{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:37:13Z","timestamp":1725496633343},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_44","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"620-624","source":"Crossref","is-referenced-by-count":5,"title":["Systolic Modular Multiplication"],"prefix":"10.1007","author":[{"given":"Shimon","family":"Even","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/PGEC.1965.264145","volume":"14","author":"A. J. Atrubin","year":"1965","unstructured":"Atrubin, A. J., \u201cA One-Dimensional Real-Time Iterative Multiplier\u201d, IEEE Tran. on Electronic Computers, Vol. 14, 1965, pp. 394\u2013399.","journal-title":"IEEE Tran. on Electronic Computers"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Dusse, S. R., and B. S. Kaliski Jr., \u201cA Cryptographic Library for the Motorola DSP 56000\u201d, EuroCrypt 90-Abstracts, May 21\u201324, 1990, Scanticon, Arhus, Denmark, pp. 213\u2013217.","DOI":"10.1007\/3-540-46877-3_21"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Orup, H., Svendsen, E., and E. Andreasen, \u201cVICTOR, An Efficient RSA Hardware Implementation\u201d, EuroCrypt 90-Abstracts, May 21\u201324, 1990, Scanticon, Arhus, Denmark, pp. 219\u2013227.","DOI":"10.1007\/3-540-46877-3_22"},{"key":"44_CR4","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. L. Montgomery","year":"1985","unstructured":"Montgomery, P. L., \u201cModular Multiplication Without Trial Division\u201d, Math. of Computation, Vol. 44, 1985, pp. 519\u2013521.","journal-title":"Math. of Computation"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:20Z","timestamp":1619572820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_44","relation":{},"subject":[]}}