{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:23:58Z","timestamp":1725488638850},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540564133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-47555-9_20","type":"book-chapter","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T23:23:49Z","timestamp":1186615429000},"page":"221-238","source":"Crossref","is-referenced-by-count":4,"title":["High-Speed Implementation Methods for RSA Scheme"],"prefix":"10.1007","author":[{"given":"Keiichi","family":"Iwamura","sequence":"first","affiliation":[]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[]},{"given":"Hideki","family":"Imai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"20_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA method of obtaining digital signatures and public key cryptosystems,\u201d Comm. of ACM, Vol.21, No.2, pp.120\u2013126, Feb. 1978.","journal-title":"Comm. of ACM"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"E.F. Brickell, \u201cA Survey of hardware implementation of RSA,\u201d Advances in Cryptology \u2014 CRYPTO\u201989, pp.368\u2013370, Springer-Verlag.","DOI":"10.1007\/0-387-34805-0_34"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"E.F. Brickell, \u201cA fast modular multiplication algorithm with applications to two key cryptography,\u201d Advances in Cryptology, Proc. of CRYPTO\u201982, pp.51\u201360, Plenum.","DOI":"10.1007\/978-1-4757-0602-4_5"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"S.R. Dusse and B.S. Kaliski Jr., \u201cA cryptographic library for the Motorola DSP56000,\u201d Advances in cryptology \u2014 EUROCRYPT\u201990, pp.230\u2013244, Springer-Verlag.","DOI":"10.1007\/3-540-46877-3_21"},{"key":"20_CR5","unstructured":"S. Even, \u201cSystolic modular multiplication,\u201d Advances in Cryptology \u2014 CRYPTO\u201990 pp.619\u2013624, Springer-Verlag."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"F. Hoornaert, M. Decroos, J. Vandewalle, and R. Govaerts, \u201cFast RSA-hardware: Dream or reality?\u201d Advances in Cryptology \u2014 CRYPTO\u201988, pp.257\u2013264, Springer-Verlag.","DOI":"10.1007\/3-540-45961-8_23"},{"key":"20_CR7","unstructured":"T. Hasebe, N. Torii, M. Azuma, and R. Akiyama, \u201cImplementation of high speed modular exponentiation calculation,\u201d Proc. IEICE Spring Conference, A-284, 1990."},{"key":"20_CR8","unstructured":"P.A. Ivey, S.N. Walker, S. Davidson, and J.M. Stern, \u201cA VLSI architecture for RSA encryption,\u201d Secure Design and Test of Crypto-Chips, IFIP WG 10.5 Workshop, Oct. 1991."},{"key":"20_CR9","unstructured":"S. Kawamura, \u201cA modulo multiplication algorithm using a small size residue table,\u201d Proc. Sympo. on Cryptography and Information Security, Session J, 1988."},{"key":"20_CR10","unstructured":"Y. Kano, N. Matsuzaki, and M. Tatebayashi, \u201cA modulo exponentiation LSI using high-order modified Booth\u2019s algorithm,\u201d Proc. Workshop on Cryptography and Information Security, WCIS87-11, 1987."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"M. Kochanski, \u201cDeveloping an RSA chip,\u201d Advances in Cryptology \u2014 CRYPTO\u201985, pp.350\u2013357, Springer-Verlag.","DOI":"10.1007\/3-540-39799-X_25"},{"issue":"6","key":"20_CR12","first-page":"764","volume":"24","author":"S. Miyaguchi","year":"1983","unstructured":"S. Miyaguchi, \u201cA fast computing scheme for RSA public-key cryptosystem and its VLSI organization,\u201d Trans. Info. Processing Soc. Japan, Vol.24, No.6, pp.764\u2013771, Nov. 1983.","journal-title":"Trans. Info. Processing Soc. Japan"},{"key":"20_CR13","unstructured":"H. Morita, \u201cA fast modular multiplication algorithm based on a radix 4 and its application,\u201d Trans. IEICE, Vol.73, No.7, July 1990."