{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:05:20Z","timestamp":1725483920635},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-45034-3_63","type":"book-chapter","created":{"date-parts":[[2007,5,20]],"date-time":"2007-05-20T08:38:50Z","timestamp":1179650330000},"page":"625-635","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Pre-processing for Large Window-Based Modular Exponentiation Using Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza de Macedo","family":"Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/0196-6774(89)90036-9","volume":"10","author":"R. Begeron","year":"1989","unstructured":"Begeron, R. Berstel, J, Brlek, S. and Duboc, C., Addition chains using continued fractions, Journal of Algorithms, no. 10, pp. 403\u2013412, 1989.","journal-title":"Journal of Algorithms"},{"key":"63_CR2","doi-asserted-by":"crossref","unstructured":"DeJong, K. and Spears, W.M., An analysis of the interacting roles of the population size and crossover type in genetic algorithms, In Parallel problem solving from nature, pp. 38\u201347, Springer-Verlag, 1990.","DOI":"10.1007\/BFb0029729"},{"key":"63_CR3","unstructured":"DeJong, K. and Spears, W.M., Using genetic algorithms to solve NP-complete problems, Proceedings of the Third International Conference on Genetic Algorithms, pp. 124\u2013132, Morgan Kaufmann, 1989."},{"key":"63_CR4","volume-title":"Practical genetic algorithms","author":"R.L. Haupt","year":"1998","unstructured":"Haupt, R.L. and Haupt, S.E., Practical genetic algorithms, John Wiley and Sons, New York, 1998."},{"key":"63_CR5","volume-title":"The Art of Programming: Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E., The Art of Programming: Seminumerical Algorithms, vol. 2. Reading, MA: Addison_Wesley, Second edition, 1981.","edition":"Second edition"},{"key":"63_CR6","volume-title":"High-speed RSA Implementation","author":"K. Ko\u00e7","year":"1994","unstructured":"Ko\u00e7, \u00c7.K., High-speed RSA Implementation, Technical report, RSA Laboratories, Redwood City, califirnia, USA, November 1994."},{"key":"63_CR7","first-page":"60","volume":"E83-A","author":"N. Kunihiro","year":"2000","unstructured":"Kunihiro, N. and Yamamoto, H., New methods for generating short addition chain, IEICE Transactions, vol. E83-A, no. 1, pp. 60\u201367, January 2000.","journal-title":"IEICE Transactions"},{"key":"63_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03315-9","volume-title":"Genetic algorithms + data structures = evolution program","author":"Z. Michalewics","year":"1996","unstructured":"Michalewics, Z., Genetic algorithms + data structures = evolution program, Springer-Verlag, USA, third edition, 1996.","edition":"third edition"},{"key":"63_CR9","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Elliptic curve public key cryptosystems, Kluwer Academic, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"63_CR10","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the Fifteenth International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N. and Mourelle, L.M., Minimal addition chains using genetic algorithms, Proceedings of the Fifteenth International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, Cairns, Australia, (to appear in Lecture Notes in Computer Science, Springer-Verlag), 2002."},{"key":"63_CR11","unstructured":"Neves, J., Rocha, M., Rodrigues, Biscaia, M. and Alves, J., Adaptive strategies and the design evolutionary applications, Proceedings of the Genetic and the Design of Evolutionary Computation Conference, Orlando, Florida, USA, 1999."},{"issue":"2","key":"63_CR12","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A. and Adleman, L., A method for obtaining digital signature and public-key cryptosystems, Communication of ACM, vol. 21, no.2, pp. 120\u2013126, 1978.","journal-title":"Communication of ACM"}],"container-title":["Lecture Notes in Computer Science","Developments in Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45034-3_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:08:13Z","timestamp":1605647293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45034-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540404552"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45034-3_63","relation":{},"subject":[]}}