Systolic inversion algorithms for building cryptographic systems based on security measurement in IoT-based advanced manufacturing
•Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement. Internet of Things (IoTs) have become one of the most popular techniques and widely used in adv...
Uloženo v:
| Vydáno v: | Measurement : journal of the International Measurement Confederation Ročník 161; s. 107827 |
|---|---|
| Hlavní autor: | |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
London
Elsevier Ltd
01.09.2020
Elsevier Science Ltd |
| Témata: | |
| ISSN: | 0263-2241, 1873-412X |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | •Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement.
Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing. |
|---|---|
| AbstractList | Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing. •Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing post-quantum crypto-system to IoT security measurement. Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the applications of IoT-based advanced manufacturing rapidly increase, security measurement of data management has become one of the most crucial challenges in IoT-based advanced manufacturing. It is claimed that such systems are vulnerable to quantum computer attacks. Thus, it is very urgent to improve data management based on security measurement. In this paper, we improve multivariate cryptographic systems for IoT-based advanced manufacturing based on employing new inversion algorithms. Compared with related designs, the proposed design has better performance and meets the resource requirement of IoTs and the secure requirement of data management in advanced manufacturing, which is very suitable to build multivariate cryptographic systems for securing data management based on security measurement in IoT-based advanced manufacturing. |
| ArticleNumber | 107827 |
| Author | Yi, Haibo |
| Author_xml | – sequence: 1 givenname: Haibo surname: Yi fullname: Yi, Haibo email: haiboyi@szpt.edu.cn organization: School of Artificial Intelligence, Shenzhen Polytechnic, Shenzhen 518055, China |
| BookMark | eNqNkM1qGzEURkVJIHaad5jS9bj684y8KsW0qSGQRVLITkiaK0dmRnIljWG2efLITBehK690Eef7rnSW6MoHDwh9IXhFMGm-HVYDqDRGGMDnFcX0fN8K2n5CCyJaVnNCX67QAtOG1ZRycoOWKR0wxg3bNAv09jSlHHpnKudPEJMLvlL9PkSXX4dU2RArPbq-c35fmTgdc9hHdXwtfCpBKIhWCbqqxBKYscSm6sOLSmu1C8_1DKnupLwpw6D8aJXJhff7z-jaqj7B3b_zFv359fN5-7t-eLzfbX881IbxTa4tM0Qb1gognDagtdUds51QQlFmOCbCarBrrbGxjBMuWNvxNcNMKy64FuwWfZ17jzH8HSFleQhj9GWlpJxTRjdNywv1faZMDClFsNK4rHLxkqNyvSRYnsXLg_zwTXkWL2fxpWHzX8MxukHF6aLsds5CEXFyEGUyDs7OXASTZRfcBS3vqVusfA |
| CitedBy_id | crossref_primary_10_1007_s10845_021_01782_3 crossref_primary_10_1016_j_measurement_2024_114174 crossref_primary_10_1016_j_measurement_2021_110175 |
| Cites_doi | 10.1007/s11042-019-7598-0 10.1016/j.measurement.2014.08.051 10.1016/j.measurement.2011.11.017 10.1109/DSD.2009.161 10.1038/nature23461 10.1109/12.926155 10.1002/ett.3681 10.1007/s11128-016-1316-x 10.1109/12.888047 10.1109/MCOM.2018.1700330 10.1016/j.measurement.2013.06.034 10.1109/MIC.2018.112102200 10.1016/S0263-2241(00)00038-5 10.1016/j.measurement.2013.03.001 10.1007/s10623-007-9073-6 10.1080/07350015.1988.10509635 10.1007/3-540-36400-5_35 10.1109/APCCAS.2006.342505 10.1007/s11265-008-0164-z 10.1016/j.measurement.2017.12.014 10.1109/MSP.2007.176 10.1016/0890-5401(88)90024-7 10.1093/comjnl/bxw008 10.1109/TVLSI.2010.2051343 10.1109/ARITH.2001.930105 10.1109/MCOM.2018.1700882 10.1007/s10916-019-1378-2 10.1109/ITCC.2005.8 10.1016/j.measurement.2012.04.018 10.1016/j.measurement.2016.06.014 10.1109/MSP.2017.3151328 10.1109/12.403725 10.1016/j.measurement.2015.04.015 10.1016/j.measurement.2013.09.031 10.1016/j.comnet.2004.03.033 |
