FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.5281/zenodo.5711179
Implantable medical devices, sensors and wearables are widely deployed today. However, establishing a secure wireless communication channel to these devices is a major challenge, amongst others due to the constraints on energy consumption and the need to obtain immediate access in emergencies. To address this issue, researchers have proposed various key agreement protocols based on the measurement of physiological signals such as a person's heart signal. At the core of such protocols are fuzzy cryptographic primitives that allow to agree on a shared secret based on several simultaneous, noisy measurements of the same signal. So far, although many fuzzy primitives have been proposed, there is no comprehensive evaluation and comparison yet of the overhead that such methods incur on resource-constrained embedded devices. In this paper, we study the feasibility of six types of fuzzy cryptographic primitives on embedded devices for 128-bit key agreement. We configure several variants for each fuzzy primitive under different parameter selections and mismatch rates of the physiological signal measurements on an MSP430 microcontroller, and then measure and compare their energy consumption and communication overhead. The most efficient constructions consume between 0.021 mJ and 0.198 mJ for the transmitter and between 0.029 mJ and 0.380 mJ for the receiver under different mismatch rates. Subsequently, we modify the best performing methods so that they run in constant time to protect against timing side-channel attacks, and observe that these changes only minimally affect resource consumption. Finally, we provide open-source implementations and energy consumption data of each fuzzy primitive as a reference for real-world designs.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://eprint.iacr.org/2021/1326.pdf
- OA Status
- green
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3202250883
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3202250883Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.5281/zenodo.5711179Digital Object Identifier
- Title
-
FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained DevicesWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-10-01Full publication date if available
- Authors
-
Mo Zhang, Eduard Marin, David Oswald, Dave SingeléeList of authors in order
- Landing page
-
https://eprint.iacr.org/2021/1326.pdfPublisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.5281/zenodo.5711179Direct OA link when available
- Concepts
-
Computer science, Cryptographic primitive, Cryptography, Fuzzy logic, Cryptographic protocol, Resource (disambiguation), Theoretical computer science, Computer security, Computer network, Artificial intelligenceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3202250883 |
|---|---|
| doi | https://doi.org/10.5281/zenodo.5711179 |
| ids.doi | https://doi.org/10.5281/zenodo.5711180 |
| ids.mag | 3202250883 |
| ids.openalex | https://openalex.org/W3202250883 |
| fwci | 0.0 |
| type | preprint |
| title | FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices |
| biblio.issue | |
| biblio.volume | 2021 |
| biblio.last_page | |
| biblio.first_page | 1326 |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9980000257492065 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9968000054359436 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T10237 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9894999861717224 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Cryptography and Data Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7706322073936462 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C15927051 |
| concepts[1].level | 4 |
| concepts[1].score | 0.7624003887176514 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q246593 |
| concepts[1].display_name | Cryptographic primitive |
| concepts[2].id | https://openalex.org/C178489894 |
| concepts[2].level | 2 |
| concepts[2].score | 0.6728094816207886 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[2].display_name | Cryptography |
| concepts[3].id | https://openalex.org/C58166 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6422372460365295 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q224821 |
| concepts[3].display_name | Fuzzy logic |
| concepts[4].id | https://openalex.org/C33884865 |
| concepts[4].level | 3 |
| concepts[4].score | 0.4958542287349701 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1254335 |
| concepts[4].display_name | Cryptographic protocol |
| concepts[5].id | https://openalex.org/C206345919 |
| concepts[5].level | 2 |
| concepts[5].score | 0.45759421586990356 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q20380951 |
| concepts[5].display_name | Resource (disambiguation) |
