{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:56:22Z","timestamp":1725490582886},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_28","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"381-399","source":"Crossref","is-referenced-by-count":18,"title":["A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over $$ \\mathbb{G}\\mathbb{F}\\left( {2^n } \\right) $$"],"prefix":"10.1007","author":[{"given":"M.","family":"Ernst","sequence":"first","affiliation":[]},{"given":"M.","family":"Jung","sequence":"additional","affiliation":[]},{"given":"F.","family":"Madlener","sequence":"additional","affiliation":[]},{"given":"S.","family":"Huss","sequence":"additional","affiliation":[]},{"given":"R.","family":"Bl\u00fcmel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir and L. M. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Communications of the ACM, Feb 1978.","DOI":"10.1145\/359340.359342"},{"key":"28_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Use of elliptic curves in cryptography","author":"V. Miller","year":"1986","unstructured":"V. Miller, \u201cUse of elliptic curves in cryptography,\u201d Advances in Cryptology, Proc. CRYPTO\u201985, LNCS 218, H. C. Williams, Ed., Springer-Verlag, pp. 417\u2013426, 1986."},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, ldElliptic Curve Cryptosystems,\u201d Mathematics of Computation, vol. 48, pp. 203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"A. Lenstra and E. Verheul, \u201cSelecting Cryptographic Key Sizes,\u201d Proc. Workshop on Practice and Theory in Public Key Cryptography, Springer-Verlag, ISBN 3540669671, pp. 446\u2013465, 2000.","DOI":"10.1007\/978-3-540-46588-1_30"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"A. J. Menezes, \u201cElliptic Curve Public Key Cryptosystems,\u201d Kluwer Akademic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"J. H. Silverman, \u201cThe Arithmetic of Elliptic Curves,\u201d Graduate Texts in Mathematics, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"28_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-46665-7_23","volume-title":"Codes and Cryptography","author":"S. Galbraith","year":"1999","unstructured":"S. Galbraith and N. Smart, \u201cA cryptographic application of Weil descent,\u201d Codes and Cryptography, LNCS 1746, Springer-Verlag, pp. 191\u2013200, 1999."},{"key":"28_CR8","unstructured":"IEEE 1363, \u201cStandard Specifications For Public Key Cryptography,\u201d http:\/\/grouper.ieee.org\/groups\/1363\/ , 2000."},{"key":"28_CR9","unstructured":"ANSI X9.62, \u201cPublic key cryptography for the financial services industry: The Elliptic Curve Digital Signature Algorithm (ECDSA),\u201d (available from the ANSI X9 catalog), 1999."},{"issue":"7","key":"28_CR10","first-page":"595","volume":"7","author":"A. Karatsuba","year":"1963","unstructured":"A. Karatsuba and Y. Ofman, \u201cMultiplication of multidigit numbers on automata,\u201d Sov. Phys.-Dokl (Engl. transl.), vol. 7, no. 7, pp. 595\u2013596, 1963.","journal-title":"Sov. Phys.-Dokl (Engl. transl.)"},{"issue":"3","key":"28_CR11","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s001450010012","volume":"14","author":"D. V. Bailey","year":"2001","unstructured":"D. V. Bailey and C. Paar, \u201cEfficient Arithmetic in Finie Field Extensions with Application in Elliptic Curve Cryptography,\u201d Journal of Cryptology, vol. 14, no. 3, pp. 153\u2013176, 2001.","journal-title":"Journal of Cryptology"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"M. Ernst, S. Klupsch, O. Hauck and S. A. Huss, \u201cRapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems,\u201d Proc. 12th IEEE Workshop on Rapid System Prototyping (RSP01), Monterey, CA, 2001.","DOI":"10.1109\/IWRSP.2001.933834"},{"issue":"3","key":"28_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/1008861.1008865","volume":"12","author":"J. L. Bentley","year":"1980","unstructured":"J. L. Bentley, D. Haken and J. B. Saxe, \u201cA general method for solving divide-andconquer recurrences,\u201d SIGACT News, vol. 12(3), pp. 36\u201344, 1980.","journal-title":"SIGACT News"},{"key":"28_CR14","unstructured":"Atmel, Inc. \u201cConfigurable Logic Data Book,\u201d 2001."},{"key":"28_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","volume-title":"Fast multiplication on elliptic curves over GF(2m) without precomputation","author":"J. Lopez","year":"1999","unstructured":"J. Lopez and R. Dahab, \u201cFast multiplication on elliptic curves over GF(2m) without precomputation,\u201d Workshop on Cryptographic Hardware and Embedded Systems (CHES 99), LNCS 1717, C. K. Koc and C. Paar Eds., Springer-Verlag, pp. 316\u2013327, 1999."},{"key":"28_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"J. Coron","year":"1999","unstructured":"J. Coron, \u201cResistance against Differential Power Analysis for Elliptic Curve Cryptosystems,\u201d Workshop on Cryptographic Hardware and Embedded Systems (CHES 99), LNCS 1717, C. K. Koc and C. Paar Eds., Springer-Verlag, pp. 292\u2013302, 1999."},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"K. H. Leung, K. W. Ma, W. K. Wong and P. H. W. Leong, \u201cFPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor,\u201d Proc. IEEE FCCM 2000, pp. 68\u201376, Napa Valley, 2000.","DOI":"10.1109\/FPGA.2000.903394"},{"key":"28_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/3-540-44499-8_2","volume-title":"Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA","author":"S. Okada","year":"2000","unstructured":"S. Okada, N. Torii, K. Itoh and M. Takenaka, \u201cImplementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA,\u201d Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965, C. K. Koc and C. Paar Eds., Springer-Verlag, pp. 25\u201340, 2000."},{"key":"28_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44499-8_3","volume-title":"A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m)","author":"G. Orlando","year":"2000","unstructured":"G. Orlando and C. Paar, \u201cA High-Performance Reconfigurable Elliptic Curve Processor for GF(2m),\u201d Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965, C. K. Koc and C. Paar Eds., Springer-Verlag, pp. 41\u201356, 2000."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T15:39:49Z","timestamp":1556811589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}