{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:11:28Z","timestamp":1725484288374},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540439967"},{"type":"electronic","value":"9783540456551"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45655-4_18","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T07:37:01Z","timestamp":1179733021000},"page":"153-161","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m)"],"prefix":"10.1007","author":[{"given":"Nam-Yeun","family":"Kim","sequence":"first","affiliation":[]},{"given":"Won-Ho","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,29]]},"reference":[{"key":"18_CR1","volume-title":"Error-correcting codes","author":"W.W. Peterson","year":"1972","unstructured":"W.W. Peterson, E.J. Weldon: Error-correcting codes. MIT Press, MA (1972)"},{"key":"18_CR2","volume-title":"Cryptography and data security","author":"D.E.R. Denning","year":"1983","unstructured":"D.E.R. Denning: Cryptography and data security. Addison-Wesley, MA (1983)"},{"key":"18_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"A. Menezes: Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, Boston (1993)"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Comm. ACM. 21 (1978) 120\u2013126","journal-title":"Comm. ACM."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1975.1055352","volume":"21","author":"I.S. Reed","year":"1975","unstructured":"I.S. Reed and T.K. Truong: The use of finite fields to compute convolutions. IEEE Trans. Inform. Theory, 21 (1975) 208\u2013213","journal-title":"IEEE Trans. Inform. Theory"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/82.633444","volume":"44","author":"S.W. Wei","year":"1997","unstructured":"S.W. Wei: VLSI architectures for computing exponentiations, multiplicative inverses, and divisions in GF(2m). Proc. IEEE Trans. Circuits and Systems. 44 (1997) 847\u2013855","journal-title":"Proc. IEEE Trans. Circuits and Systems"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/12.262128","volume":"43","author":"S.W. Wei","year":"1994","unstructured":"S.W. Wei: A Systolic Power-Sum Circuit for GF(2m). IEEE Trans. Computers. 43 (1994) 226\u2013229","journal-title":"IEEE Trans. Computers"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/12.841128","volume":"49","author":"C.L. Wang","year":"2000","unstructured":"C.L. Wang and J.H. Guo: New systolic arrays for C+AB2, inversion, and division in GF(2m). IEEE Trans. Computers 49 (2000) 1120\u20131125","journal-title":"IEEE Trans. Computers"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/BF02407028","volume":"10","author":"C.W. Wu","year":"1995","unstructured":"C.W. Wu and M.K. Chang: Bit-Level Systolic Arrays for Finite-Field Multiplications. Journal of VLSI Signal Processing. 10 (1995) 85\u201392","journal-title":"Journal of VLSI Signal Processing"},{"key":"18_CR10","unstructured":"S. Y. Kung: VLSI Array Processors. Prentice-Hall. 43 (1987)"},{"key":"18_CR11","volume-title":"Ph.D. thesis","author":"K. Y. Yoo","year":"1992","unstructured":"K. Y. Yoo: A Systolic Array Design Methodology for Sequential Loop Algorithms., Ph.D. thesis, Rensselaer Polytechnic Institute, New York (1992)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/BF02407028","volume":"10","author":"C. S. Yeh","year":"1995","unstructured":"C. S. Yeh, I. S. Reed, and T. K. Truong: Bit-Level Systolic Arrays for Finite-Field Multiplications. Journal of VLSI Signal Processing. 10 (1995) 85\u201392","journal-title":"Journal of VLSI Signal Processing"},{"key":"18_CR13","unstructured":"Daniel D. Gajski: Principles of Digital Design. Prentice-Hall international, INC. (1997)"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45655-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T16:03:47Z","timestamp":1550333027000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45655-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540439967","9783540456551"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45655-4_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}