{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T23:03:34Z","timestamp":1747436614456},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602941"},{"type":"electronic","value":"9783540447863"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-60294-1_120","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T18:08:28Z","timestamp":1330279708000},"page":"261-271","source":"Crossref","is-referenced-by-count":4,"title":["FPLD-implementation of computations over finite fields GF(2m) with applications to error control coding"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Klindworth","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,2]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/S0019-9958(63)90129-3","volume":"6","author":"T. C. Bartee","year":"1963","unstructured":"T. C. Bartee and D. I. Schneider, Computation with finite fields, Inform. Contr., vol. 6, pp.79\u201398, Mar. 1963.","journal-title":"Inform. Contr."},{"key":"28_CR2","volume-title":"Algebraic Coding Theory","author":"E. R. Berlekamp","year":"1968","unstructured":"E. R. Berlekamp, Algebraic Coding Theory, New York: McGraw-Hill, 1968."},{"key":"28_CR3","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/PROC.1980.11696","volume":"68","author":"E.R. Berlekamp","year":"1980","unstructured":"E.R. Berlekamp, The Technology of Error-Correcting Codes, Proc. IEEE, vol.68, pp.564\u2013593, May 1980.","journal-title":"Proc. IEEE"},{"key":"28_CR4","unstructured":"R. E. Blahut, Theory and practice of error control codes, Addison-Wesley, 1983."},{"issue":"6","key":"28_CR5","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/TCAD.1987.1270347","volume":"CAD-6","author":"R. K. Brayton","year":"1987","unstructured":"R. K. Brayton et al., MIS: A Multiple-Level Logic Optimization System, IEEE Trans. on Computer Aided-Design, CAD-6(6), pp. 1062\u20131081, Nov. 1987","journal-title":"IEEE Trans. on Computer Aided-Design"},{"key":"28_CR6","volume-title":"Introduction to finite fields and their applications","author":"R. Lidl","year":"1986","unstructured":"R. Lidl and H. Niederreiter, Introduction to finite fields and their applications, London, New York: Cambridge University Press, 1986"},{"key":"28_CR7","volume-title":"Ph.D. Thesis No.159","author":"E. D. Mastrovito","year":"1988","unstructured":"E. D. Mastrovito, VLSI designs for computations over finite fields GF(2m), Ph.D. Thesis No.159, Dept.of Electr. Engineering, Link\u00f6ping Univ., Sweden, Dec. 1988."},{"key":"28_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","volume-title":"Finite Fields for Computer Scientists and Engineers","author":"R. J. McEliece","year":"1987","unstructured":"R. J. McEliece, Finite Fields for Computer Scientists and Engineers, Boston,MA: Kluwer Academic Publishers, 1987."},{"key":"28_CR9","volume-title":"The Theory of Error-Correcting Codes","author":"P. J. McWilliams","year":"1978","unstructured":"P. J. McWilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes, Amsterdam: North-Holland, 1978."},{"key":"28_CR10","unstructured":"H. Hoeve, J. Timmermans and L. B. Vries, Error correction and concealment in the Compact Disk system, Philips tech. Rev. 40, No. 6, 1982."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"J.-L. Politano and D. Deprey, A 30 Mbits\/s (255,223) Reed-Solomon Decoder, EUROCODE '90, Int't Symp. on Coding Theory and Applications, Udine, Italy, Nov. 1990.","DOI":"10.1007\/3-540-54303-1_148"},{"key":"28_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1693-0","volume-title":"An Introduction to Cryptology","author":"H. C. A. Tilborg van","year":"1988","unstructured":"H. C. A. van Tilborg, An Introduction to Cryptology; Boston, MA; Kluwer Academic Publishers, 1988."},{"key":"28_CR13","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/TC.1985.1676616","volume":"C-34","author":"C. C. Wang","year":"1985","unstructured":"C. C. Wang et. al., VLSI Architectures for Computing Multiplications and Inverses in GF(2m), IEEE Trans. Comput., vol. C-34, pp.709\u2013717, Aug. 1985.","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Field-Programmable Logic and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-60294-1_120.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:57:30Z","timestamp":1605646650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-60294-1_120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602941","9783540447863"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-60294-1_120","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}