{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:23Z","timestamp":1725490583699},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_27","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"366-380","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Low-Power Design for an Elliptic Curve Digital Signature Chip"],"prefix":"10.1007","author":[{"given":"Richard","family":"Schroeppel","sequence":"first","affiliation":[]},{"given":"Cheryl","family":"Beaver","sequence":"additional","affiliation":[]},{"given":"Rita","family":"Gonzales","sequence":"additional","affiliation":[]},{"given":"Russell","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Timothy","family":"Draelos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"1","key":"27_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/12.980019","volume":"51","author":"C. Kim","year":"2002","unstructured":"Kim, C., Oh S., and Lim, Jongin, \u201cA new hardware architecture for operations in GF(2n)\u201d, IEEE Transactions on Computers v 51 n 1 January 2002. p. 90\u201392.","journal-title":"IEEE Transactions on Computers"},{"key":"27_CR2","unstructured":"S. Moon, J. Park, and Y. Lee, \u201cFast VLSI arithmetic algorithms for high-security elliptic curve cryptographic applications\u201d, Proceedings of ICCE. International Conference on Consumer Electronics, 19-21 June 2001, Los Angeles, CA."},{"issue":"11","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/4.962304","volume":"36","author":"J. Goodman","year":"2001","unstructured":"J. Goodman and A. Chandrakasan, \u201cAn energy-efficient reconfigurable public-key cryptography processor\u201d, IEEE Journal of Solid-State Circuits, vol.36, no.11, p. 1808\u201320. Feb. 2001, San Francisco, CA.","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"27_CR4","first-page":"273","volume":"148","author":"M. Aydos","year":"2001","unstructured":"M. Aydos, T. Yanik, and C. Koc, \u201cHigh-speed implementation of an ECCbased wireless authentication protocol on an ARM microprocessor\u201d, in IEEE Proceedings-Communications, vol.148, no.5, p. 273\u20139, Oct. 2001.","journal-title":"High-speed implementation of an ECCbased wireless authentication protocol on an ARM microprocessor"},{"key":"27_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0053434","volume-title":"Advances in Cryptography-Eurocrypt\u2019 94","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K. and R. A. Rueppel, \u201cMessage recovery for signature schemes based on the discrete logarithm problem\u201d, Advances in Cryptography-Eurocrypt\u2019 94, Springer LNCS 950, 1994, p. 182\u2013193."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"L. Harn and Y. Xu, \u201cDesign of Generalised El Gamal Type Digital Signature Schemes Based on Discrete Logarithm\u201d, in Electronics Letters Online, No.19941398, September 30, 1994. IEEE.","DOI":"10.1049\/el:19941398"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"J. Silverman, The Arithmetic of Elliptic Curves. Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"27_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/3-540-44750-4_4","volume-title":"Advances in Cryptology-Crypto\u2019 95","author":"R. Schroeppel","year":"1995","unstructured":"R. Schroeppel, H. Orman, S. O'Malley, and O. Spatscheck, \u201cFast Key Exchange with Elliptic Curve Systems\u201d, in Advances in Cryptology-Crypto\u2019 95, Springer LNCS 963, 1995, p. 43\u201356."},{"key":"27_CR9","unstructured":"R. Schroeppel, \u201cElliptic Curves-Twice as Fast\u201d, Midwest Algebraic Geometry Conference, Urbana, IL, November 2000."},{"key":"27_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-540-48000-6_12","volume-title":"Advances in Cryptology-Asiacrypt\u2019 99","author":"E. Knudsen","year":"1999","unstructured":"E. Knudsen, \u201cElliptic Scalar Multiplication Using Point Halving\u201d, Advances in Cryptology-Asiacrypt\u2019 99, Springer LNCS 1716, 1999, p. 135\u2013149."},{"key":"27_CR11","unstructured":"IEEE P1363, Standard Specifications for Public Key Cryptography. Appendix A, 1997."},{"key":"27_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-44987-6_3","volume-title":"Eurocrypt 2001","author":"N. Smart","year":"2001","unstructured":"N. Smart, \u201cHow Secure Are Elliptic Curves over Composite Extension Fields?\u201d, in Eurocrypt 2001, LNCS 2045, May 2001, p. 30\u201339."},{"key":"27_CR13","unstructured":"Schroeppel, R. \u201cCircuits for Solving a Quadratic Equation in GF[2N]\u201d, in preparation, 2002."},{"key":"27_CR14","unstructured":"M. Rosing, Implementing Elliptic Curve Cryptography, Manning Publications, 1999."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:25:14Z","timestamp":1558473914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_27","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}