| concepts[6].id | https://openalex.org/C80444323 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4122791886329651 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[6].display_name | Theoretical computer science |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3066507577896118 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C31258907 |
| concepts[8].level | 1 |
| concepts[8].score | 0.1833948791027069 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[8].display_name | Computer network |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.1567826271057129 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7706322073936462 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cryptographic-primitive |
| keywords[1].score | 0.7624003887176514 |
| keywords[1].display_name | Cryptographic primitive |
| keywords[2].id | https://openalex.org/keywords/cryptography |
| keywords[2].score | 0.6728094816207886 |
| keywords[2].display_name | Cryptography |
| keywords[3].id | https://openalex.org/keywords/fuzzy-logic |
| keywords[3].score | 0.6422372460365295 |
| keywords[3].display_name | Fuzzy logic |
| keywords[4].id | https://openalex.org/keywords/cryptographic-protocol |
| keywords[4].score | 0.4958542287349701 |
| keywords[4].display_name | Cryptographic protocol |
| keywords[5].id | https://openalex.org/keywords/resource |
| keywords[5].score | 0.45759421586990356 |
| keywords[5].display_name | Resource (disambiguation) |
| keywords[6].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[6].score | 0.4122791886329651 |
| keywords[6].display_name | Theoretical computer science |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.3066507577896118 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/computer-network |
| keywords[8].score | 0.1833948791027069 |
| keywords[8].display_name | Computer network |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.1567826271057129 |
| keywords[9].display_name | Artificial intelligence |
| language | en |
| locations[0].id | mag:3202250883 |
| locations[0].is_oa | False |
| locations[0].source.id | https://openalex.org/S2764847869 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | IACR Cryptology ePrint Archive |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].source.host_organization_lineage | https://openalex.org/P4322614454 |
| locations[0].source.host_organization_lineage_names | Cryptology ePrint Archive |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | IACR Cryptology ePrint Archive |
| locations[0].landing_page_url | https://eprint.iacr.org/2021/1326.pdf |
| locations[1].id | doi:10.5281/zenodo.5711179 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400562 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[1].source.host_organization | https://openalex.org/I67311998 |
| locations[1].source.host_organization_name | European Organization for Nuclear Research |
| locations[1].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.5281/zenodo.5711179 |
| locations[2].id | doi:10.5281/zenodo.5711180 |
| locations[2].is_oa | True |
| locations[2].source.id | https://openalex.org/S4306400562 |
| locations[2].source.issn | |
| locations[2].source.type | repository |
| locations[2].source.is_oa | True |
| locations[2].source.issn_l | |
| locations[2].source.is_core | False |
| locations[2].source.is_in_doaj | False |
| locations[2].source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| locations[2].source.host_organization | https://openalex.org/I67311998 |
| locations[2].source.host_organization_name | European Organization for Nuclear Research |
| locations[2].source.host_organization_lineage | https://openalex.org/I67311998 |
| locations[2].license | cc-by |
| locations[2].pdf_url | |
| locations[2].version | |
| locations[2].raw_type | |
| locations[2].license_id | https://openalex.org/licenses/cc-by |
| locations[2].is_accepted | False |
| locations[2].is_published | |
| locations[2].raw_source_name | |
| locations[2].landing_page_url | https://doi.org/10.5281/zenodo.5711180 |
| indexed_in | datacite |
| authorships[0].author.id | https://openalex.org/A5100660677 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5514-232X |
| authorships[0].author.display_name | Mo Zhang |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mo Zhang |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5056871782 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-5002-0187 |
| authorships[1].author.display_name | Eduard Marin |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Eduard Marin |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5080836958 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-8524-5282 |
| authorships[2].author.display_name | David Oswald |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | David F. Oswald |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5009111901 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-9084-698X |
