{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:33:16Z","timestamp":1760160796714},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_16","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"175-186","source":"Crossref","is-referenced-by-count":45,"title":["Comparison of three modular reduction functions"],"prefix":"10.1007","author":[{"given":"Antoon","family":"Bosselaers","sequence":"first","affiliation":[]},{"given":"Ren\u00e9","family":"Govaerts","sequence":"additional","affiliation":[]},{"given":"Joos","family":"Vandewalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lect Notes Comput Sci","first-page":"311","volume-title":"Advances in Cryptology, Proc. Crypto\u201986","author":"P.D. Barrett","year":"1987","unstructured":"P.D. Barrett, \u201cImplementing the Riveat Shamir and Adleman public key encryption algorithm on a standard digital signal processor,\u201d Advances in Cryptology, Proc. Crypto\u201986, LNCS 263, A.M. Odlyzko, Ed., Springer-Verlag, 1987, pp. 311\u2013323."},{"key":"16_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-46877-3_21","volume-title":"Advances in Cryptology, Proc. Eurocrypt\u201990","author":"S.R. Duss\u00e9","year":"1991","unstructured":"S.R. Duss\u00e9 and B.S. Kaliski, \u201cA cryptographic library for the Motorola DSP56000,\u201d Advances in Cryptology, Proc. Eurocrypt\u201990, LNCS 473, I.B. Damg\u00e5rd, Ed., Springer-Verlag, 1991, pp. 230\u2013244."},{"key":"16_CR3","unstructured":"K. Hensel, Theorie der algebraischen Zahlen, Leipzig, 1908."},{"key":"16_CR4","unstructured":"\u201cAmerican National Standard for Programming Languages\u2014C,\u201d ISO\/IEC Standard 9899:1990, International Standards Organization, Geneva, 1990."},{"key":"16_CR5","volume-title":"Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"D.E. Knuth, The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, 2nd Edition, Addiaon-Wesley, Reading, Mass., 1981.","edition":"2nd Edition"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"P.L. Montgomery, \u201cModular multiplication without trial division,\u201d Mathematics of Computation, Vol. 44, 1985, pp. 519\u2013521.","journal-title":"Mathematics of Computation"},{"key":"16_CR7","unstructured":"J.-J. Quisquater, presentation at the rump session of Eurocrypt\u201990."},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"M.O. Rabin","year":"1980","unstructured":"M.O. Rabin, \u201cProbabilistic algorithms for testing primality,\u201d J. of Number Theory, Vol. 12, 1980, pp. 128\u2013128.","journal-title":"J. of Number Theory"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/ARITH.1993.378085","volume-title":"Proceedings of the 11th IEEE Symposium on Computer Arithmetic","author":"M. Shand","year":"1993","unstructured":"M. Shand and J. Vuillemin, \u201cFast Implementations of RSA cryptography,\u201d Proceedings of the 11th IEEE Symposium on Computer Arithmetic, IEEE Computer Society Press, Los Alamitos, CA, 1993, pp. 252\u2013259."},{"key":"16_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-46766-1_26","volume-title":"Advances in Cryptology, Proc. Crypto\u201991","author":"C.D. Walter","year":"1992","unstructured":"CD. Walter, \u201cFaster modular multiplication by operand scaling,\u201d Advances in Cryptology, Proc. Crypto\u201991, LNCS 576, J. Feigenbaum, Ed., Springer-Verlag, 1992, pp. 313\u2013323."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:33Z","timestamp":1605647733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_16","relation":{},"subject":[]}}