| ContentType | Journal Article |
| Copyright | 2020 Elsevier Ltd Copyright Elsevier Science Ltd. Sep 2020 |
| Copyright_xml | – notice: 2020 Elsevier Ltd – notice: Copyright Elsevier Science Ltd. Sep 2020 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.measurement.2020.107827 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Physics |
| EISSN | 1873-412X |
| ExternalDocumentID | 10_1016_j_measurement_2020_107827 S0263224120303651 |
| GroupedDBID | --K --M .~1 0R~ 1B1 1~. 1~5 29M 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO ABFNM ABFRF ABJNI ABMAC ABNEU ABXDB ABYKQ ACDAQ ACFVG ACGFO ACGFS ACIWK ACNNM ACRLP ADBBV ADEZE ADTZH AEBSH AECPX AEFWE AEGXH AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GS5 HVGLF HZ~ IHE J1W JJJVA KOM LY7 M41 MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SDF SDG SES SET SEW SPC SPCBC SPD SSQ SST SSZ T5K WUQ XPP ZMT ~G- 9DU AATTM AAXKI AAYWO AAYXX ACLOT ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c349t-f3c1bc378e1426ebbfbd3fd8a8a23c4018fbef5bb0cf3414837d45303ba484b83 |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000535957400003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0263-2241 |
| IngestDate | Mon Nov 10 02:57:01 EST 2025 Sat Nov 29 07:22:23 EST 2025 Tue Nov 18 21:45:07 EST 2025 Fri Feb 23 02:47:49 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Internet of Things (IoTs) Security measurement Advanced manufacturing Systolic inversion |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c349t-f3c1bc378e1426ebbfbd3fd8a8a23c4018fbef5bb0cf3414837d45303ba484b83 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2442329674 |
| PQPubID | 2047460 |
| ParticipantIDs | proquest_journals_2442329674 crossref_citationtrail_10_1016_j_measurement_2020_107827 crossref_primary_10_1016_j_measurement_2020_107827 elsevier_sciencedirect_doi_10_1016_j_measurement_2020_107827 |
| PublicationCentury | 2000 |
| PublicationDate | September 2020 2020-09-00 20200901 |
| PublicationDateYYYYMMDD | 2020-09-01 |
| PublicationDate_xml | – month: 09 year: 2020 text: September 2020 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Measurement : journal of the International Measurement Confederation |
| PublicationYear | 2020 |
| Publisher | Elsevier Ltd Elsevier Science Ltd |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Science Ltd |
| References | Ke, Leng, He, Maharjan, Yan (b0055) 2018; 56 M.A. Hasan, Efficient computation of multiplicative inverses for cryptographic applications, in: 15th IEEE Symposium on Computer Arithmetic, 2001. Proceedings, 2001, pp. 66–72. A.A.A. Gutub, New hardware algorithms and designs for Montgomery modular inverse computation in Galois fields GF (p) and GF(2 in: IEEE Asia Pacific Conference on Circuits and Systems, 2006. APCCAS 2006, Dec. 2006, pp. 1492–1495. Rodríguez-Henríquez, Morales-Luna, Saqib, Cruz-Cortés (b0140) 2007; 45 F. Rodriguez-Henriquez, N. Cruz-Cortes, N.A. Saqib, A fast implementation of multiplicative inversion over GF(2 Ray, Partha Pratim, Internet of things cloud enabled missenard index measurement for indoor occupants, Measurement (2017) S0263224116302950. Angrisani, Di Lelio, Morabito, Moriello, Vadursi (b0080) 2011; 46 Lakshmi Sangeetha, Bharathi, Balaji Ganesh, Radhakrishnan (b0005) 2017; 117 Jr. Kaliski, B.S. The Montgomery inverse and its applications. Computers, IEEE Transactions on, 44(8):1064–1065, Aug 