{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:40:37Z","timestamp":1761662437951},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465591"},{"type":"electronic","value":"9783540465614"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_34","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T17:49:01Z","timestamp":1161020941000},"page":"430-444","source":"Crossref","is-referenced-by-count":19,"title":["Hardware\/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Koschuch","sequence":"first","affiliation":[]},{"given":"Joachim","family":"Lechner","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Weitzer","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Szekely","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Tillich","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Wolkerstorfer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-28632-5_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"H. Aigner","year":"2004","unstructured":"Aigner, H., Bock, H., H\u00fctter, M., Wolkerstorfer, J.: A low-cost ECC coprocessor for smartcards. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 107\u2013118. Springer, Heidelberg (2004)"},{"key":"34_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11545262_8","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"L. Batina","year":"2005","unstructured":"Batina, L., Hwang, D., Hodjat, A., Preneel, B., Verbauwhede, I.: Hardware\/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 \u03bcP. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 106\u2013118. Springer, Heidelberg (2005)"},{"key":"34_CR3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"34_CR4","volume-title":"Designing Embedded Hardware","author":"J. Catsoulis","year":"2002","unstructured":"Catsoulis, J.: Designing Embedded Hardware. O\u2019Reilly Media, Sebastopol (2002)"},{"issue":"3","key":"34_CR5","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/5.558708","volume":"85","author":"G. Micheli De","year":"1997","unstructured":"De Micheli, G., Gupta, R.K.: Hardware\/software co-design. Proceedings of the IEEE\u00a085(3), 349\u2013365 (1997)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/ASAP.2005.15","volume-title":"Proceedings of the 16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005)","author":"H. Eberle","year":"2005","unstructured":"Eberle, H., et al.: Architectural extensions for elliptic curve cryptography over GF(2\n                    m\n                  ) on 8-bit microprocessors. In: Proceedings of the 16th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2005), pp. 343\u2013349. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"34_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/3-540-36400-5_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Ernst","year":"2003","unstructured":"Ernst, M., et al.: A reconfigurable system on chip implementation for elliptic curve cryptography over GF(2\n                    n\n                  ). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 381\u2013399. Springer, Heidelberg (2003)"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/54.679207","volume":"15","author":"R. Ernst","year":"1998","unstructured":"Ernst, R.: Codesign of embedded systems: Status and trends. IEEE Design & Test of Computers\u00a015(2), 45\u201354 (1998)","journal-title":"IEEE Design & Test of Computers"},{"key":"34_CR9","unstructured":"Goodman, J.R.: Energy Scalable Reconfigurable Cryptographic Hardware for Portable Applications. Ph.D. Thesis, Massachusetts Institute of Technology (2000)"},{"key":"34_CR10","first-page":"37","volume-title":"Proceedings of the 34th IEEE International Symposium on Circuits and Systems (ISCAS 2001)","author":"J. Gro\u00dfsch\u00e4dl","year":"2001","unstructured":"Gro\u00dfsch\u00e4dl, J.: A low-power bit-serial multiplier for finite fields GF(2\n                    m\n                  ). In: Proceedings of the 34th IEEE International Symposium on Circuits and Systems (ISCAS 2001), vol.\u00a0IV, pp. 37\u201340. IEEE, Los Alamitos (2001)"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/ASAP.2003.1212868","volume-title":"Proceedings of the 14th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2003)","author":"J. Gro\u00dfsch\u00e4dl","year":"2003","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2\n                    m\n                  ). In: Proceedings of the 14th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2003), pp. 455\u2013468. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., et al.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"34_CR13","volume-title":"Guide to Elliptic Curve Cryptography","author":"D.R. Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"34_CR14","first-page":"93","volume-title":"Proceedings of the 19th IEEE Workshop on Signal Processing Systems (SIPS 2005)","author":"A. Hodjat","year":"2005","unstructured":"Hodjat, A., Hwang, D., Batina, L., Verbauwhede, I.: A hyperelliptic curve crypto coprocessor for an 8051 microcontroller. In: Proceedings of the 19th IEEE Workshop on Signal Processing Systems (SIPS 2005), pp. 93\u201398. IEEE, Los Alamitos (2005)"},{"key":"34_CR15","first-page":"209","volume-title":"Proceedings of 15th IEEE Workshop on Signal Processing Systems (SIPS 2001)","author":"S. Janssens","year":"2001","unstructured":"Janssens, S., et al.: Hardware\/software co-design of an elliptic curve public-key cryptosystem. In: Proceedings of 15th IEEE Workshop on Signal Processing Systems (SIPS 2001), pp. 209\u2013216. IEEE, Los Alamitos (2001)"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/MWSCAS.2003.1562404","volume-title":"Proceedings of the 46th IEEE Midwest Symposium on Circuits and Systems (MWSCAS 2003)","author":"S.S. Kumar","year":"2003","unstructured":"Kumar, S.S., et al.: Embedded end-to-end wireless security with ECDH key exchange. In: Proceedings of the 46th IEEE Midwest Symposium on Circuits and Systems (MWSCAS 2003), vol.\u00a02, pp. 786\u2013789. IEEE, Los Alamitos (2003)"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1007\/978-3-540-30117-2_60","volume-title":"Field Programmable Logic and Application","author":"S.S. Kumar","year":"2004","unstructured":"Kumar, S.S., Paar, C.: Reconfigurable instruction set extension for enabling ECC on an 8-bit processor. In: Becker, J., Platzner, M., Vernalde, S. (eds.) FPL 2004. LNCS, vol.\u00a03203, pp. 586\u2013595. Springer, Heidelberg (2004)"},{"key":"34_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J. L\u00f3pez","year":"1999","unstructured":"L\u00f3pez, J., Dahab, R.: Fast multiplication on elliptic curves over \n                    \n                      \n                    \n                    $\\mathit{GF}(2^m)$\n                   without precomputation. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 316\u2013327. Springer, Heidelberg (1999)"},{"key":"34_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/3-540-44499-8_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"E. Sava\u015f","year":"2000","unstructured":"Sava\u015f, E., Tenca, A.F., Ko\u00e7, \u00c7.K.: A scalable and unified multiplier architecture for finite fields GF(p) and GF(2\n                    m\n                  ). In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 277\u2013292. Springer, Heidelberg (2000)"},{"issue":"4","key":"34_CR20","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1023\/A:1020363323869","volume":"7","author":"P. Schaumont","year":"2002","unstructured":"Schaumont, P., Verbauwhede, I.: Domain specific tools and methods for application in security processor design. Design Automation for Embedded Systems\u00a07(4), 365\u2013383 (2002)","journal-title":"Design Automation for Embedded Systems"},{"issue":"4","key":"34_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MC.2003.1193231","volume":"36","author":"P. Schaumont","year":"2003","unstructured":"Schaumont, P., Verbauwhede, I.: Domain-specific codesign for embedded security. Computer\u00a036(4), 68\u201374 (2003)","journal-title":"Computer"},{"key":"34_CR22","unstructured":"University of California at Riverside. Synthesizable VHDL Model of 8051, Available for download at: \n                    \n                      http:\/\/www.cs.ucr.edu\/~dalton\/i8051\/i8051syn\/"},{"issue":"7","key":"34_CR23","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/5.293155","volume":"28","author":"W.H. Wolf","year":"1994","unstructured":"Wolf, W.H.: Hardware-software co-design of embedded systems. Proceedings of the IEEE\u00a028(7), 967\u2013989 (1994)","journal-title":"Proceedings of the IEEE"},{"key":"34_CR24","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-0-387-35528-3_5","volume-title":"Smart Card Research and Advanced Applications","author":"A.D. Woodbury","year":"2000","unstructured":"Woodbury, A.D., Bailey, D.V., Paar, C.: Elliptic curve cryptography on smart cards without coprocessors. In: Smart Card Research and Advanced Applications, pp. 71\u201392. Kluwer Academic Publishers, Dordrecht (2000)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:59:27Z","timestamp":1558274367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11894063_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}