{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:47:57Z","timestamp":1757544477653,"version":"3.40.5"},"reference-count":26,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"MSIT(Ministry of Science and ICT) of Korea","award":["IITP-2019-2018- 0-01799"],"award-info":[{"award-number":["IITP-2019-2018- 0-01799"]}]},{"DOI":"10.13039\/501100002460","name":"Chung-Ang University","doi-asserted-by":"publisher","award":["Graduate Research Scholarship in 2018"],"award-info":[{"award-number":["Graduate Research Scholarship in 2018"]}],"id":[{"id":"10.13039\/501100002460","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p> Recently, cyber-physical system is widely used for smart system control in various fields. Various functions of the cyber-physical system must overcome the limited hardware resources constraint of an embedded system. In addition, the data required from the industrial cyber-physical system are critical; therefore, a highly secure encryption technique is required. However, security and computational throughput are incompatible with each other in the cryptographic technique; therefore, the industrial cyber-physical system needs to adopt a highly efficient and secure encryption technique considering the limited available resources. This study applies the m-folding method to the highly secure elliptic curve algorithm to improve efficiency and proposes the cryptosystem optimized for the resource-constrained industrial cyber-physical system. The proposed m-folding method\u2013based elliptic curve encryption showed 50% faster encryption than the existing methods. <\/jats:p>","DOI":"10.1177\/1550147719879045","type":"journal-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T01:58:22Z","timestamp":1570672702000},"page":"155014771987904","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["M-folding method\u2013based elliptic curve cryptosystem for industrial cyber-physical system"],"prefix":"10.1177","volume":"15","author":[{"given":"Taehoon","family":"Do","sequence":"first","affiliation":[{"name":"Korea Securities Computer Corporation (KOSCOM), Seoul, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7480-1589","authenticated-orcid":false,"given":"Seungwoo","family":"Park","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chung-Ang University, Seoul, Korea"}]},{"given":"Jaehwan","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chung-Ang University, Seoul, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1832-3532","authenticated-orcid":false,"given":"Sangoh","family":"Park","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chung-Ang University, Seoul, Korea"}]}],"member":"179","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"first-page":"363","volume-title":"Proceedings of the 2008 11th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC)","author":"Lee EA","key":"bibr1-1550147719879045"},{"key":"bibr2-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1382"},{"key":"bibr3-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"volume-title":"Introduction to embedded systems: a cyber-physical systems approach","year":"2016","author":"Lee EA","key":"bibr4-1550147719879045"},{"key":"bibr5-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.047"},{"key":"bibr6-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.1731058"},{"key":"bibr7-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3176967"},{"key":"bibr8-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"bibr9-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"issue":"3","key":"bibr10-1550147719879045","first-page":"60","volume":"11","author":"Kumar Y","year":"2011","journal-title":"Int J Comput Sci Manag Stud"},{"key":"bibr11-1550147719879045","first-page":"1989","volume-title":"Proceedings of the 2005 IEEE 16th international symposium on personal, indoor and mobile radio communications","volume":"3","author":"Lee Y"},{"key":"bibr12-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015INI0003"},{"key":"bibr13-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"first-page":"403","volume-title":"Proceedings of the annual international conference on the theory and applications of cryptographic techniques","author":"Renes J","key":"bibr14-1550147719879045"},{"first-page":"386","volume-title":"Proceedings of the 2011 IEEE international conference on RFID-technologies and applications","author":"Godor G","key":"bibr16-1550147719879045"},{"key":"bibr17-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"issue":"3","key":"bibr18-1550147719879045","first-page":"401","volume":"13","author":"Kocabas O","year":"2016","journal-title":"IEEE-ACM T Comput Bi"},{"first-page":"430","volume-title":"Proceedings of the 2013 eighth international conference on P2P, parallel, grid, cloud and internet computing","author":"Barbareschi M","key":"bibr19-1550147719879045"},{"key":"bibr20-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2876226"},{"key":"bibr21-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.133"},{"key":"bibr22-1550147719879045","first-page":"338","volume":"2011","author":"Rivain M","year":"2011","journal-title":"IACR Cryptol ePrint Arch"},{"key":"bibr23-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2016.03.006"},{"key":"bibr24-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.02.016"},{"first-page":"25","volume-title":"Proceedings of the third workshop on cryptography and security in computing systems","author":"Azarderakhsh R","key":"bibr25-1550147719879045"},{"key":"bibr26-1550147719879045","first-page":"31","volume":"18","author":"Rasmi M","year":"2016","journal-title":"IOSR J Comput Eng"},{"key":"bibr27-1550147719879045","doi-asserted-by":"publisher","DOI":"10.1002\/sec.359"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719879045","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719879045","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719879045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T01:58:27Z","timestamp":1570672707000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719879045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2019,10,9]]},"published-print":{"date-parts":[[2019,10]]}},"alternative-id":["10.1177\/1550147719879045"],"URL":"https:\/\/doi.org\/10.1177\/1550147719879045","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}