{"id":"https://openalex.org/W2094988919","doi":"https://doi.org/10.1145/2831347.2831350","title":"Making the Case for Elliptic Curves in DNSSEC","display_name":"Making the Case for Elliptic Curves in DNSSEC","publication_year":2015,"publication_date":"2015-09-30","ids":{"openalex":"https://openalex.org/W2094988919","doi":"https://doi.org/10.1145/2831347.2831350","mag":"2094988919"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2831347.2831350","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/6412753/p13-rijswijk-deij.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091643049","display_name":"Roland van Rijswijk-Deij","orcid":"https://orcid.org/0000-0002-0249-8776"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"funder","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Roland van Rijswijk-Deij","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025537461","display_name":"Anna Sperotto","orcid":"https://orcid.org/0000-0002-9481-5846"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"funder","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Anna Sperotto","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"funder","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["University of Twente, Enschede, Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.945,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":20,"citation_normalized_percentile":{"value":0.869875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":91},"biblio":{"volume":"45","issue":"5","first_page":"13","last_page":"19"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9957,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.69491744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6494236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6257238},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.62204885},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30757996},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1531198}],"mesh":[],"locations_count":3,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2831347.2831350","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/6412753/p13-rijswijk-deij.pdf","pdf_url":"https://ris.utwente.nl/ws/files/6412753/p13-rijswijk-deij.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/2731863f-9980-4c2c-a5c2-46728e31f2c8","pdf_url":"https://research.utwente.nl/files/6412753/p13-rijswijk-deij.pdf","source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":["Royal Netherlands Academy of Arts and Sciences"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://ris.utwente.nl/ws/files/6412753/p13-rijswijk-deij.pdf","pdf_url":"https://ris.utwente.nl/ws/files/6412753/p13-rijswijk-deij.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.77,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":14,"referenced_works":["https://openalex.org/W1880212920","https://openalex.org/W2028110717","https://openalex.org/W2037107113","https://openalex.org/W2064785354","https://openalex.org/W2159476783","https://openalex.org/W2167212639","https://openalex.org/W2170249832","https://openalex.org/W2479056090","https://openalex.org/W2594894582","https://openalex.org/W2625329361","https://openalex.org/W2951379724","https://openalex.org/W3000798194","https://openalex.org/W3021749848","https://openalex.org/W4237374172"],"related_works":["https://openalex.org/W4226182343","https://openalex.org/W3213981908","https://openalex.org/W3201596224","https://openalex.org/W3191743943","https://openalex.org/W2782833818","https://openalex.org/W2393578887","https://openalex.org/W2332531239","https://openalex.org/W2260005205","https://openalex.org/W1990743860","https://openalex.org/W1565266559"],"abstract_inverted_index":{"The":[0],"Domain":[1],"Name":[2],"System":[3],"Security":[4],"Extensions":[5],"(DNSSEC)":[6],"add":[7],"authenticity":[8],"and":[9,46,69,105],"integrity":[10],"to":[11,27,43,52,71,139],"the":[12,28,32,80,141],"DNS,":[13,29],"improving":[14],"its":[15],"security.":[16],"Unfortunately,":[17],"DNSSEC":[18,23,39,48,67,88],"is":[19,40,89],"not":[20],"without":[21],"problems.":[22,96],"adds":[24],"digital":[25],"signatures":[26],"significantly":[30],"increasing":[31],"size":[33],"of":[34,143],"DNS":[35],"responses.":[36],"This":[37,65],"means":[38],"more":[41],"susceptible":[42],"packet":[44],"fragmentation":[45],"makes":[47,66],"an":[49],"attractive":[50,120],"vector":[51],"abuse":[53],"in":[54,87,93,112,123,150],"amplification-based":[55],"denial-of-service":[56],"attacks.":[57],"Additionally,":[58],"key":[59],"management":[60],"policies":[61],"are":[62,109,118],"often":[63],"complex.":[64],"fragile":[68],"leads":[70],"operational":[72],"failures.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77,133],"argue":[78],"that":[79,116,137],"choice":[81],"for":[82,121],"RSA":[83],"as":[84],"default":[85],"cryptosystem":[86],"a":[90,147],"major":[91],"factor":[92],"these":[94,117],"three":[95],"Alternative":[97],"cryptosystems,":[98],"based":[99],"on":[100],"elliptic":[101],"curve":[102],"cryptography":[103],"(ECDSA":[104],"EdDSA),":[106],"exist":[107],"but":[108],"rarely":[110],"used":[111],"DNSSEC.":[113,151],"We":[114],"show":[115],"highly":[119],"use":[122],"DNSSEC,":[124],"although":[125],"they":[126],"also":[127],"have":[128,134],"disadvantages.":[129],"To":[130],"address":[131],"these,":[132],"initiated":[135],"research":[136],"aims":[138],"investigate":[140],"viability":[142],"deploying":[144],"ECC":[145],"at":[146],"large":[148],"scale":[149]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2094988919","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4}],"updated_date":"2025-04-16T17:44:14.380895","created_date":"2016-06-24"}