{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:13:40Z","timestamp":1758892420640,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441083"},{"type":"electronic","value":"9783540461173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46117-5_77","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:14:23Z","timestamp":1269897263000},"page":"750-759","source":"Crossref","is-referenced-by-count":10,"title":["Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2m)"],"prefix":"10.1007","author":[{"given":"Tim","family":"Kerins","sequence":"first","affiliation":[]},{"given":"Emanuel","family":"Popovici","sequence":"additional","affiliation":[]},{"given":"William","family":"Marnane","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Fitzpatrick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,16]]},"reference":[{"key":"77_CR1","series-title":"Lect Notes Comput Sci","first-page":"417","volume-title":"Use of Elliptic Curves in Cryptography. Advances in Cryptology Crypto\u201985","author":"V. S. Miller","year":"1985","unstructured":"V. S. Miller: Use of Elliptic Curves in Cryptography. Advances in Cryptology Crypto\u201985, Lecture Notes in Computer Science No. 218, Springer-Verlag Berlin, (1985) 417\u2013426."},{"key":"77_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz: Elliptic Curve Cryptosystems. Math Comp Vol. 48, (1987) 203\u2013209.","journal-title":"Math Comp"},{"key":"77_CR3","unstructured":"I. Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography, London Mathematical Society Lecture Note Series 265, Cambridge University Press (2000)."},{"key":"77_CR4","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/49.223883","volume":"11","author":"G. B. Agnew","year":"1993","unstructured":"G. B. Agnew, R. C. Mullin, S. A. Vanstone: An implementation of elliptic curve cryptosystems over F 2155, IEEE Transactions on Selected Areas in Communications. Vol. 11, (1993) 804\u2013813.","journal-title":"IEEE Transactions on Selected Areas in Communications"},{"key":"77_CR5","unstructured":"T. Kerins, E. Popovici, A. Daly, W. Marnane: Hardware Encryption Engines for E-Commerce, Proceesings of Irish Signals and Systems Conference (2002) 89\u201394."},{"key":"77_CR6","unstructured":"A. Dandalis, V. K. Prasanna: FPGA based cryptography for Internet Security, Online Syposium for Electronic Engineers, Nov 2000."},{"key":"77_CR7","unstructured":"M. Rosner: Elliptic Curve Cryptosystems on Reconfigurable Hardware, Masters Thesis, ECE Dept., Worchester Polytechnic Institute, Worchester USA (1998)."},{"issue":"1","key":"77_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-001-0011-x","volume":"15","author":"P. Gaudry","year":"2002","unstructured":"P. Gaudry, F. Hess, N. P. Smart: Constructive and Destructive Facets of Weil Descent on Elliptic Curves, Journal of Cryptology, Vol. 15, No.1 (2002) 19\u201346.","journal-title":"Journal of Cryptology"},{"key":"77_CR9","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Software Implementation of Elliptic Curve Cryptography Over Binary fields","author":"D. Hankerson","year":"2000","unstructured":"D. Hankerson J. L. Hernadez A. Menezes: Software Implementation of Elliptic Curve Cryptography Over Binary fields, Proceeeding of CHES 2000, Lecture Notes in Computer Science, 1965 Springer-Verlag, (2000) 1\u201324."},{"key":"77_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44499-8_3","volume-title":"A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m)","author":"G. Orlando","year":"2000","unstructured":"G. Orlando, C. Paar: A High-Performance Reconfigurable Elliptic Curve Processor for GF(2m), Proceedings of CHES 2000, Lecture Notes in Computer Science 1965, Springer-Verlag (2000). 41\u201356"},{"key":"77_CR11","doi-asserted-by":"crossref","unstructured":"K. H. Leung, K. W. Ma K. W. Wong P. H. W. Leong: FPGA implementation of a Microcoded Elliptic Curve Cryptographic Processor: Proceedings of Field Field-Programmable Custom Computing Machines (2000). 68\u201376","DOI":"10.1109\/FPGA.2000.903394"},{"key":"77_CR12","doi-asserted-by":"crossref","unstructured":"E. M. Popovici, P. Fitzpatrick: Algorithm and Architecture for a Galois Field Multiplicative Arithmetic Processor, submitted IEEE Trans on Information Theory Jan 2002.","DOI":"10.1109\/TIT.2003.820026"},{"key":"77_CR13","unstructured":"A. G. Popovici: Reconfigurable Computing, Masters Thesis, National Microelectronics Research Centre, Cork Ireland. (2001)."}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications: Reconfigurable Computing Is Going Mainstream"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46117-5_77","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:20:59Z","timestamp":1739992859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46117-5_77"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441083","9783540461173"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-46117-5_77","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}