| authorships[3].author.display_name | Dave Singelée |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Dave Singelée |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.5281/zenodo.5711179 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9980000257492065 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W3200283142, https://openalex.org/W3044417149, https://openalex.org/W2934097766, https://openalex.org/W50674023, https://openalex.org/W2971459948, https://openalex.org/W3084397815, https://openalex.org/W89505464, https://openalex.org/W2065995359, https://openalex.org/W2268780197, https://openalex.org/W2923824559, https://openalex.org/W2267598880, https://openalex.org/W2153662813, https://openalex.org/W1553223535, https://openalex.org/W2167299856, https://openalex.org/W2586438487, https://openalex.org/W2396042695, https://openalex.org/W3203211445, https://openalex.org/W2985603412, https://openalex.org/W2100040882, https://openalex.org/W3101748420 |
| cited_by_count | 0 |
| locations_count | 3 |
| best_oa_location.id | doi:10.5281/zenodo.5711179 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400562 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Zenodo (CERN European Organization for Nuclear Research) |
| best_oa_location.source.host_organization | https://openalex.org/I67311998 |
| best_oa_location.source.host_organization_name | European Organization for Nuclear Research |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I67311998 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | |
| best_oa_location.raw_type | |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.5281/zenodo.5711179 |
| primary_location.id | mag:3202250883 |
| primary_location.is_oa | False |
| primary_location.source.id | https://openalex.org/S2764847869 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | IACR Cryptology ePrint Archive |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.source.host_organization_lineage | https://openalex.org/P4322614454 |
| primary_location.source.host_organization_lineage_names | Cryptology ePrint Archive |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | IACR Cryptology ePrint Archive |
| primary_location.landing_page_url | https://eprint.iacr.org/2021/1326.pdf |
| publication_date | 2021-10-01 |
| publication_year | 2021 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 12, 21, 62, 81, 250 |
| abstract_inverted_index.At | 66 |
| abstract_inverted_index.In | 122 |
| abstract_inverted_index.So | 94 |
| abstract_inverted_index.To | 42 |
| abstract_inverted_index.We | 143 |
| abstract_inverted_index.an | 164 |
| abstract_inverted_index.as | 61, 249 |
| abstract_inverted_index.in | 40, 217 |
| abstract_inverted_index.is | 20, 104 |
| abstract_inverted_index.mJ | 185, 188, 195, 198 |
| abstract_inverted_index.no | 105 |
| abstract_inverted_index.of | 57, 69, 90, 111, 129, 132, 158, 245 |
| abstract_inverted_index.on | 30, 54, 80, 85, 118, 136, 163 |
| abstract_inverted_index.so | 213 |
| abstract_inverted_index.to | 17, 27, 36, 78, 220 |
| abstract_inverted_index.we | 125, 207, 237 |
| abstract_inverted_index.The | 178 |
| abstract_inverted_index.and | 4, 33, 108, 155, 167, 170, 175, 186, 192, 196, 226, 241 |
| abstract_inverted_index.are | 6, 72 |
| abstract_inverted_index.due | 26 |
| abstract_inverted_index.for | 139, 147, 189, 199, 252 |
| abstract_inverted_index.key | 50, 141 |
| abstract_inverted_index.run | 216 |
| abstract_inverted_index.six | 130 |
| abstract_inverted_index.the | 28, 34, 55, 67, 91, 112, 127, 159, 190, 200, 209 |
| abstract_inverted_index.yet | 110 |
| abstract_inverted_index.been | 101 |
| abstract_inverted_index.best | 210 |
| abstract_inverted_index.core | 68 |
| abstract_inverted_index.data | 244 |
| abstract_inverted_index.each | 148, 246 |
| abstract_inverted_index.far, | 95 |
| abstract_inverted_index.have | 47, 100 |
| abstract_inverted_index.many | 97 |
| abstract_inverted_index.most | 179 |
| abstract_inverted_index.need | 35 |
| abstract_inverted_index.only | 231 |
| abstract_inverted_index.same | 92 |
| abstract_inverted_index.such | 60, 70, 115 |
| abstract_inverted_index.that | 76, 114, 214, 228 |
| abstract_inverted_index.then | 168 |
| abstract_inverted_index.they | 215 |
| abstract_inverted_index.this | 44, 123 |
| abstract_inverted_index.time | 219 |
| abstract_inverted_index.0.021 | 184 |
| abstract_inverted_index.0.029 | 194 |
| abstract_inverted_index.0.198 | 187 |
| abstract_inverted_index.0.380 | 197 |
| abstract_inverted_index.agree | 79 |
| abstract_inverted_index.allow | 77 |
| abstract_inverted_index.based | 53, 84 |
| abstract_inverted_index.fuzzy | 73, 98, 133, 149, 247 |
| abstract_inverted_index.heart | 64 |
| abstract_inverted_index.incur | 117 |
| abstract_inverted_index.major | 22 |
| abstract_inverted_index.noisy | 88 |
| abstract_inverted_index.rates | 157 |
| abstract_inverted_index.study | 126 |
| abstract_inverted_index.their | 172 |
