{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:56:21Z","timestamp":1773406581338,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_26","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"349-365","source":"Crossref","is-referenced-by-count":41,"title":["An End-to-End Systems Approach to Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Nils","family":"Gura","sequence":"first","affiliation":[]},{"given":"Sheueling","family":"Chang Shantz","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Eberle","sequence":"additional","affiliation":[]},{"given":"Sumit","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Vipul","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Finchelstein","sequence":"additional","affiliation":[]},{"given":"Edouard","family":"Goupy","sequence":"additional","affiliation":[]},{"given":"Douglas","family":"Stebila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"5","key":"26_CR1","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/49.223883","volume":"11","author":"G.B. Agnew","year":"1993","unstructured":"Agnew, G.B., Mullin, R.C., Vanstone, S.A.: An Implementation of Elliptic Curve Cryptosystems Over F2155. In IEEE Journal on Selected Areas in Communications, 11(5):804\u2013813, June 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Bednara, M., Daldrup, M., von zur Gathen, J., Shokrollahi, J., Teich, J.: Recon-figurable Implementation of Elliptic Curve Crypto Algorithms. Reconfigurable Architectures Workshop, 16th International Parallel and Distributed Processing Symposium, April 2002.","DOI":"10.1109\/IPDPS.2002.1016557"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series 265, Cambridge University Press, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"26_CR4","unstructured":"Blake-Wilson, S., Dierks, T., Hawk, C.: ECC Cipher Suites for TLS. Internet draft, http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-tls-ecc-01.txt , March 2001."},{"key":"26_CR5","unstructured":"Blum, T., Paar, C.: High Radix Montgomery Modular Exponentiation on Recon-figurable Hardware. To Appear in IEEE Transactions on Computers."},{"key":"26_CR6","unstructured":"Borodin, A., Munro, I.: The Computational Complexity of Algebraic and Numeric Problems. American Elsevier, New York, 1975."},{"key":"26_CR7","unstructured":"Certicom Research: SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography, Version 1.0, September 2000."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol-Version 1.0. IETF RFC 2246, January 1999.","DOI":"10.17487\/rfc2246"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Ernst, M., Klupsch, S., Hauck, O., Huss, S.A.: Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems. 12th IEEE Workshop on Rapid System Prototyping, Monterey, CA, June 2001.","DOI":"10.1109\/IWRSP.2001.933834"},{"key":"26_CR10","unstructured":"Gao, L., Shrivastava, S., Lee, H., Sobelman, G.: A Compact Fast Variable Key Size Elliptic Curve Cryptosystem Coprocessor. Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines, 1998."},{"issue":"11","key":"26_CR11","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/4.962304","volume":"36","author":"J. Goodman","year":"2001","unstructured":"Goodman, J., Chandrakasan, A.P.: An Energy-Efficient Reconfigurable Public-Key Cryptography Processor. In IEEE Journal of Solid-State Circuits, Vol. 36, No. 11, 1808\u20131820, November 2001.","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/12.859542","volume":"49","author":"A. Halbuto\u011fullari","year":"2000","unstructured":"Halbuto\u011fullari, A., Ko\u2ad3, RVu.K.: Mastrovito Multiplier for General Irreducible Polynomials. In IEEE Transactions on Computers, Vol. 49, No. 5, 503\u2013518, May 2000.","journal-title":"IEEE Transactions on Computers"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A Fast Algorithm for Computing Multiplicative Inverses in GF(2m) Using Normal Bases. In Information and Computation, 78:171\u2013177, 1988.","journal-title":"Information and Computation"},{"key":"26_CR14","first-page":"595","volume":"7","author":"A. Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of Many-Digital Numbers by Automatic Computers. Doklady Akad. Nauk, SSSR 145, 293-294. Translation in Physics-Doklady 7, 595\u2013596, 1963.","journal-title":"Doklady Akad. Nauk, SSSR"},{"key":"26_CR15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation, 48:203\u2013209, 1987.","journal-title":"Elliptic curve cryptosystems. Mathematics of Computation"},{"key":"26_CR16","series-title":"Lect Notes Comput Sci","volume-title":"Fast multiplication on elliptic curves over GF(2m) without precomputation","author":"J. L\u00f3pez","year":"1998","unstructured":"L\u00f3pez, J., Dahab, R.: Fast multiplication on elliptic curves over GF(2m) without precomputation. In CHES\u2019 99Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, Lecture Notes in Computer Science 1717, August 1999."},{"key":"26_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Crytology-CRYPTO\u2019 85","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In Lecture Notes in Computer Science 218: Advances in Crytology-CRYPTO\u2019 85, pages 417\u2013426, Springer-Verlag, Berlin, 1986."},{"key":"26_CR18","unstructured":"U.S. Department of Commerce \/ National Institute of Standards and Technology: Digital Signature Standard (DSS), Federal Information Processing Standards Publication FIPS PUB 186\u20132, January 2000."},{"key":"26_CR19","series-title":"Lect Notes Comput Sci","volume-title":"A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m)","author":"G. Orlando","year":"1997","unstructured":"Orlando, G., Paar, C.: A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m). In CHES\u2019 2000 Workshop on Cryptographic Hardware and Embedded Systems, Springer-Verlag, Lecture Notes in Computer Science 1965, August 2000."},{"key":"26_CR20","unstructured":"Chang Shantz, S.: From Euclid\u2019s GCD to Montgomery Multiplication to the Great Divide. Sun Microsystems Laboratories Technical Report TR-2001-95, http:\/\/research.sun.com\/ , June 2001."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1023\/A:1008013818413","volume":"19","author":"L. Song","year":"1998","unstructured":"Song, L., Parhi, K.K.: Low-Energy Digit-Serial\/Parallel Finite Field Multipliers. In IEEE Journal of VLSI Signal Processing Systems 19, 149\u2013166, 1998.","journal-title":"IEEE Journal of VLSI Signal Processing Systems"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:39:42Z","timestamp":1556825982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}