1995. D], Ph. D. thesis, Oregon State University, 2002. Gomez, Arcia-Moret, Crowcroft (b0050) 2018 Kavitha, Alphonse, Venkataramana Reddy (b0085) 2019; 43 Yongsheng Qian, Jinbao Luo, Junwei Zeng, Xiaoming Shao, Weibiao Guo, Study on security features of freeway traffic flow with cellular automata model-taking the number of overtake as an example, Measurement 46(6) (2013) 2035–2042. Francesco Marino, Corrado Moiso, Matteo Petracca, Pkiot: A public key infrastructure for the internet of things, Trans. Emerg. Telecommun. Technol. (7) 2019. Piazzalunga, Salvaneschi, Balducci, Jacomuzzi, Moroncelli (b0065) 2007; 5 Yao Yao, Ming Gao, Mo Li, Jian Zhang, Quantum cloning attacks against puf-based quantum authentication systems, Quantum Informat. Process. 15(8) (2016) 3311–3325. Antunes, Lima, Varum, Andre (b0020) 2012; 45 Y.C. Lee, T.S. Liu, C.I. Wu, W.Y. Lin, Investigation on residual stress and stress-optical coefficient for flexible electronics by photoelasticity, Measurement 45(3) (2012) 311–316. Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Comput. Networks 46(2) (2004) 253–272. in: International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005, vol. 1, April 2005, pp. 574–579. C. Rebeiro, S.S. Roy, D.S. Reddy, D. Mukhopadhyay, Revisiting the Itoh-Tsujii inversion algorithm for FPGA platforms, IEEE Trans. Very Large Scale Integration (VLSI) Syst. (99) (2011) 1–5. Lee, Chiou (b0195) 2008; 52 Zhe, Choo, Grossschadl (b0045) 2018; 56 Jintai Ding, Albrecht Petzoldt, Current state of multivariate cryptography, IEEE Security & Privacy 15(4) (2017) 28–36. Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li, Authenticated public key broadcast encryption with short ciphertexts, Multimedia Toolsand Appl. (1) 2019. Wang, Guo (b0185) 2000; 49 Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yan-Haw Chen, Low complexity architecture for multiplicative inversion in GF(2 Lecture Notes Comput. Sci., (2003) 484–499. Tilo Pfeifer, Syuhei Kurokawa, Stefan Meyer, Derivation of parameters of global form deviations for 3-dimensional surfaces in actual manufacturing processes, Measurement 29(3) (2001) 179–200. Yi, Tang (b0115) 2016; 59 Choi, Pak, Ahn, Mo, Song (b0030) 2015; 73 Itoh, Tsujii (b0135) 1988; 78 H.T. Kungt, C.E. Leisersont, Systolic arrays (for VLSI), in: Sparse Matrix Proceedings, 1978, pp. 256. Society for Industrial & Applied, 1979. Manikandan, Ramar, Willjuice Iruthayarajan, Srinivasagan (b0040) 2014; 47 Larry J. Lockwood, K. Rao Kadiyala, Risk measurement for event-dependent security returns, J. Bus. Econ. Statist. 6(1) (2012) 43–49. A.P. Fournaris, O. Koufopavlou, One dimensional systolic inversion architecture based on modified GF(2 A.A.A. Gutub, A.F. Tenca, E. Savas, Ç.K. Koç, Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2 Tie Qiao Tang, Wei-Fang Shi, Hua-Yan Shang, Yun-Peng Wang, An extended car-following model with consideration of the reliability of inter-vehicle communication, Measurement 58 (2014) 286–293. extended Euclidean algorithm, in: 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009. DSD ’09, Aug. 2009, pp. 736–741. Takagi, Yoshiki, Takagi (b0125) May 2001; 50 Wei (b0190) 1997; 44 Daniel J. Bernstein, Tanja Lange, Post-quantum cryptography, Nature 549(7671) (2017) 188–194. Blake, Seroussi, Smart (b0150) 1999 Ke (10.1016/j.measurement.2020.107827_b0055) 2018; 56 10.1016/j.measurement.2020.107827_b0120 Wei (10.1016/j.measurement.2020.107827_b0190) 1997; 44 Zhe (10.1016/j.measurement.2020.107827_b0045) 2018; 56 10.1016/j.measurement.2020.107827_b0180 10.1016/j.measurement.2020.107827_b0060 