{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:03:49Z","timestamp":1767920629670,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_6","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"57-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["New Algorithm for Classical Modular Inverse"],"prefix":"10.1007","author":[{"given":"R\u00f3bert","family":"L\u00f3rencz","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"issue":"170","key":"6_CR1","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P. L. Montgomery","year":"1985","unstructured":"P. L. Montgomery: Modular Multiplication Without Trial Division. Mathematics of Computation 44 No. 170 (1985) 519\u2013521","journal-title":"Mathematics of Computation"},{"issue":"8","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/12.403725","volume":"44","author":"B. S. Kaliski Jr.","year":"1995","unstructured":"B. S. Kaliski Jr.: The Montgomery Inverse and Its Application. IEEE Transaction on Computers 44 No. 8 (1995) 1064\u20131065","journal-title":"IEEE Transaction on Computers"},{"key":"6_CR3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/12.863048","volume":"49","author":"E. Sava\u015f","year":"2000","unstructured":"E. Sava\u015f and \u00c7. K. Ko\u00e7: The Montgomery Modular Inverse-Revisited. IEEE Transaction on Computers 49 No. 7 (2000)","journal-title":"IEEE Transaction on Computers"},{"key":"6_CR4","volume-title":"Seminumerical Algorithms","author":"D. E. Knuth","year":"1998","unstructured":"D. E. Knuth: The Art of Computer Programming 2 \/ Seminumerical Algorithms. Addison-Wesley, Reading, Mass. Third edition (1998)","edition":"Third edition"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1080\/00207169108804009","volume":"40","author":"\u00c7. K. K. Ko\u00e7","year":"1991","unstructured":"\u00c7. K. Ko\u00e7: High-Radix and Bit Recoding Techniques For Modular Exponentiation. Int\u2019l J. Computer Mathematics 40 (1991) 139\u2013156","journal-title":"Int\u2019l J. Computer Mathematics"},{"key":"6_CR6","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquarter","year":"1982","unstructured":"J.-J. Quisquarter and C. Couvreur: Fast Decipherment Algorithm for RSA Publickey Cryptosystem. Electronics Letters 18 No. 21 (1982) 905\u2013907","journal-title":"Electronics Letters"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman: New Directions in Cryptography. IEEE Transactions on Information Theory 22 (1976) 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR8","unstructured":"Nat\u2019l Inst. of Standards and Technology (NIST). FIPS Publication 186: Digital Signature Standard (1994)"},{"issue":"177","key":"6_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz: Elliptic Curve Cryptosystem. Mathematics of Computation 48 No. 177 (1987) 203\u2013209","journal-title":"Mathematics of Computation"},{"key":"6_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic curve Public Key Cryptosystem","author":"A. J. Menezes","year":"1993","unstructured":"A. J. Menezes: Elliptic curve Public Key Cryptosystem. Kluwer Academic Publishers, Boston, MA (1993)"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/0304-3975(94)90037-X","volume":"129","author":"\u00d6 Egecioglu","year":"1994","unstructured":"\u00d6. ER~gecioR~glu and \u00c7. K. Ko\u00e7: Exponentiation Using Canonical recoding. Theoretical Computer Science 129 No. 2 (1994) 407\u2013717","journal-title":"Theoretical Computer Science"},{"key":"6_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-5242-9","volume-title":"Methods and Applications of Error-free Computation","author":"R. T. Gregory","year":"1984","unstructured":"R. T. Gregory and E. V. Krishnamurthy: Methods and Applications of Error-free Computation. Springer-Verlag, New York, Berlin, Heidelberg, Tokyo (1984)"},{"key":"6_CR13","volume-title":"Elementary Number Theory and Its Applications","author":"K. H. Rosen","year":"1993","unstructured":"K. H. Rosen: Elementary Number Theory and Its Applications. Addison-Wesley, Reading, Massachusetts (1993)"},{"key":"6_CR14","unstructured":"J. D. Dworkin, P. M. Glaser, M. J. Torla, A. Vadekar, R. J. Lambert, S. A. Vanstone: Finite Field Inverse Circuit. US Patent 6,009,450 (1999)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/12.238496","volume":"42","author":"B. Bruner","year":"1993","unstructured":"B. Bruner, A. Curiger, M. Hofstetter: On Computing Multiplicative Inverse in GF(2m). IEEE Trans. Computer 42 (1993) 1010\u20131015","journal-title":"IEEE Trans. Computer"},{"issue":"4","key":"6_CR16","first-page":"351","volume":"11","author":"M. Morh\u00e1\u010d","year":"1992","unstructured":"M. Morh\u00e1\u010d and R. L\u00f3rencz: A Modular System for Solving Linear Equations Exactly, I. Architecture and Numerical Algorithms. Computers and Artificial Intelligence 11 No. 4 (1992) 351\u2013361","journal-title":"Computers and Artificial Intelligence"},{"issue":"5","key":"6_CR17","first-page":"497","volume":"11","author":"R. L\u00f3rencz","year":"1992","unstructured":"R. L\u00f3rencz and M. Morh\u00e1\u010d: Modular System for Solving Linear Equations Exactly, II. Hardware Realization. Computers and Artificial Intelligence 11 No. 5 (1992) 497\u2013507","journal-title":"Computers and Artificial Intelligence"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T01:26:16Z","timestamp":1558488376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}