{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:41:07Z","timestamp":1743068467962,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030666255"},{"type":"electronic","value":"9783030666262"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-66626-2_11","type":"book-chapter","created":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T21:03:51Z","timestamp":1608584631000},"page":"208-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cryptographically Secure Multi-tenant Provisioning of FPGAs"],"prefix":"10.1007","author":[{"given":"Arnab","family":"Bag","sequence":"first","affiliation":[]},{"given":"Sikhar","family":"Patranabis","sequence":"additional","affiliation":[]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"11_CR1","unstructured":"Nvidia Inc. GRID GPUs"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Arasu, A., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: A secure coprocessor for database applications. In: 2013 23rd International Conference on Field Programmable Logic and Applications (FPL), pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/FPL.2013.6645524"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Azarderakhsh, R., Reyhani-Masoleh, A.: Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 20(8), 1453\u20131466 (2012)","DOI":"10.1109\/TVLSI.2011.2158595"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"Selected Areas in Cryptography","author":"PSLM Barreto","year":"2006","unstructured":"Barreto, P.S.L.M., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 319\u2013331. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11693383_22"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-33481-8_9","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Lange, T., Schwabe, P.: The security impact of a new cryptographic library. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 159\u2013176. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33481-8_9"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Chen, F., Shan, Y., Zhang, Y., Wang, Y., Franke, H., Chang, X., Wang, K.: Enabling FPGAs in the cloud. In: Proceedings of the 11th ACM Conference on Computing Frontiers, p. 3. ACMD (2014)","DOI":"10.1145\/2597917.2597929"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Duursma, I., Lee, H.S.: Tate pairing implementation for hyperelliptic curves y$$\\hat{}$$ 2= x$$\\hat{}$$ p-x+ d. In: ASIACRYPT, vol. 2894, pp. 111\u2013123. Springer (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_7","DOI":"10.1007\/978-3-540-40061-5_7"},{"key":"11_CR8","unstructured":"Freund, K.: Amazon\u2019s Xilinx FPGA Cloud: Why This May Be A Significant Milestone (2016)"},{"issue":"5","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G Frey","year":"1999","unstructured":"Frey, G., Muller, M., Ruck, H.G.: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inf. Theory 45(5), 1717\u20131719 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74735-2_5"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-11379-1_15","volume-title":"Research in Attacks, Intrusions and Defenses","author":"G Irazoqui","year":"2014","unstructured":"Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! a fast, cross-VM attack on AES. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 299\u2013319. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11379-1_15"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Johansson, K.H., T\u00f6rngren, M., Nielsen, L.: Vehicle applications of controller area network. In: Hristu-Varsakelis, D., Levine, W.S. (eds.) Handbook of Networked and Embedded Control Systems, pp. 741\u2013765 (2005). https:\/\/doi.org\/10.1007\/0-8176-4404-0_32","DOI":"10.1007\/0-8176-4404-0_32"},{"issue":"4","key":"11_CR13","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A Joux","year":"2004","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. J. Cryptol. 17(4), 263\u2013276 (2004). https:\/\/doi.org\/10.1007\/s00145-004-0312-y","journal-title":"J. Cryptol."},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s10623-015-0147-6","volume":"78","author":"A Joux","year":"2016","unstructured":"Joux, A., Pierrot, C.: Technical history of discrete logarithms in small characteristic finite fields - the road from subexponential to quasi-polynomial complexity. Des. Codes Cryptograph. 78(1), 73\u201385 (2016). https:\/\/doi.org\/10.1007\/s10623-015-0147-6","journal-title":"Des. Codes Cryptograph."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Joux, A., Vitse, V.: Elliptic curve discrete logarithm problem over small degree extension fields. Application to the static Diffie-Hellman problem on E(Fq5) (2010)","DOI":"10.1007\/s00145-011-9116-z"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Kean, T.: Cryptographic rights management of FPGA intellectual property cores. In: Proceedings of the 2002 ACM\/SIGDA Tenth International Symposium on FIeld-programmable Gate Arrays, pp. 113\u2013118. ACM (2002)","DOI":"10.1145\/503048.503065"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/11545262_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"T Kerins","year":"2005","unstructured":"Kerins, T., Marnane, W.P., Popovici, E.M., Barreto, P.S.L.M.: Efficient hardware for the tate pairing calculation in characteristic three. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 412\u2013426. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_30"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kirchgessner, R., Stitt, G., George, A., Lam, H.: VirtualRC: a virtual FPGA platform for applications and tools portability. In: Proceedings of the ACM\/SIGDA International Symposium on Field Programmable Gate Arrays, pp. 205\u2013208. ACM (2012)","DOI":"10.1145\/2145694.2145728"},{"issue":"177","key":"11_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Krautter, J., Gnad, D.R., Schellenberg, F., Moradi, A., Tahoori, M.B.: Active fences against voltage-based side channels in multi-tenant FPGAS. IACR Cryptol. ePrint Arch 2019:1152 (2019)","DOI":"10.1109\/ICCAD45719.2019.8942094"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Lie, W., Feng-Yan, W.: Dynamic partial reconfiguration in FPGAs. In: 2009 Third International Symposium on Intelligent Information Technology Application, IITA 2009, vol. 2, pp. 445\u2013448. IEEE (2009)","DOI":"10.1109\/IITA.2009.334"},{"key":"11_CR22","unstructured":"Longa, P., Miri, A.: New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version). IACR Cryptology ePrint Archive 2008:52 (2008)"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1023\/A:1023252403567","volume":"34","author":"M McLoone","year":"2003","unstructured":"McLoone, M., McCanny, J.V.: Rijndael FPGA implementations utilizing look-up tables. J. VLSI Signal Process. Syst. Signal Image Video Technol. 34(3), 261\u2013275 (2003)","journal-title":"J. VLSI Signal Process. Syst. Signal Image Video Technol."},{"issue":"4","key":"11_CR24","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s00145-004-0315-8","volume":"17","author":"VS Miller","year":"2004","unstructured":"Miller, V.S.: The Weil pairing, and its efficient calculation. J. Cryptol. 17(4), 235\u2013261 (2004)","journal-title":"J. Cryptol."},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Mukhopadhyay, D., Roy, D.B.: Revisiting FPGA implementation of montgomery multiplier in redundant number system for efficient ECC application in GF (p). In: 2018 28th International Conference on Field Programmable Logic and Applications (FPL), pp. 323\u20133233. IEEE (2018)","DOI":"10.1109\/FPL.2018.00061"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Oliveira, L.B., Aranha, D.F., Morais, E., Daguano, F., L\u00f3pez, J., Dahab, R.: Tinytate: computing the Tate pairing in resource-constrained sensor nodes. In: Sixth IEEE International Symposium on Network Computing and Applications, 2007. NCA 2007, pp. 318\u2013323, IEEE (2007)","DOI":"10.1109\/NCA.2007.48"},{"key":"11_CR27","first-page":"20","volume":"3","author":"F Opitz","year":"2012","unstructured":"Opitz, F., Sahak, E., Schwarz, B.: Accelerating distributed computing with FPGAs. Xcell J. 3, 20\u201327 (2012)","journal-title":"Xcell J."},{"issue":"11","key":"11_CR28","first-page":"1","volume":"2","author":"K Ovtcharov","year":"2015","unstructured":"Ovtcharov, K., Ruwase, O., Kim, J.Y., Fowers, J., Strauss, K., Chung, E.S.: Accelerating deep convolutional neural networks using specialized hardware. Microsoft Res. Whitepaper 2(11), 1\u20134 (2015)","journal-title":"Microsoft Res. Whitepaper"},{"issue":"5","key":"11_CR29","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TC.2016.2629510","volume":"66","author":"S Patranabis","year":"2017","unstructured":"Patranabis, S., Shrivastava, Y., Mukhopadhyay, D.: Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud. IEEE Trans. Comput. 66(5), 891\u2013904 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Provelengios, G., Holcomb, D., Tessier, R.: Characterizing power distribution attacks in multi-user FPGA environments. In: 2019 29th International Conference on Field Programmable Logic and Applications (FPL), pp. 194\u2013201. IEEE (2019)","DOI":"10.1109\/FPL.2019.00038"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199\u2013212. ACM (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-44709-1_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2001","author":"A Rudra","year":"2001","unstructured":"Rudra, A., Dubey, P.K., Jutla, C.S., Kumar, V., Rao, J.R., Rohatgi, P.: Efficient Rijndael encryption implementation with composite field arithmetic. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 171\u2013184. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_16"},{"key":"11_CR33","unstructured":"Shu, C., Gaj, K., El-Ghazawi, T.: Low latency elliptic curve cryptography accelerators for NIST curves over binary fields. In: Proceedings of the 2005 IEEE International Conference on. Field-Programmable Technology, 2005, pp. 309\u2013310. IEEE (2005)"},{"issue":"2","key":"11_CR34","first-page":"14","volume":"7","author":"HKH So","year":"2008","unstructured":"So, H.K.H., Brodersen, R.: A unified hardware\/software runtime environment for FPGA-based reconfigurable computers using BORPH. ACM Trans. Embed. Comput. Syst. (TECS) 7(2), 14 (2008)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"11_CR35","doi-asserted-by":"publisher","unstructured":"Ueno, R., Homma, N., Sugawara, Y., Nogami, Y., Aoki, T.: Highly efficient GF (2$$\\hat{}$$8) g f (2 8) inversion circuit based on redundant GF arithmetic and its application to AES design. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 63\u201380. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_4","DOI":"10.1007\/978-3-662-48324-4_4"},{"issue":"1","key":"11_CR36","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TIT.2009.2034881","volume":"56","author":"F Vercauteren","year":"2009","unstructured":"Vercauteren, F.: Optimal pairings. IEEE Trans. Inf. Theory 56(1), 455\u2013461 (2009)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66626-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:49:02Z","timestamp":1710269342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-66626-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030666255","9783030666262"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66626-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cse.iitkgp.ac.in\/conf\/SPACE2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}