{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:38Z","timestamp":1759133918624},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540611868"},{"type":"electronic","value":"9783540683391"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_15","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:31:14Z","timestamp":1186363874000},"page":"166-177","source":"Crossref","is-referenced-by-count":21,"title":["New Modular Multiplication Algorithms for Fast Modular Exponentiation"],"prefix":"10.1007","author":[{"given":"Seong-Min","family":"Hong","sequence":"first","affiliation":[]},{"given":"Sang-Yeop","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"15_CR1","first-page":"400","volume":"89","author":"J. Bos","year":"1989","unstructured":"J. Bos, M. Coster: Addition chain heuristics. Crypto\u201989, 400\u2013407 (1989)","journal-title":"Crypto\u2019"},{"key":"15_CR2","unstructured":"D.E. Knuth: The art of computer programming Vol.2. Addison-Wesley, Inc. (1981)"},{"key":"15_CR3","unstructured":"M.J. Coster: Some algorithms on addition chains and their complexity. CWI Report CS-R9024 (1990)"},{"key":"15_CR4","first-page":"222","volume":"90","author":"Y. Yacobi","year":"1991","unstructured":"Y. Yacobi: Exponentiating faster with addition chains. Eurocrypt\u201990, 222\u2013229 (1991)","journal-title":"Eurocrypt\u2019"},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"10","author":"P. Downey","year":"1981","unstructured":"P. Downey, B. Leong, R. Sethi: Computing sequences with addition chains. SIAM J. Comput., vol.10, NO.3, August, 638\u2013646 (1981)","journal-title":"SIAM J. Comput."},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1049\/el:19890785","volume":"25","author":"J. Jedwab","year":"1989","unstructured":"J. Jedwab, C.J. Mitchell: Minimum weight modified signed-digit representations and fast exponentiation. Electronics Letters, vol.25, 1171\u20131172 (1989)","journal-title":"Electronics Letters"},{"issue":"3","key":"15_CR7","first-page":"166","volume":"136","author":"A. Selby","year":"1989","unstructured":"A. Selby, C. Mitcheil: Algorithms for software implementations of RSA. IEE Proceedings(E), vol.136, NO.3, May\u201d, 166\u2013170 (1989)","journal-title":"IEE Proceedings(E)"},{"issue":"6","key":"15_CR8","first-page":"644","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman: New directions in cryptography. IEEE Trans. Computers, vol.IT-22, NO.6, June, 644\u2013654 (1976)","journal-title":"IEEE Trans. Computers"},{"issue":"5","key":"15_CR9","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/5.4442","volume":"76","author":"W. Diffie","year":"1988","unstructured":"W. Diffie: The first ten years of public-key cryptography. Proceeding of the IEEE, vol.76, NO.5, May, 560\u2013576 (1988)","journal-title":"Proceeding of the IEEE"},{"key":"15_CR10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, L. Adleman: A method for obtaining digital signatures and public key cryptosystems. CACM, vol.21, 120\u2013126 (1978)","journal-title":"CACM"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGmal","year":"1985","unstructured":"T. ElGmal: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, vol.IT-31, NO.4, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"P.L. Montgomery: Modular multiplication without trial division. Mathematics of Computation, vol.44, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"15_CR13","first-page":"371","volume":"89","author":"P. Findlay","year":"1990","unstructured":"P. Findlay, B. Johnson: Modular exponentiation using recursive sums of residues. Crypto\u201989, 371\u2013386 (1990)","journal-title":"Crypto\u2019"},{"key":"15_CR14","first-page":"175","volume":"93","author":"A. Bosselaers","year":"1994","unstructured":"A. Bosselaers, R. Govaerts, J. Vandewalle: Comparison of three modular reduction functions. Crypto\u201993, 175\u2013186 (1994)","journal-title":"Crypto\u2019"},{"issue":"8","key":"15_CR15","first-page":"2136","volume":"E-74","author":"S. Kawamura","year":"1991","unstructured":"S. Kawamura, K. Takabayashi, A. Shimbo: A fast modular exponentiation algorithm. IEICE Transactions., vol.E-74, NO.8, August, 2136\u20132142 (1991)","journal-title":"IEICE Transactions."},{"issue":"1","key":"15_CR16","first-page":"70","volume":"E76-A","author":"H. Morita","year":"1993","unstructured":"H. Morita, C. Yang: A modular-multiplication algorithm using lookahead determination. IEICE Trans. Fundamentals, vol.E76-A, NO.1, January, 70\u201377 (1993)","journal-title":"IEICE Trans. Fundamentals"},{"key":"15_CR17","first-page":"311","volume":"96","author":"P. Barrett","year":"1987","unstructured":"P. Barrett: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. Crypto\u201996, 311\u2013323 (1987)","journal-title":"Crypto\u2019"},{"key":"15_CR18","first-page":"230","volume":"90","author":"S.R. Dusse","year":"1991","unstructured":"S.R. Dusse, B.S. Kaliski: A cryptographic library for the motorola DSP56000. Eurocrypt\u201990, 230\u2013244 (1991)","journal-title":"Eurocrypt\u2019"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T23:09:10Z","timestamp":1550704150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1996]]}}}