{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:18:07Z","timestamp":1725549487038},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540284741"},{"type":"electronic","value":"9783540319405"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11545262_8","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T10:35:35Z","timestamp":1127817335000},"page":"106-118","source":"Crossref","is-referenced-by-count":12,"title":["Hardware\/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 \u03bcP"],"prefix":"10.1007","author":[{"given":"Lejla","family":"Batina","sequence":"first","affiliation":[]},{"given":"David","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Hodjat","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Dallas semiconductor ds89c420 ultra-high-speed microcontroller, http:\/\/www.maxim-ic.com\/quick_view2.cfm\/qv_pk\/2963","key":"8_CR1"},{"unstructured":"Dalton 8051 processor, http:\/\/www.cs.ucr.edu\/~dalton\/8051\/","key":"8_CR2"},{"unstructured":"GEZEL design environment, http:\/\/www.ee.ucla.edu\/~schaum\/gezel","key":"8_CR3"},{"doi-asserted-by":"crossref","unstructured":"Bakt\u0131r, S., Pelzl, J., Wollinger, T., Sunar, B., Paar, C.: Optimal tower fields for hyperelliptic curve cryptosystems. In: Proceedings of 38th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, USA, November 7-10 (2004)","key":"8_CR4","DOI":"10.1109\/ACSSC.2004.1399187"},{"doi-asserted-by":"crossref","unstructured":"Bertoni, G., Breveglieri, L., Wollinger, T., Paar, C.: Finding optimum parallel coprocessor design for genus 2 hyperelliptic curve cryptosystems. In: Proceedings of ITCC, Las Vegas, Nevada, USA, April 5-7 (2004)","key":"8_CR5","DOI":"10.1109\/ITCC.2004.1286710"},{"unstructured":"Bertoni, G., Breveglieri, L., Wollinger, T., Paar, C.: Hyperelliptic Curve Cryptosystem: What is the Best Parallel Hardware Architecture? In: Embedded Cryptographic Hardware: Design and Security. Nova Science, Bombay (2004)","key":"8_CR6"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/3-540-36400-5_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"N. Boston","year":"2003","unstructured":"Boston, N., Clancy, T., Liow, Y., Webster, J.: Genus two hyperelliptic curve coprocessor. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 400\u2013414. Springer, Heidelberg (2003)"},{"unstructured":"Byramjee, B., Duquesne, S.: Classification of genus 2 curves over $F_{2^n}$ and optimization of their arithmetic. Cryptology ePrint Archive: Report 2004\/107","key":"8_CR8"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45539-6_2","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"P. Gaudry","year":"2000","unstructured":"Gaudry, P.: An algorithm for solving the discrete log problem on hyperelliptic curves. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 19\u201334. Springer, Heidelberg (2000)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"D. Hankerson","year":"2000","unstructured":"Hankerson, D., Hernandez, J.L., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 1\u201324. Springer, Heidelberg (2000)"},{"issue":"6","key":"8_CR12","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1049\/el:19880226","volume":"24","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: Effective recursive algorithm for computing multiplicative inverses in GF(2 m ). Electronics Letters\u00a024(6), 334\u2013335 (1988)","journal-title":"Electronics Letters"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-31815-6_29","volume-title":"Information Security Applications","author":"H. Kim","year":"2005","unstructured":"Kim, H., Wollinger, T., Choi, Y., Chung, K., Paar, C.: Hyperelliptic curve coprocessors on a FPGA. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 360\u2013374. Springer, Heidelberg (2005)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. Math. Comp.\u00a048, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/0-387-34799-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"N. Koblitz","year":"1990","unstructured":"Koblitz, N.: A family of Jacobians suitable for Discrete Log Cryptosystems. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 94\u201399. Springer, Heidelberg (1990)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1007\/978-3-540-30117-2_60","volume-title":"Field Programmable Logic and Application","author":"S. Kumar","year":"2004","unstructured":"Kumar, S., Paar, C.: Reconfigurable instruction set extension for enabling ECC on an 8-bit processor. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 586\u2013595. Springer, Heidelberg (2004)"},{"issue":"5","key":"8_CR17","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00200-004-0154-8","volume":"15","author":"T. Lange","year":"2005","unstructured":"Lange, T.: Formulae for arithmetic on genus 2 hyperelliptic curves. Applicable Algebra in Engineering, Communication and Computing\u00a015(5), 295\u2013328 (2005)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"8_CR18","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"8_CR19","first-page":"155","volume-title":"An elementary introduction to hyperelliptic curves, Algebraic Aspects of Cryptography","author":"A. Menezes","year":"1998","unstructured":"Menezes, A., Wu, Y.-H., Zuccherato, R.: Appendix. In: Koblitz, N. (ed.) An elementary introduction to hyperelliptic curves, Algebraic Aspects of Cryptography, pp. 155\u2013178. Springer, Heidelberg (1998)"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-45238-6_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J. Pelzl","year":"2003","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 351\u2013365. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Paar, C.: High performance arithmetic for hyperelliptic curve cryptosystems of genus two. In: Proceedings of ITCC, Las Vegas, Nevada, USA, April 5-7 (2004)","key":"8_CR22","DOI":"10.1109\/ITCC.2004.1286706"},{"doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Paar, C.: Special Hyperelliptic Curve Cryptosystems of Genus Two: Efficient Arithmetic and Fast Implementation. In: Embedded Cryptographic Hardware: Design and Security. Nova Science Publishers, Bombay (2004)","key":"8_CR23","DOI":"10.1109\/ITCC.2004.1286706"},{"unstructured":"Wollinger, T.: Software and Hardware Implementation of Hyperelliptic Curve Cryptosystems. PhD thesis. Ruhr-University Bochum, Germany (2004)","key":"8_CR24"},{"doi-asserted-by":"crossref","unstructured":"Wollinger, T., Bertoni, G., Breveglieri, L., Paar, C.: Performance of HECC coprocessors using inversionfree formulae. In: International Workshop on Information Security & Hiding (ISH 2005), Singapore (2005)","key":"8_CR25","DOI":"10.1007\/11751595_105"},{"issue":"3","key":"8_CR26","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1145\/1015047.1015051","volume":"3","author":"T. Wollinger","year":"2004","unstructured":"Wollinger, T., Pelzl, J., Wittelsberger, V., Paar, C., Saldamli, G., Ko\u00e7, \u00c7.: Elliptic and hyperelliptic curves on embedded \u03bcP. ACM Transactions on Embedded Computing Systems\u00a03(3), 509\u2013533 (2004)","journal-title":"ACM Transactions on Embedded Computing Systems"},{"doi-asserted-by":"crossref","unstructured":"Woodbury, A.D., Bailey, D.V., Paar, C.: Elliptic curve cryptography on smartcards without coprocessors. In: Proceedings of Fourth Smart Card Research and Advanced Applications (CARDIS 2000) Conference (2000)","key":"8_CR27","DOI":"10.1007\/978-0-387-35528-3_5"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems \u2013 CHES 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11545262_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:18:43Z","timestamp":1605626323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11545262_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540284741","9783540319405"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/11545262_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}