transactions on, 44(8):1064–1065, Aug 1995.
– reference: Y.C. Lee, T.S. Liu, C.I. Wu, W.Y. Lin, Investigation on residual stress and stress-optical coefficient for flexible electronics by photoelasticity, Measurement 45(3) (2012) 311–316.
– reference: ), in: IEEE Asia Pacific Conference on Circuits and Systems, 2006. APCCAS 2006, Dec. 2006, pp. 1492–1495.
– reference: Tie Qiao Tang, Wei-Fang Shi, Hua-Yan Shang, Yun-Peng Wang, An extended car-following model with consideration of the reliability of inter-vehicle communication, Measurement 58 (2014) 286–293.
– volume: 44
  start-page: 847
  year: 1997
  end-page: 855
  ident: b0190
  article-title: VLSI architectures for computing exponentiations, multiplicative inverses, and divisions in GF(2
  publication-title: IEEE Trans. Circ. Syst. II: Analog Digital Signal Process.
– reference: Yongsheng Qian, Jinbao Luo, Junwei Zeng, Xiaoming Shao, Weibiao Guo, Study on security features of freeway traffic flow with cellular automata model-taking the number of overtake as an example, Measurement 46(6) (2013) 2035–2042.
– volume: 5
  start-page: 32
  year: 2007
  end-page: 40
  ident: b0065
  article-title: Security strength measurement for dongle-protected software
  publication-title: IEEE Security Privacy
– reference: Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Comput. Networks 46(2) (2004) 253–272.
– volume: 46
  year: 2011
  ident: b0080
  article-title: Security in voip systems: Towards the design and implementation of a reconfigurable test bed for real-time measurements
  publication-title: Measurement
– reference: Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li, Authenticated public key broadcast encryption with short ciphertexts, Multimedia Toolsand Appl. (1) 2019.
– volume: 49
  start-page: 1120
  year: 2000
  end-page: 1125
  ident: b0185
  article-title: New systolic arrays for C+ AB
  publication-title: IEEE Trans. Comput.
– reference: Ray, Partha Pratim, Internet of things cloud enabled missenard index measurement for indoor occupants, Measurement (2017) S0263224116302950.
– volume: 45
  start-page: 19
  year: 2007
  end-page: 37
  ident: b0140
  article-title: Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials
  publication-title: Des. Codes Crypt.
– reference: C. Rebeiro, S.S. Roy, D.S. Reddy, D. Mukhopadhyay, Revisiting the Itoh-Tsujii inversion algorithm for FPGA platforms, IEEE Trans. Very Large Scale Integration (VLSI) Syst. (99) (2011) 1–5.
– reference: Larry J. Lockwood, K. Rao Kadiyala, Risk measurement for event-dependent security returns, J. Bus. Econ. Statist. 6(1) (2012) 43–49.
– volume: 50
  start-page: 394
  year: May 2001
  end-page: 398
  ident: b0125
  article-title: A fast algorithm for multiplicative inversion in GF(2
  publication-title: EEE Trans. Comput.
– volume: 47
  start-page: 558
  year: 2014
  end-page: 568
  ident: b0040
  article-title: Multilevel thresholding for segmentation of medical brain images using real coded genetic algorithm
  publication-title: Measurement
– reference: ), in: International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005, vol. 1, April 2005, pp. 574–579.
– volume: 43
  year: 2019
  ident: b0085
  article-title: An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for iot health care system
  publication-title: J. Med. Syst.
– volume: 56
  start-page: 39
  year: 2018
  end-page: 45
  ident: b0055
  article-title: Mobile edge computing and networking for green and low-latency internet of things
  publication-title: IEEE Commun. Mag.
– reference: Yao Yao, Ming Gao, Mo Li, Jian Zhang, Quantum cloning attacks against puf-based quantum authentication systems, Quantum Informat. Process. 15(8) (2016) 3311–3325.
– volume: 59
  start-page: bxw008
  year: 2016
  ident: b0115
  article-title: Very small fpga processor for multivariate signatures
  publication-title: Comput. J.
– year: 2018
  ident: b0050
  article-title: Tcp in the internet of things: From ostracism to prominence
  publication-title: IEEE Internet Comput.
– year: 1999
  ident: b0150
  article-title: Elliptic Curves in Cryptography
– volume: 56
  start-page: 158
  year: 2018
  end-page: 162
  ident: b0045
  article-title: Securing edge devices in the post-quantum internet of things using lattice-based cryptography
  publication-title: IEEE Commun. Mag.
– reference: H.T. Kungt, C.E. Leisersont, Systolic arrays (for VLSI), in: Sparse Matrix Proceedings, 1978, pp. 256. Society for Industrial & Applied, 1979.
– reference: ), Lecture Notes Comput. Sci., (2003) 484–499.