10.1016/j.measurement.2020.107827_b0160 10.1016/j.measurement.2020.107827_b0105 10.1016/j.measurement.2020.107827_b0165 10.1016/j.measurement.2020.107827_b0100 Kavitha (10.1016/j.measurement.2020.107827_b0085) 2019; 43 10.1016/j.measurement.2020.107827_b0145 Lee (10.1016/j.measurement.2020.107827_b0195) 2008; 52 10.1016/j.measurement.2020.107827_b0025 Rodríguez-Henríquez (10.1016/j.measurement.2020.107827_b0140) 2007; 45 Antunes (10.1016/j.measurement.2020.107827_b0020) 2012; 45 Takagi (10.1016/j.measurement.2020.107827_b0125) 2001; 50 Blake (10.1016/j.measurement.2020.107827_b0150) 1999 Lakshmi Sangeetha (10.1016/j.measurement.2020.107827_b0005) 2017; 117 Yi (10.1016/j.measurement.2020.107827_b0115) 2016; 59 10.1016/j.measurement.2020.107827_b0090 Angrisani (10.1016/j.measurement.2020.107827_b0080) 2011; 46 Wang (10.1016/j.measurement.2020.107827_b0185) 2000; 49 Choi (10.1016/j.measurement.2020.107827_b0030) 2015; 73 10.1016/j.measurement.2020.107827_b0095 10.1016/j.measurement.2020.107827_b0075 10.1016/j.measurement.2020.107827_b0130 10.1016/j.measurement.2020.107827_b0010 10.1016/j.measurement.2020.107827_b0175 10.1016/j.measurement.2020.107827_b0070 10.1016/j.measurement.2020.107827_b0170 10.1016/j.measurement.2020.107827_b0015 Piazzalunga (10.1016/j.measurement.2020.107827_b0065) 2007; 5 10.1016/j.measurement.2020.107827_b0110 10.1016/j.measurement.2020.107827_b0155 10.1016/j.measurement.2020.107827_b0035 Gomez (10.1016/j.measurement.2020.107827_b0050) 2018 Manikandan (10.1016/j.measurement.2020.107827_b0040) 2014; 47 Itoh (10.1016/j.measurement.2020.107827_b0135) 1988; 78 |
| References_xml | – reference: Daniel J. Bernstein, Tanja Lange, Post-quantum cryptography, Nature 549(7671) (2017) 188–194. – reference: Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yan-Haw Chen, Low complexity architecture for multiplicative inversion in GF(2 – reference: A.A.A. Gutub, A.F. Tenca, E. Savas, Ç.K. Koç, Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2 – volume: 52 start-page: 313 year: 2008 end-page: 324 ident: b0195 article-title: New bit-parallel systolic architectures for computing multiplication, multiplicative inversion and division in GF(2 publication-title: J. Signal Process. Syst. – reference: ) extended Euclidean algorithm, in: 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009. DSD ’09, Aug. 2009, pp. 736–741. – reference: A.P. Fournaris, O. Koufopavlou, One dimensional systolic inversion architecture based on modified GF(2 – volume: 73 start-page: 262 year: 2015 end-page: 274 ident: b0030 article-title: New preceding vehicle tracking algorithm based on optimal unbiased finite memory filter publication-title: Measurement – reference: Francesco Marino, Corrado Moiso, Matteo Petracca, Pkiot: A public key infrastructure for the internet of things, Trans. Emerg. Telecommun. Technol. (7) 2019. – reference: A.A.A. Gutub, New hardware algorithms and designs for Montgomery modular inverse computation in Galois fields GF (p) and GF(2 – volume: 117 start-page: 80 year: 2017 end-page: 89 ident: b0005 article-title: Particle swarm optimization tuned cascade control system in an internet of things (iot) environment publication-title: Measurement – reference: F. Rodriguez-Henriquez, N. Cruz-Cortes, N.A. Saqib, A fast implementation of multiplicative inversion over GF(2 – reference: Jintai Ding, Albrecht Petzoldt, Current state of multivariate cryptography, IEEE Security & Privacy 15(4) (2017) 28–36. – reference: ). D], Ph. D. thesis, Oregon State University, 2002. – reference: Tilo Pfeifer, Syuhei Kurokawa, Stefan Meyer, Derivation of parameters of global form deviations for 3-dimensional surfaces in actual manufacturing processes, Measurement 29(3) (2001) 179–200. – volume: 45 start-page: 1695 year: 2012 end-page: 1705 ident: b0020 article-title: Optical fiber sensors for static and dynamic health monitoring of civil engineering infrastructures: Abode wall case study publication-title: Measurement – volume: 78 start-page: 171 year: 1988 end-page: 177 ident: b0135 article-title: A fast algorithm for computing multiplicative inverses in GF(2 publication-title: Inf. Comput. – reference: M.A. Hasan, Efficient computation of multiplicative inverses for cryptographic applications, in: 15th IEEE Symposium on Computer Arithmetic, 2001. Proceedings, 2001, pp. 66–72. – reference: Jr. Kaliski, B.S. The Montgomery inverse and its applications. Computers, IEEE Transactions on, 44(8):1064–1065, Aug 1995. – reference: Y.C. Lee, T.S. Liu, C.I. Wu, W.Y. Lin, Investigation on residual stress and stress-optical coefficient for flexible electronics by photoelasticity, Measurement 45(3) (2012) 311–316. – reference: ), in: IEEE Asia Pacific Conference on Circuits and Systems, 2006. APCCAS 2006, Dec. 2006, pp. 1492–1495. – reference: Tie Qiao Tang, Wei-Fang Shi, Hua-Yan Shang, Yun-Peng Wang, An extended car-following model with consideration of the reliability of inter-vehicle communication, Measurement 58 (2014) 286–293. – volume: 44 start-page: 847 year: 1997 end-page: 855 ident: b0190 article-title: VLSI architectures for computing exponentiations, multiplicative inverses, and divisions in GF(2 publication-title: IEEE Trans. Circ. Syst. II: Analog Digital Signal Process. – reference: Yongsheng Qian, Jinbao Luo, Junwei Zeng, Xiaoming Shao, Weibiao Guo, Study on security features of freeway traffic flow with cellular automata model-taking the number of overtake as an example, Measurement 46(6) (2013) 2035–2042. – volume: 5 start-page: 32 year: 2007 end-page: 40 ident: b0065 article-title: Security strength measurement for dongle-protected software publication-title: IEEE Security Privacy – reference: Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving ip address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Comput. Networks 46(2) (2004) 253–272. – volume: 46 year: 2011 ident: b0080 article-title: Security in voip systems: Towards the design and implementation of a reconfigurable test bed for real-time measurements publication-title: Measurement – reference: Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li, Authenticated public key broadcast encryption with short ciphertexts, Multimedia Toolsand Appl. (1) 2019. – volume: 49 start-page: 1120 year: 2000 end-page: 1125 ident: b0185 article-title: New systolic arrays for C+ AB publication-title: IEEE Trans. Comput. – reference: Ray, Partha Pratim, Internet of things cloud enabled missenard index measurement for indoor occupants, Measurement (2017) S0263224116302950. – volume: 45 start-page: 19 year: 2007 end-page: 37 ident: b0140 article-title: Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials publication-title: Des. Codes Crypt. – reference: C. Rebeiro, S.S. Roy, D.S. Reddy, D. Mukhopadhyay, Revisiting the Itoh-Tsujii inversion algorithm for FPGA platforms, IEEE Trans. Very Large Scale Integration (VLSI) Syst. (99) (2011) 1–5. – reference: Larry J. Lockwood, K. Rao Kadiyala, Risk measurement for event-dependent security returns, J. Bus. Econ. Statist. 6(1) (2012) 43–49. – volume: 50 start-page: 394 year: May 2001 end-page: 398 ident: b0125 article-title: A fast algorithm for multiplicative inversion in GF(2 publication-title: EEE Trans. Comput. – volume: 47 start-page: 558 year: 2014 end-page: 568 ident: b0040 article-title: Multilevel thresholding for segmentation of medical brain images using real coded genetic algorithm publication-title: Measurement – reference: ), in: International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005, vol. 1, April 2005, pp. 574–579. – volume: 43 year: 2019 ident: b0085 article-title: An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for iot health care system publication-title: J. Med. Syst. – volume: 56 start-page: 39 year: 2018 end-page: 45 ident: b0055 article-title: Mobile edge computing and networking for green and low-latency internet of things publication-title: IEEE Commun. Mag. – reference: Yao Yao, Ming Gao, Mo Li, Jian Zhang, Quantum cloning attacks against puf-based quantum authentication systems, Quantum Informat. Process. 15(8) (2016) 3311–3325. – volume: 59 start-page: bxw008 year: 2016 ident: b0115 article-title: Very small fpga processor for multivariate signatures publication-title: Comput. J. – year: 2018 ident: b0050 article-title: Tcp in the internet of things: From ostracism to prominence publication-title: IEEE Internet Comput. – year: 1999 ident: b0150 article-title: Elliptic Curves in Cryptography – volume: 56 start-page: 158 year: 2018 end-page: 162 ident: b0045 article-title: Securing edge devices in the post-quantum internet of things using lattice-based cryptography publication-title: IEEE Commun. Mag. – reference: H.T. Kungt, C.E. Leisersont, Systolic arrays (for VLSI), in: Sparse Matrix Proceedings, 1978, pp. 256. Society for Industrial & Applied, 1979. – reference: ), Lecture Notes Comput. Sci., (2003) 484–499. – ident: 10.1016/j.measurement.2020.107827_b0090 doi: 10.1007/s11042-019-7598-0 – ident: 10.1016/j.measurement.2020.107827_b0025 doi: 10.1016/j.measurement.2014.08.051 – ident: 10.1016/j.measurement.2020.107827_b0035 doi: 10.1016/j.measurement.2011.11.017 – ident: 10.1016/j.measurement.2020.107827_b0155 doi: 10.1109/DSD.2009.161 – ident: 10.1016/j.measurement.2020.107827_b0105 doi: 10.1038/nature23461 – volume: 50 start-page: 394 issue: 5 year: 2001 ident: 10.1016/j.measurement.2020.107827_b0125 article-title: A fast algorithm for multiplicative inversion in GF(2m) using normal basis publication-title: EEE Trans. Comput. doi: 10.1109/12.926155 – ident: 10.1016/j.measurement.2020.107827_b0095 doi: 10.1002/ett.3681 – ident: 10.1016/j.measurement.2020.107827_b0100 doi: 10.1007/s11128-016-1316-x – volume: 49 start-page: 1120 issue: 10 year: 2000 ident: 10.1016/j.measurement.2020.107827_b0185 article-title: New systolic arrays for C+ AB2, inversion, and division in GF(2m) publication-title: IEEE Trans. Comput. doi: 10.1109/12.888047 – volume: 56 start-page: 158 issue: 2 year: 2018 ident: 10.1016/j.measurement.2020.107827_b0045 article-title: Securing edge devices in the post-quantum internet of things using lattice-based cryptography publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2018.1700330 – volume: 46 issue: 9 year: 2011 ident: 10.1016/j.measurement.2020.107827_b0080 article-title: Security in voip systems: Towards the design and implementation of a reconfigurable test bed for real-time measurements publication-title: Measurement doi: 10.1016/j.measurement.2013.06.034 – year: 2018 ident: 10.1016/j.measurement.2020.107827_b0050 article-title: Tcp in the internet of things: From ostracism to prominence publication-title: IEEE