{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:53:09Z","timestamp":1742385189426},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465591"},{"type":"electronic","value":"9783540465614"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_33","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T21:49:01Z","timestamp":1161035341000},"page":"415-429","source":"Crossref","is-referenced-by-count":21,"title":["Superscalar Coprocessor for High-Speed Curve-Based Cryptography"],"prefix":"10.1007","author":[{"given":"K.","family":"Sakiyama","sequence":"first","affiliation":[]},{"given":"L.","family":"Batina","sequence":"additional","affiliation":[]},{"given":"B.","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"I.","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"33_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. Math. Comp.\u00a048, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-40061-5_5","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"N. Th\u00e9riault","year":"2003","unstructured":"Th\u00e9riault, N.: Index calculus attack for hyperelliptic curves of small genus. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 75\u201392. Springer, Heidelberg (2003)"},{"key":"33_CR6","unstructured":"Montgomery, P.: Speeding the pollard and elliptic curve methods of factorization"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-44709-1_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"N.P. Smart","year":"2001","unstructured":"Smart, N.P.: The Hessian form of an elliptic curve. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 118\u2013128. Springer, Heidelberg (2001)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The Montgomery powering ladder. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 291\u2013302. Springer, Heidelberg (2003)"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"Public Key Cryptography","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 280\u2013296. Springer, Heidelberg (2002)"},{"key":"33_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-40061-5_6","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"P.K. Mishra","year":"2003","unstructured":"Mishra, P.K., Sarkar, P.: Parallelizing explicit formula for arithmetic in the jacobian of hyperelliptic curves. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 93\u2013110. Springer, Heidelberg (2003)"},{"key":"33_CR11","unstructured":"Wollinger, T.: Software and Hardware Implementation of Hyperelliptic Curve Cryptosystems. PhD thesis, Ruhr-University Bochum (2004)"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Hodjat, A., Batina, L., Hwang, D., Verbauwhede, I.: A hyperelliptic curve crypto coprocessor for an 8051 microcontroller. In: Proceedings of The IEEE 2005 Workshop on Signal Processing Systems (SIPS 2005), pp. 93\u201398 (2005)","DOI":"10.1109\/SIPS.2005.1579845"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44499-8_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"G. Orlando","year":"2000","unstructured":"Orlando, G., Paar, C.: A high-performance reconfigurable elliptic curve processor for GF(2\n                    m\n                  ). In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 41\u201356. Springer, Heidelberg (2000)"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/3-540-36400-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"N. Gura","year":"2003","unstructured":"Gura, N., Shantz, S.C., Eberle, H., Finchelstein, D., Gupta, S., Gupta, V., Stebila, D.: An end-to-end systems approach to elliptic curve cryptography. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 349\u2013365. Springer, Heidelberg (2003)"},{"issue":"5","key":"33_CR15","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00200-004-0154-8","volume":"15","author":"T. Lange","year":"2005","unstructured":"Lange, T.: Formulae for arithmetic on genus 2 hyperelliptic curves. Applicable Algebra in Engineering, Communication and Computing\u00a015(5), 295\u2013328 (2005)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"33_CR16","unstructured":"Byramjee, B., Duquesne, S.: Classification of genus 2 curves over \n                    \n                      \n                    \n                    $F_{2^n}$\n                   and optimization of their arithmetic. Cryptology ePrint Archive: Report 2004\/107 (2004)"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-30564-4_12","volume-title":"Selected Areas in Cryptography","author":"T. Lange","year":"2004","unstructured":"Lange, T., Stevens, M.: Efficient doubling on genus two curves over binary fields. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 170\u2013181. Springer, Heidelberg (2004)"},{"key":"33_CR18","unstructured":"Elias, G., Miri, A., Yeap, T.H.: High-performance, FPGA based hyperelliptic curve cryptosystem. In: Proceedings of the 22nd Biennial Symposium on Communications (2004)"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-45238-6_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J. Pelzl","year":"2003","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 351\u2013365. Springer, Heidelberg (2003)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1007\/3-540-46885-4_72","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"G.B. Agnew","year":"1990","unstructured":"Agnew, G.B., Mullin, R.C., Vanstone, S.A.: A fast elliptic curve cryptosystem. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 706\u2013708. Springer, Heidelberg (1990)"},{"key":"33_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/3-540-36400-5_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"N. Boston","year":"2003","unstructured":"Boston, N., Clancy, T., Liow, Y., Webster, J.: Genus two hyperelliptic curve coprocessor. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 400\u2013414. Springer, Heidelberg (2003)"},{"key":"33_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03642-6","volume-title":"Algebraic Aspects of Cryptography","author":"N. Koblitz","year":"1998","unstructured":"Koblitz, N.: Algebraic Aspects of Cryptography, 1st edn. Springer, Heidelberg (1998)","edition":"1"},{"key":"33_CR23","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"Blake, I., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge (1999)"},{"key":"33_CR24","first-page":"155","volume-title":"Algebraic Aspects of Cryptography","author":"A. Menezes","year":"1998","unstructured":"Menezes, A., Wu, Y.-H., Zuccherato, R.: An Elementary Introduction to Hyperelliptic Curves - Appendix. In: Koblitz, N. (ed.) Algebraic Aspects of Cryptography, pp. 155\u2013178. Springer, Heidelberg (1998)"},{"issue":"6","key":"33_CR25","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1049\/el:19880226","volume":"24","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: Effective recursive algorithm for computing multiplicative inverses in GF(2\n                    m\n                  ). Electronics Letters\u00a024(6), 334\u2013335 (1988)","journal-title":"Electronics Letters"},{"key":"33_CR26","volume-title":"Encyclopedia of Mathematics and its Applications","author":"R. Lidl","year":"2000","unstructured":"Lidl, R., Niederreiter, H.: Finite fields. In: Encyclopedia of Mathematics and its Applications, 2nd edn., vol.\u00a020. Cambridge University Press, Cambridge (2000)","edition":"2"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Sakiyama, K., Preneel, B., Verbauwhede, I.: A fast dual-field modular arithmetic logic unit and its hardware imlementation. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2006), pp. 787\u2013790 (2006)","DOI":"10.1109\/ISCAS.2006.1692703"},{"key":"33_CR28","unstructured":"Schaumont, P.: Gezel version 2, \n                    \n                      http:\/\/rijndael.ece.vt.edu\/gezel2\/"},{"issue":"3\/4","key":"33_CR29","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1504\/IJES.2005.009953","volume":"1","author":"N.A. Saqib","year":"2005","unstructured":"Saqib, N.A., Rodr\u00edguez-Henriquez, F., D\u00edaz-P\u00e9rez, A.: A reconfigurable processor for high speed point multiplication in elliptic curves. International Journal of Embedded Systems 2005\u00a01(3\/4), 237\u2013249 (2005)","journal-title":"International Journal of Embedded Systems 2005"},{"key":"33_CR30","unstructured":"https:\/\/projects.ibbt.be\/qoe\/"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:36:29Z","timestamp":1619508989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11894063_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}