– ident: 10.1016/j.measurement.2020.107827_b0090
  doi: 10.1007/s11042-019-7598-0
– ident: 10.1016/j.measurement.2020.107827_b0025
  doi: 10.1016/j.measurement.2014.08.051
– ident: 10.1016/j.measurement.2020.107827_b0035
  doi: 10.1016/j.measurement.2011.11.017
– ident: 10.1016/j.measurement.2020.107827_b0155
  doi: 10.1109/DSD.2009.161
– ident: 10.1016/j.measurement.2020.107827_b0105
  doi: 10.1038/nature23461
– volume: 50
  start-page: 394
  issue: 5
  year: 2001
  ident: 10.1016/j.measurement.2020.107827_b0125
  article-title: A fast algorithm for multiplicative inversion in GF(2m) using normal basis
  publication-title: EEE Trans. Comput.
  doi: 10.1109/12.926155
– ident: 10.1016/j.measurement.2020.107827_b0095
  doi: 10.1002/ett.3681
– ident: 10.1016/j.measurement.2020.107827_b0100
  doi: 10.1007/s11128-016-1316-x
– volume: 49
  start-page: 1120
  issue: 10
  year: 2000
  ident: 10.1016/j.measurement.2020.107827_b0185
  article-title: New systolic arrays for C+ AB2, inversion, and division in GF(2m)
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/12.888047
– volume: 56
  start-page: 158
  issue: 2
  year: 2018
  ident: 10.1016/j.measurement.2020.107827_b0045
  article-title: Securing edge devices in the post-quantum internet of things using lattice-based cryptography
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2018.1700330
– volume: 46
  issue: 9
  year: 2011
  ident: 10.1016/j.measurement.2020.107827_b0080
  article-title: Security in voip systems: Towards the design and implementation of a reconfigurable test bed for real-time measurements
  publication-title: Measurement
  doi: 10.1016/j.measurement.2013.06.034
– year: 2018
  ident: 10.1016/j.measurement.2020.107827_b0050
  article-title: Tcp in the internet of things: From ostracism to prominence
  publication-title: IEEE Internet Comput.
  doi: 10.1109/MIC.2018.112102200
– ident: 10.1016/j.measurement.2020.107827_b0015
  doi: 10.1016/S0263-2241(00)00038-5
– year: 1999
  ident: 10.1016/j.measurement.2020.107827_b0150
– ident: 10.1016/j.measurement.2020.107827_b0180
– ident: 10.1016/j.measurement.2020.107827_b0075
  doi: 10.1016/j.measurement.2013.03.001
– volume: 45
  start-page: 19
  issue: 1
  year: 2007
  ident: 10.1016/j.measurement.2020.107827_b0140
  article-title: Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials
  publication-title: Des. Codes Crypt.
  doi: 10.1007/s10623-007-9073-6
– volume: 44
  start-page: 847
  issue: 10
  year: 1997
  ident: 10.1016/j.measurement.2020.107827_b0190
  article-title: VLSI architectures for computing exponentiations, multiplicative inverses, and divisions in GF(2m)
  publication-title: IEEE Trans. Circ. Syst. II: Analog Digital Signal Process.
– ident: 10.1016/j.measurement.2020.107827_b0175
– ident: 10.1016/j.measurement.2020.107827_b0070
  doi: 10.1080/07350015.1988.10509635
– ident: 10.1016/j.measurement.2020.107827_b0170
  doi: 10.1007/3-540-36400-5_35
– ident: 10.1016/j.measurement.2020.107827_b0120
  doi: 10.1109/APCCAS.2006.342505
– volume: 52
  start-page: 313
  year: 2008
  ident: 10.1016/j.measurement.2020.107827_b0195
  article-title: New bit-parallel systolic architectures for computing multiplication, multiplicative inversion and division in GF(2n) under polynomial basis and normal basis representations
  publication-title: J. Signal Process. Syst.
  doi: 10.1007/s11265-008-0164-z
– volume: 117
  start-page: 80
  year: 2017
  ident: 10.1016/j.measurement.2020.107827_b0005
  article-title: Particle swarm optimization tuned cascade control system in an internet of things (iot) environment
  publication-title: Measurement
  doi: 10.1016/j.measurement.2017.12.014
– volume: 5
  start-page: 32
  issue: 6
  year: 2007
  ident: 10.1016/j.measurement.2020.107827_b0065
  article-title: Security strength measurement for dongle-protected software
  publication-title: IEEE Security Privacy
  doi: 10.1109/MSP.2007.176
– volume: 78
  start-page: 171
  issue: 3
  year: 1988
  ident: 10.1016/j.measurement.2020.107827_b0135
  article-title: A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases
  publication-title: Inf. Comput.
  doi: 10.1016/0890-5401(88)90024-7
– volume: 59
  start-page: bxw008
  issue: 7
  year: 2016
  ident: 10.1016/j.measurement.2020.107827_b0115
  article-title: Very small fpga processor for multivariate signatures
  publication-title: Comput. J.
  doi: 10.1093/comjnl/bxw008
– ident: 10.1016/j.measurement.2020.107827_b0145
  doi: 10.1109/TVLSI.2010.2051343
– ident: 10.1016/j.measurement.2020.107827_b0160
  doi: 10.1109/ARITH.2001.930105
– volume: 56
  start-page: 39
  issue: 5
  year: 2018
  ident: 10.1016/j.measurement.2020.107827_b0055
  article-title: Mobile edge computing and networking for green and low-latency internet of things
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2018.1700882
– volume: 43
  issue: 8
  year: 2019
  ident: 10.1016/j.measurement.2020.107827_b0085
  article-title: An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for iot health care system
  publication-title: J. Med. Syst.