},{"key":"20_CR14","unstructured":"J.K. Omura, \u201cA public key cell design for smart card chips,\u201d Proc. 1990 Int. Symp. Info. Theory and Its Applications, 65\u20131, 1990."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"G. Orton, M. Roy, P. Scott, L. Peppard, and S. Tavares, \u201cVLSI implementation of public-key encryption algorithms,\u201d Advances in Cryptology \u2014 CRYPTO\u201986, pp.277\u2013301, Springer-Verlag.","DOI":"10.1007\/3-540-47721-7_22"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"H. Orup, E. Svendsen, and E. Andreasen, \u201cVICTOR an efficient RSA hardware implementation,\u201d Advances in Cryptology \u2014 EUROCRYPT\u201990, pp.245\u2013252, Springer-Verlag.","DOI":"10.1007\/3-540-46877-3_22"},{"key":"20_CR17","unstructured":"E. Okamoto and K. Tanaka, \u201cA realization of RSA cryptosystem using digital signal processor,\u201d Proc. Sympo. on Cryptography and Information Security, Session J, 1988."},{"issue":"21","key":"20_CR18","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.J. Quisquater","year":"1982","unstructured":"J.J. Quisquater and C. Couvreuer, \u201cFast decipherment algorithm for RSA public-key cryptosystem,\u201d Electron. Letters Vol.18, No.21, pp.905\u2013907, Oct. 1982.","journal-title":"Electron. Letters"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, \u201cRSA chips (past\/present\/future),\u201d Advances in Cryptology \u2014 EUROCRYPT\u201984, pp.159\u2013168, Springer-Verlag.","DOI":"10.1007\/3-540-39757-4_16"},{"key":"20_CR20","unstructured":"K. Takaragi, \u201cHardware of RSA encryption,\u201d Proc. Sympo. on Cryptography and Information Security, Session J, 1988."},{"key":"20_CR21","unstructured":"N. Torii, M. Azuma, and R. Akiyama, \u201cA study on high speed RSA encryption LSI using parallel processing,\u201d Proc. IEICE National Convention, p.1388, 1987."},{"key":"20_CR22","unstructured":"N. Torii, T. Hasebe, M. Azuma, and R. Akiyama, \u201cThe hardware technologies for RSA encryption systems,\u201d Proc. Sympo. on Cryptography and Information Security, Session J, 1988."},{"key":"20_CR23","unstructured":"K. Takabayashi, S. Kawamura and A. Shinbo, \u201cA modular exponentiation method using a fast constant multiplication algorithm,\u201d Proc. IEICE Spring Conference, A-285, 1990."},{"key":"20_CR24","unstructured":"C.D. Walter, \u201cFast modular multiplication by operand scaling,\u201d Abstracts of CRYPTO\u201991, pp.8-1\u20138-6."},{"key":"20_CR25","unstructured":"S. Waleffe and J.J. Quisquater, \u201cCORSAIR: a smart card for public key cryptosystems,\u201d Advances in Cryptology \u2014 CRYPTO\u201990, pp.475\u2013487, Springer-Verlag."},{"key":"20_CR26","unstructured":"Fujitsu Limited, \u201cASIC technical information,\u201d GATI0172C, 1988."},{"key":"20_CR27","unstructured":"Fujitsu Limited, \u201cCMOS standard cell design manual,\u201d MATI10702, 1988."},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"P.L. Montgomery, \u201cModular multiplication without trial division,\u201d Math.of Computation, Vol.44, pp.519\u2013521, 1985.","journal-title":"Math.of Computation"},{"key":"20_CR29","unstructured":"K. Iwamura, T. Matsumoto and H. Imai, \u201cSystolic-arrays for modular exponentiation using Montgomery method,\u201d presented in Rumpsession of Eurocrypt\u201992, May 24\u201328, 1992."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47555-9_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:56Z","timestamp":1605647636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47555-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540564133"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-47555-9_20","relation":{},"subject":[]}}