{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:36:48Z","timestamp":1725550608803},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540296393"},{"type":"electronic","value":"9783540321071"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11573937_48","type":"book-chapter","created":{"date-parts":[[2005,10,15]],"date-time":"2005-10-15T11:19:03Z","timestamp":1129375143000},"page":"443-452","source":"Crossref","is-referenced-by-count":0,"title":["A Parallel Modular Exponentiation Scheme for Transformed Exponents"],"prefix":"10.1007","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[]},{"given":"Yeu-Pong","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/12.238495","volume":"42","author":"S. Arno","year":"1993","unstructured":"Arno, S., Wheeler, F.S.: Signed digit representations of minimal Hamming weight. IEEE Transactions on Computers\u00a042, 1007\u20131010 (1993)","journal-title":"IEEE Transactions on Computers"},{"key":"48_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/0-387-34805-0_37","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J. Bos","year":"1990","unstructured":"Bos, J., Coster, M.: Addition chain heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 400\u2013407. Springer, Heidelberg (1990)"},{"key":"48_CR3","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/S0167-4048(03)00214-1","volume":"22","author":"C.C. Chang","year":"2003","unstructured":"Chang, C.C., Lai, Y.: A flexible data-attachment scheme on e-cash. Computers and Security\u00a022, 160\u2013166 (2003)","journal-title":"Computers and Security"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey on fast exponentiation methods. Journal of Algorithms\u00a027, 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"48_CR6","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"M. Joye","year":"2000","unstructured":"Joye, M., Yen, S.: Optimal left-to-right binary signed-digit recoding. IEEE Transactions on Computers\u00a049, 740\u2013748 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"48_CR7","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/00207210310001598074","volume":"90","author":"Y. Lai","year":"2003","unstructured":"Lai, Y., Chang, C.C.: An efficient multi-exponentiation scheme based on modified Booth\u2019s method. International Journal of Electronics\u00a090, 221\u2013233 (2003)","journal-title":"International Journal of Electronics"},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1016\/S0045-7906(03)00013-2","volume":"29","author":"Y. Lai","year":"2003","unstructured":"Lai, Y., Chang, C.C.: Parallel computational algorithm for generalized Chinese remainder theorem. Computers and Electrical Engineering\u00a029, 801\u2013811 (2003)","journal-title":"Computers and Electrical Engineering"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/82.659469","volume":"45","author":"D.F. Miller","year":"1998","unstructured":"Miller, D.F., McCormick, W.S.: An arithmetic free parallel mixed-radix conversion algorithm. IEEE Transactions on Circuits and systems\u2013II: Analog and Digital Signal Processing\u00a045, 158\u2013162 (1998)","journal-title":"IEEE Transactions on Circuits and systems\u2013II: Analog and Digital Signal Processing"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular multiplication without trail division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"48_CR11","first-page":"98","volume":"E86-A","author":"K. Okeya","year":"2003","unstructured":"Okeya, K., Sakurai, K.: Use of montgomery trick in precomputation of multi-scalar multiplication in elliptic curve cryptosystems. IEICE Transactions on Fundamentals\u00a0E86-A, 98\u2013112 (2003)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"48_CR12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the Association for Computing Machinery\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the Association for Computing Machinery"},{"key":"48_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/BFb0053453","volume-title":"Advances in Cryptology - EUROCRYPT \u201994","author":"P. Rooij","year":"1995","unstructured":"Rooij, P.: Efficient exponentiation using precomputation and vector addition chains. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 389\u2013399. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11573937_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:41:59Z","timestamp":1619505719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11573937_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540296393","9783540321071"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11573937_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}