| abstract_inverted_index.there | 103 |
| abstract_inverted_index.these | 18, 229 |
| abstract_inverted_index.types | 131 |
| abstract_inverted_index.under | 151, 202 |
| abstract_inverted_index.MSP430 | 165 |
| abstract_inverted_index.access | 39 |
| abstract_inverted_index.affect | 233 |
| abstract_inverted_index.energy | 31, 173, 242 |
| abstract_inverted_index.issue, | 45 |
| abstract_inverted_index.modify | 208 |
| abstract_inverted_index.obtain | 37 |
| abstract_inverted_index.others | 25 |
| abstract_inverted_index.paper, | 124 |
| abstract_inverted_index.rates. | 205 |
| abstract_inverted_index.secret | 83 |
| abstract_inverted_index.secure | 13 |
| abstract_inverted_index.shared | 82 |
| abstract_inverted_index.signal | 161 |
| abstract_inverted_index.timing | 223 |
| abstract_inverted_index.today. | 9 |
| abstract_inverted_index.widely | 7 |
| abstract_inverted_index.128-bit | 140 |
| abstract_inverted_index.address | 43 |
| abstract_inverted_index.against | 222 |
| abstract_inverted_index.amongst | 24 |
| abstract_inverted_index.between | 183, 193 |
| abstract_inverted_index.changes | 230 |
| abstract_inverted_index.channel | 16 |
| abstract_inverted_index.compare | 171 |
| abstract_inverted_index.consume | 182 |
| abstract_inverted_index.devices | 19, 138 |
| abstract_inverted_index.measure | 169 |
| abstract_inverted_index.medical | 1 |
| abstract_inverted_index.methods | 116, 212 |
| abstract_inverted_index.observe | 227 |
| abstract_inverted_index.protect | 221 |
| abstract_inverted_index.provide | 238 |
| abstract_inverted_index.sensors | 3 |
| abstract_inverted_index.several | 86, 145 |
| abstract_inverted_index.signal. | 65, 93 |
| abstract_inverted_index.signals | 59 |
| abstract_inverted_index.various | 49 |
| abstract_inverted_index.Finally, | 236 |
| abstract_inverted_index.However, | 10 |
| abstract_inverted_index.although | 96 |
| abstract_inverted_index.attacks, | 225 |
| abstract_inverted_index.constant | 218 |
| abstract_inverted_index.deployed | 8 |
| abstract_inverted_index.designs. | 254 |
| abstract_inverted_index.devices, | 2 |
| abstract_inverted_index.devices. | 121 |
| abstract_inverted_index.embedded | 120, 137 |
| abstract_inverted_index.mismatch | 156, 204 |
| abstract_inverted_index.overhead | 113 |
| abstract_inverted_index.person's | 63 |
| abstract_inverted_index.proposed | 48 |
| abstract_inverted_index.receiver | 201 |
| abstract_inverted_index.resource | 234 |
| abstract_inverted_index.variants | 146 |
| abstract_inverted_index.wireless | 14 |
| abstract_inverted_index.agreement | 51 |
| abstract_inverted_index.configure | 144 |
| abstract_inverted_index.different | 152, 203 |
| abstract_inverted_index.efficient | 180 |
| abstract_inverted_index.immediate | 38 |
| abstract_inverted_index.minimally | 232 |
| abstract_inverted_index.overhead. | 177 |
| abstract_inverted_index.parameter | 153 |
| abstract_inverted_index.primitive | 150, 248 |
| abstract_inverted_index.proposed, | 102 |
| abstract_inverted_index.protocols | 52, 71 |
| abstract_inverted_index.reference | 251 |
| abstract_inverted_index.wearables | 5 |
| abstract_inverted_index.agreement. | 142 |
| abstract_inverted_index.challenge, | 23 |
| abstract_inverted_index.comparison | 109 |
| abstract_inverted_index.evaluation | 107 |
| abstract_inverted_index.performing | 211 |
| abstract_inverted_index.primitives | 75, 99, 135 |
| abstract_inverted_index.real-world | 253 |
| abstract_inverted_index.selections | 154 |
| abstract_inverted_index.Implantable | 0 |
| abstract_inverted_index.constraints | 29 |
| abstract_inverted_index.consumption | 32, 174, 243 |
| abstract_inverted_index.feasibility | 128 |
| abstract_inverted_index.measurement | 56 |
| abstract_inverted_index.open-source | 239 |
| abstract_inverted_index.researchers | 46 |
| abstract_inverted_index.transmitter | 191 |
| abstract_inverted_index.consumption. | 235 |
| abstract_inverted_index.emergencies. | 41 |
| abstract_inverted_index.establishing | 11 |
| abstract_inverted_index.measurements | 89, 162 |
| abstract_inverted_index.side-channel | 224 |
| abstract_inverted_index.Subsequently, | 206 |
| abstract_inverted_index.communication | 15, 176 |
| abstract_inverted_index.comprehensive | 106 |
| abstract_inverted_index.constructions | 181 |
| abstract_inverted_index.cryptographic | 74, 134 |
| abstract_inverted_index.physiological | 58, 160 |
| abstract_inverted_index.simultaneous, | 87 |
| abstract_inverted_index.implementations | 240 |
| abstract_inverted_index.microcontroller, | 166 |
| abstract_inverted_index.resource-constrained | 119 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/8 |
| sustainable_development_goals[0].score | 0.46000000834465027 |
| sustainable_development_goals[0].display_name | Decent work and economic growth |
| citation_normalized_percentile.value | 0.11985118 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |