{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T17:53:16Z","timestamp":1777571596686,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_35","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T19:59:37Z","timestamp":1188763177000},"page":"484-499","source":"Crossref","is-referenced-by-count":17,"title":["Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2n)"],"prefix":"10.1007","author":[{"given":"Adnan","family":"Abdul-Aziz Gutub","sequence":"first","affiliation":[]},{"given":"Alexandre F.","family":"Tenca","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Sava\u015f","sequence":"additional","affiliation":[]},{"given":"RCCetin K.","family":"Ko\u00e7","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"7","key":"35_CR1","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/12.863048","volume":"49","author":"E. Savas","year":"2000","unstructured":"E. Savas and C. K. Ko\u00e7. The Montgomery Modular Inverse R3-Revisited. IEEE Trans. on Computers, 49(7): 763\u2013766, July 2000.","journal-title":"IEEE Trans. on Computers"},{"issue":"5","key":"35_CR2","first-page":"733","volume":"E82-A","author":"T. Kobayashi","year":"1999","unstructured":"T. Kobayashi and H. Morita. Fast Modular Inversion Algorithm to Match Any Operation Unit. IEICE Trans. Fundamentals, E82-A(5):733\u2013740, May 1999.","journal-title":"IEICE Trans. Fundamentals"},{"issue":"8","key":"35_CR3","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/12.403725","volume":"44","author":"B. S. Kaliski","year":"1995","unstructured":"B. S. Kaliski. The Montgomery Inverse and its Applications. IEEE Trans. on Computers, 44(8):1064\u20131065, Aug. 1995.","journal-title":"IEEE Trans. on Computers"},{"key":"35_CR4","series-title":"Lect Notes Comput Sci","volume-title":"In Cryptographic Hardware and Embedded Systems","author":"E. Savas","year":"2000","unstructured":"E. Savas, A. F. Tenca, and C. K. Ko\u00e7. A Scalable and Unified Multiplier Architecture for Finite Fields GF(p) and GF(2k). In Cryptographic Hardware and Embedded Systems, Lecture notes in Computer Science. Springer, Berlin, Germany, 2000."},{"key":"35_CR5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"I. Blake, G. Seroussi, and N. Smart. Elliptic Curves in Cryptography. Cambridge University Press: New York, 1999."},{"key":"35_CR6","unstructured":"M. D. Ercegovac, T. Lang, and J. H. Moreno. Introduction to Digital System. John Wiley & Sons, Inc., New York, 1999."},{"issue":"170","key":"35_CR7","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"P. Montgomery. Modular Multiplication without Trail Division. Mathematics of Computation, 44(170): 519\u2013521, April 1985.","journal-title":"Mathematics of Computation"},{"issue":"8","key":"35_CR8","first-page":"863","volume":"E76-D","author":"N. Takagi","year":"1993","unstructured":"N. Takagi. Modular Inversion Hardware with a Redundant Binary Representation. IEICE Trans. on Information and Systems, E76-D(8): 863\u2013869, Aug. 1993.","journal-title":"IEICE Trans. on Information and Systems"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"J.-H. Guo, and C.-L. Wang. Hardware-Efficient Systolic Architecture for Inversion and Division in GF(2m). IEE Proceedings: Computers and Digital Techniques, 145(4): 272\u2013278, July 1998.","DOI":"10.1049\/ip-cdt:19982092"},{"key":"35_CR10","unstructured":"Choudhury, Pal, and Barua. Cellular Automata Based VLSI Architecture for Computing Multiplication and Inverses in GF(2m). Proceedings of the 7th IEEE International Conference on VLSI Design, Calcutta, India, January 5-8 1994."},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"M. A. Hasan. Efficient Computation of Multiplicative Inverses for Cryptographic Applications. Proceeding of the 15th IEEE Symposium on Computer Arithmetic, June 2001.","DOI":"10.1109\/ARITH.2001.930105"},{"issue":"10","key":"35_CR12","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1109\/12.35833","volume":"38","author":"M. Feng","year":"1989","unstructured":"M. Feng. A VLSI Architecture for Fast Inversion in GF(2m). IEEE Trans. on Computers, 38(10):1383\u20131386, Oct. 1989.","journal-title":"IEEE Trans. on Computers"},{"key":"35_CR13","unstructured":"A. A.-A. Gutub, A. F. Tenca, and C. K. Ko\u00e7. Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. ISVLSI 2002: IEEE Computer Society Annual Symposium on VLSI, Pittsburgh, Pennsylvania, April 25-26 2002."},{"issue":"9","key":"35_CR14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/2.947099","volume":"34","author":"J. R. Michener","year":"2001","unstructured":"J. R. Michener and S. D. Mohan. Clothing the E-Emperor. IEEE Compute, 34(9):116\u2013118, Sep. 2001.","journal-title":"IEEE Compute"},{"issue":"11","key":"35_CR15","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/4.962304","volume":"36","author":"J. Goodman","year":"2001","unstructured":"J. Goodman and A. P. Chandrakasan. An Energy-Efficient Reconfigurable Public-Key Cryptogrphy Processor. IEEE Journal of Solid-State Circuits, 36(11):1808\u20131820, Nov. 2001.","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"35_CR16","unstructured":"D. Knuth. The Art of Computer Programming R3-Seminumerical Algorithms, 2nd ed. Vol. 2, Reading, MA: Addison-Wesley, 1981."},{"key":"35_CR17","unstructured":"A. A.-A. Gutub and A. F. Tenca. A Scalable VLSI Architecture for Montgomery Inversion in GF(p). Submitted for publication in March 2002 to IEEE Trans. on VLSI."},{"key":"35_CR18","unstructured":"A. A.-A. Gutub, New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n), Ph.D. thesis, Oregon State University, 2002."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T15:39:59Z","timestamp":1556811599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_35","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}