Internet Comput. doi: 10.1109/MIC.2018.112102200 – ident: 10.1016/j.measurement.2020.107827_b0015 doi: 10.1016/S0263-2241(00)00038-5 – year: 1999 ident: 10.1016/j.measurement.2020.107827_b0150 – ident: 10.1016/j.measurement.2020.107827_b0180 – ident: 10.1016/j.measurement.2020.107827_b0075 doi: 10.1016/j.measurement.2013.03.001 – volume: 45 start-page: 19 issue: 1 year: 2007 ident: 10.1016/j.measurement.2020.107827_b0140 article-title: Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials publication-title: Des. Codes Crypt. doi: 10.1007/s10623-007-9073-6 – volume: 44 start-page: 847 issue: 10 year: 1997 ident: 10.1016/j.measurement.2020.107827_b0190 article-title: VLSI architectures for computing exponentiations, multiplicative inverses, and divisions in GF(2m) publication-title: IEEE Trans. Circ. Syst. II: Analog Digital Signal Process. – ident: 10.1016/j.measurement.2020.107827_b0175 – ident: 10.1016/j.measurement.2020.107827_b0070 doi: 10.1080/07350015.1988.10509635 – ident: 10.1016/j.measurement.2020.107827_b0170 doi: 10.1007/3-540-36400-5_35 – ident: 10.1016/j.measurement.2020.107827_b0120 doi: 10.1109/APCCAS.2006.342505 – volume: 52 start-page: 313 year: 2008 ident: 10.1016/j.measurement.2020.107827_b0195 article-title: New bit-parallel systolic architectures for computing multiplication, multiplicative inversion and division in GF(2n) under polynomial basis and normal basis representations publication-title: J. Signal Process. Syst. doi: 10.1007/s11265-008-0164-z – volume: 117 start-page: 80 year: 2017 ident: 10.1016/j.measurement.2020.107827_b0005 article-title: Particle swarm optimization tuned cascade control system in an internet of things (iot) environment publication-title: Measurement doi: 10.1016/j.measurement.2017.12.014 – volume: 5 start-page: 32 issue: 6 year: 2007 ident: 10.1016/j.measurement.2020.107827_b0065 article-title: Security strength measurement for dongle-protected software publication-title: IEEE Security Privacy doi: 10.1109/MSP.2007.176 – volume: 78 start-page: 171 issue: 3 year: 1988 ident: 10.1016/j.measurement.2020.107827_b0135 article-title: A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases publication-title: Inf. Comput. doi: 10.1016/0890-5401(88)90024-7 – volume: 59 start-page: bxw008 issue: 7 year: 2016 ident: 10.1016/j.measurement.2020.107827_b0115 article-title: Very small fpga processor for multivariate signatures publication-title: Comput. J. doi: 10.1093/comjnl/bxw008 – ident: 10.1016/j.measurement.2020.107827_b0145 doi: 10.1109/TVLSI.2010.2051343 – ident: 10.1016/j.measurement.2020.107827_b0160 doi: 10.1109/ARITH.2001.930105 – volume: 56 start-page: 39 issue: 5 year: 2018 ident: 10.1016/j.measurement.2020.107827_b0055 article-title: Mobile edge computing and networking for green and low-latency internet of things publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2018.1700882 – volume: 43 issue: 8 year: 2019 ident: 10.1016/j.measurement.2020.107827_b0085 article-title: An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for iot health care system publication-title: J. Med. Syst. doi: 10.1007/s10916-019-1378-2 – ident: 10.1016/j.measurement.2020.107827_b0130 doi: 10.1109/ITCC.2005.8 – volume: 45 start-page: 1695 issue: 7 year: 2012 ident: 10.1016/j.measurement.2020.107827_b0020 article-title: Optical fiber sensors for static and dynamic health monitoring of civil engineering infrastructures: Abode wall case study publication-title: Measurement doi: 10.1016/j.measurement.2012.04.018 – ident: 10.1016/j.measurement.2020.107827_b0010 doi: 