  doi: 10.1007/s10916-019-1378-2
– ident: 10.1016/j.measurement.2020.107827_b0130
  doi: 10.1109/ITCC.2005.8
– volume: 45
  start-page: 1695
  issue: 7
  year: 2012
  ident: 10.1016/j.measurement.2020.107827_b0020
  article-title: Optical fiber sensors for static and dynamic health monitoring of civil engineering infrastructures: Abode wall case study
  publication-title: Measurement
  doi: 10.1016/j.measurement.2012.04.018
– ident: 10.1016/j.measurement.2020.107827_b0010
  doi: 10.1016/j.measurement.2016.06.014
– ident: 10.1016/j.measurement.2020.107827_b0110
  doi: 10.1109/MSP.2017.3151328
– ident: 10.1016/j.measurement.2020.107827_b0165
  doi: 10.1109/12.403725
– volume: 73
  start-page: 262
  year: 2015
  ident: 10.1016/j.measurement.2020.107827_b0030
  article-title: New preceding vehicle tracking algorithm based on optimal unbiased finite memory filter
  publication-title: Measurement
  doi: 10.1016/j.measurement.2015.04.015
– volume: 47
  start-page: 558
  issue: 1
  year: 2014
  ident: 10.1016/j.measurement.2020.107827_b0040
  article-title: Multilevel thresholding for segmentation of medical brain images using real coded genetic algorithm
  publication-title: Measurement
  doi: 10.1016/j.measurement.2013.09.031
– ident: 10.1016/j.measurement.2020.107827_b0060
  doi: 10.1016/j.comnet.2004.03.033
SSID ssj0006396
Score 2.2655535
Snippet •Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing...
Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 107827
SubjectTerms Advanced manufacturing
Advanced manufacturing technologies
Algorithms
Cryptography
Cybersecurity
Data management
Internet of Things
Internet of Things (IoTs)
Manufacturing
Measurement
Multivariate analysis
Quantum computers
Resource management
Security measurement
Systolic inversion
Title Systolic inversion algorithms for building cryptographic systems based on security measurement in IoT-based advanced manufacturing
URI https://dx.doi.org/10.1016/j.measurement.2020.107827
https://www.proquest.com/docview/2442329674
Volume 161
WOSCitedRecordID wos000535957400003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection - Elsevier
  customDbUrl:
  eissn: 1873-412X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0006396
  issn: 0263-2241
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Bb9MwFLZKB2g7IBigjQ1kJG5RqiZ2GkfiMk2bGIKJQ0HlFNlOMjp1adVk1bjyD_jHPMd24k5MFCQuURX5uXHfF_vz6_P3EHoTEZ5TyqUPq7X0aZyFvsgi7oskzJRkkQibE3JfPsTn52wyST71ej_tWZjVLC5LdnOTLP6rq-EeOFsdnf0Ld7edwg34DE6HK7gdrhs5XmmQK7Ffb1qudDDM47OL-XJaf9PiC54wpbA9ufy-qLVmNbTXos6Vpxa2TP2JUJnadt5VF0hU8ZGz-djXjdoMgiteXqszEs2hR5fwfnRMVfTBUaro8jZtQNJt3BxFVLKgbqbAV11jm0_F3A1XwN7U5mPZWS0cEV_xhrUpWAuym0k0ULQl_u38rkMNlwNn3AP1LYPOZl1T-9Za12Yg2uS2y9TpKlVdpbqre2grjKOE9dHW0dnJ5H27vAOlG-nAnR7HQ_S6Sxq847nuIj23lv-G04wfo0dmM4KPNIieoF5e7qIdR6JyFz1oUoRl9RT9sMDCLbBwBywMwMIWWHgNWNgACzeYwWBmgYWdgUCvuAUWtsDCa8B6hj6fnoyP3_mmgocvCU1qvyAyEJLELA-ACeZCFCIjRcY44yGRsLVnhciLSIihLIBOqeoGGY2AVQlOGRWMPEf9cl7mewiLjAdMkJzKgFA5LNhQjARwYw58t8io3EfM_sSpNPL2qsrKLP2jq_dR2JoutMbLJkZvrR9TQ1Y1CU0Bq5uYH1rfp-bNq1Kg2jBlJqOYvviXRzpA290bd4j69fI6f4nuy1U9rZavDI5_ATMH0fQ
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Systolic+inversion+algorithms+for+building+cryptographic+systems+based+on+security+measurement+in+IoT-based+advanced+manufacturing&rft.jtitle=Measurement+%3A+journal+of+the+International+Measurement+Confederation&rft.au=Yi%2C+Haibo&rft.date=2020-09-01&rft.issn=0263-2241&rft.volume=161&rft.spage=107827&rft_id=info:doi/10.1016%2Fj.measurement.2020.107827&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_measurement_2020_107827
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0263-2241&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0263-2241&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0263-2241&client=summon