{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:29:07Z","timestamp":1742383747537},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_7","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"71-81","source":"Crossref","is-referenced-by-count":10,"title":["Increasing the Bitlength of a Crypto-Coprocessor"],"prefix":"10.1007","author":[{"given":"Wieland","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"7_CR1","series-title":"Lect Notes Comput Sci","first-page":"311","volume-title":"Implementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor","author":"P. Barret","year":"1986","unstructured":"P. Barret, \u201cImplementing the Rivest, Shamir and Adleman public-key encryption algorithm on a standard digital signal processor\u201d, Proc. of CRYPTO\u2019 86, Springer LNCS, vol. 263, pp. 311\u2013323, 1987."},{"key":"7_CR2","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Factoring a 512 bit RSA modulus","author":"S. Cavallar","year":"2000","unstructured":"S. Cavallar et alii, \u201cFactoring a 512 bit RSA modulus\u201d, Proc. of EUROCRYPT\u2019 00, Springer LNCS, vol. 1807, pp. 1\u201319, 2000."},{"issue":"21","key":"7_CR3","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"C. Couvreur","year":"1982","unstructured":"C. Couvreur, J.-J. Quisquater, \u201cFast decipherment algorithm for RSA public-key cryptosystem\u201d, Electronics Letters 18(21):905\u2013907, 1982.","journal-title":"Electronics Letters"},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","first-page":"336","volume-title":"Recent results on modular multiplication for smart cards","author":"J.-F. Dhem","year":"1998","unstructured":"J.-F. Dhem, J.-J. Quisquater, \u201cRecent results on modular multiplication for smart cards\u201d, Proc. of CARDIS\u2019 98 Springer LNCS vol. 1820, pp. 336\u2013352, 1998."},{"issue":"1","key":"7_CR5","first-page":"6","volume":"4","author":"H. Handschuh","year":"1998","unstructured":"H. Handschuh, P. Pailler, \u201cSmart Card Crypto-Coprocessors for Public-Key Cryptography\u201d, CryptoBytes 4(1):6\u201311, 1998.","journal-title":"CryptoBytes"},{"key":"7_CR6","series-title":"Lect Notes Comput Sci","first-page":"372","volume-title":"Smart Card Crypto-Coprocessors for Public-Key Cryptography","author":"H. Handschuh","year":"1998","unstructured":"H. Handschuh, P. Pailler, \u201cSmart Card Crypto-Coprocessors for Public-Key Cryptography\u201d, Proc. of CARDIS\u2019 98 Springer LNCS vol. 1820, pp. 372\u2013379, 1998."},{"key":"7_CR7","volume-title":"Seminumerical Algorithms","author":"D. E. Knuth","year":"1999","unstructured":"D. E. Knuth, The Art of Computer Programming, Vol.2: Seminumerical Algorithms, 3rd ed., Addison-Wesley, Reading MA, 1999.","edition":"3rd ed."},{"key":"7_CR8","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P. L. Montgomery","year":"1985","unstructured":"P. L Montgomery, \u201cModular Multiplication without Trial Division\u201d, Math. of Computation, vol. 44, pp. 519\u2013521, 1985.","journal-title":"Math. of Computation"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"D. Naccache, D. M'Raihi, \u201cArithmetic co-processors for public-key cryptography: The state of the art\u201d, IEEE Micro, pp. 14\u201324, 1996.","DOI":"10.1109\/40.502402"},{"key":"7_CR11","unstructured":"J. Omura, \u201cA public key cell design for smart card chips\u201d, Proc. of IT Workshop, pp. 27\u201330, 1990."},{"key":"7_CR12","series-title":"Lect Notes Comput Sci","first-page":"223","volume-title":"Low-cost double size modular exponentiation or how to stretch your cryptocoprocessor","author":"P. Pailler","year":"1999","unstructured":"P. Pailler, \u201cLow-cost double size modular exponentiation or how to stretch your cryptocoprocessor\u201d, Proc. of Public Key Cryptography\u2019 99, Springer LNCS, vol. 1560, pp. 223\u2013234, 1999."},{"key":"7_CR13","unstructured":"J.-J. Quisquater, \u201cEncoding system according to the so-called RSA method, by means of a microcontroller and arrangement implementing this system\u201d, U.S. Patent #5,166,979, Nov. 24, 1992."},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Comm. of the ACM 21:120\u2013126, 1978.","journal-title":"Comm. of the ACM"},{"key":"7_CR15","series-title":"Lect Notes Comput Sci","first-page":"95","volume-title":"The RSA cryptographic Processor: The first High Speed One-Chip Solution","author":"H. Sedlak","year":"1987","unstructured":"H. Sedlak, \u201cThe RSA cryptographic Processor: The first High Speed One-Chip Solution\u201d, Proc. of EUROCRYPT\u2019 87, Springer LNCS, vol. 293, pp. 95\u2013105, 198."},{"key":"7_CR16","series-title":"Lect Notes Comput Sci","first-page":"503","volume-title":"CORSAIR, a smart card for public-key cryptosystems","author":"D. Waleffe de","year":"1990","unstructured":"D. de Waleffe, J.-J. Quisquater, \u201cCORSAIR, a smart card for public-key cryptosystems\u201d, Proc. of CRYPTO\u2019 90, Springer LNCS, vol. 537, pp. 503\u2013513, 1990."},{"key":"7_CR17","unstructured":"C. Walter, \u201cTechniques for the Hardware Implementation of Modular Multiplication\u201d, Proc. of 2nd IMACS Internat. Conf. on Circuits, Systems and Computers, vol. 2, pp. 945\u2013949, 1998."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:39:44Z","timestamp":1556825984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}