10.1016/j.measurement.2016.06.014 – ident: 10.1016/j.measurement.2020.107827_b0110 doi: 10.1109/MSP.2017.3151328 – ident: 10.1016/j.measurement.2020.107827_b0165 doi: 10.1109/12.403725 – volume: 73 start-page: 262 year: 2015 ident: 10.1016/j.measurement.2020.107827_b0030 article-title: New preceding vehicle tracking algorithm based on optimal unbiased finite memory filter publication-title: Measurement doi: 10.1016/j.measurement.2015.04.015 – volume: 47 start-page: 558 issue: 1 year: 2014 ident: 10.1016/j.measurement.2020.107827_b0040 article-title: Multilevel thresholding for segmentation of medical brain images using real coded genetic algorithm publication-title: Measurement doi: 10.1016/j.measurement.2013.09.031 – ident: 10.1016/j.measurement.2020.107827_b0060 doi: 10.1016/j.comnet.2004.03.033 |
| SSID | ssj0006396 |
| Score | 2.2655535 |
| Snippet | •Post-quantum security solution based on security measurement.•Systolic architecture of inversion for building post-quantum crypto-system.•Employing... Internet of Things (IoTs) have become one of the most popular techniques and widely used in advanced manufacturing and other engineering areas. As the... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 107827 |
| SubjectTerms | Advanced manufacturing Advanced manufacturing technologies Algorithms Cryptography Cybersecurity Data management Internet of Things Internet of Things (IoTs) Manufacturing Measurement Multivariate analysis Quantum computers Resource management Security measurement Systolic inversion |
| Title | Systolic inversion algorithms for building cryptographic systems based on security measurement in IoT-based advanced manufacturing |
| URI | https://dx.doi.org/10.1016/j.measurement.2020.107827 https://www.proquest.com/docview/2442329674 |
| Volume | 161 |
| WOSCitedRecordID | wos000535957400003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection - Elsevier customDbUrl: eissn: 1873-412X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0006396 issn: 0263-2241 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Bb9MwFLZKB2g7IBigjQ1kJG5RqiZ2GkfiMk2bGIKJQ0HlFNlOMjp1adVk1bjyD_jHPMd24k5MFCQuURX5uXHfF_vz6_P3EHoTEZ5TyqUPq7X0aZyFvsgi7oskzJRkkQibE3JfPsTn52wyST71ej_tWZjVLC5LdnOTLP6rq-EeOFsdnf0Ld7edwg34DE6HK7gdrhs5XmmQK7Ffb1qudDDM47OL-XJaf9PiC54wpbA9ufy-qLVmNbTXos6Vpxa2TP2JUJnadt5VF0hU8ZGz-djXjdoMgiteXqszEs2hR5fwfnRMVfTBUaro8jZtQNJt3BxFVLKgbqbAV11jm0_F3A1XwN7U5mPZWS0cEV_xhrUpWAuym0k0ULQl_u38rkMNlwNn3AP1LYPOZl1T-9Za12Yg2uS2y9TpKlVdpbqre2grjKOE9dHW0dnJ5H27vAOlG-nAnR7HQ_S6Sxq847nuIj23lv-G04wfo0dmM4KPNIieoF5e7qIdR6JyFz1oUoRl9RT9sMDCLbBwBywMwMIWWHgNWNgACzeYwWBmgYWdgUCvuAUWtsDCa8B6hj6fnoyP3_mmgocvCU1qvyAyEJLELA-ACeZCFCIjRcY44yGRsLVnhciLSIihLIBOqeoGGY2AVQlOGRWMPEf9cl7mewiLjAdMkJzKgFA5LNhQjARwYw58t8io3EfM_sSpNPL2qsrKLP2jq_dR2JoutMbLJkZvrR9TQ1Y1CU0Bq5uYH1rfp-bNq1Kg2jBlJqOYvviXRzpA290bd4j69fI6f4nuy1U9rZavDI5_ATMH0fQ |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Systolic+inversion+algorithms+for+building+cryptographic+systems+based+on+security+measurement+in+IoT-based+advanced+manufacturing&rft.jtitle=Measurement+%3A+journal+of+the+International+Measurement+Confederation&rft.au=Yi%2C+Haibo&rft.date=2020-09-01&rft.issn=0263-2241&rft.volume=161&rft.spage=107827&rft_id=info:doi/10.1016%2Fj.measurement.2020.107827&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_measurement_2020_107827 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0263-2241&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0263-2241&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0263-2241&client=summon |