{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:11:54Z","timestamp":1742958714506,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030783716"},{"type":"electronic","value":"9783030783723"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78372-3_15","type":"book-chapter","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T19:04:11Z","timestamp":1623179051000},"page":"393-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Kiyofumi","family":"Tanaka","sequence":"first","affiliation":[]},{"given":"Atsuko","family":"Miyaji","sequence":"additional","affiliation":[]},{"given":"Yaoan","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,9]]},"reference":[{"key":"15_CR1","unstructured":"https:\/\/gmplib.org\/"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Alrimeih, H., Rakhmatov, D.: Fast and flexible hardware support for ECC over multiple standard prime fields. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(12), 2661\u20132674 (2014)","DOI":"10.1109\/TVLSI.2013.2294649"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Yang, B.-Y.: Fast constant-time GCD computation and modular inversion. IACR Trans. Cryptogr. Hardw. Embedded Syst. 2019(3), 340\u2013398 (2019)","DOI":"10.46586\/tches.v2019.i3.340-398"},{"key":"15_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I Blake","year":"1999","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Dong, X., Zhang, L., Gao, X.: An efficient FPGA implementation of ECC modular inversion over $$F_{256}^{\\prime }$$. In: Proceedings International Conference on Cryptography, Security and Privacy, pp. 29\u201333 (2018)","DOI":"10.1145\/3199478.3199491"},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.compeleceng.2008.06.009","volume":"35","author":"S Ghosh","year":"2009","unstructured":"Ghosh, S., Alam, M., Chowdhury, D.R., Guputa, I.S.: Parallel crypto-devices for GF($$p$$) elliptic curve multiplication resistant against side channel attacks. Comput. Electr. Eng. 35(2), 329\u2013338 (2009)","journal-title":"Comput. Electr. Eng."},{"issue":"8","key":"15_CR7","first-page":"1798","volume":"58","author":"S Ghosh","year":"2011","unstructured":"Ghosh, S., Mukhopadhyay, D., Roychowdhury, D.: Petrel: power and timing attack resistant elliptic curve scalar multiplier based on programmable GF($$p$$) arithmetic unit. IEEE Trans. Circ. Syst. 58(8), 1798\u20131812 (2011)","journal-title":"IEEE Trans. Circ. Syst."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Guillermin, N.: A high speed coprocessor for elliptic curve scalar multiplications over $$\\mathbb{F}_p$$. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems, pp. 48\u201364 (2010)","DOI":"10.1007\/978-3-642-15031-9_4"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-85053-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"T G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Paar, C.: Ultra high performance ECC over NIST primes on commercial FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 62\u201378. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_5"},{"key":"15_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/b97644","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004). https:\/\/doi.org\/10.1007\/b97644"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Hossain, M.S., Kong, Y.: High-performance FPGA implementation of modular inversion over $$\\mathbb{F}_{256}$$ for elliptic curve cryptography. In: Proceedings of IEEE International Conference on Data Science and Data Intensive Systems, pp. 169\u2013174 (2015)","DOI":"10.1109\/DSDIS.2015.47"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1049\/iet-cdt.2016.0033","volume":"11","author":"MS Hossain","year":"2017","unstructured":"Hossain, M.S., Kong, Y., Saeedi, E., Vayalil, N.C.: High-performance elliptic curve cryptography processor over NIST prime fields. IET Comput. Digit. Tech. 11(1), 33\u201342 (2017)","journal-title":"IET Comput. Digit. Tech."},{"issue":"7","key":"15_CR13","doi-asserted-by":"publisher","first-page":"13p","DOI":"10.3390\/electronics7070104","volume":"7","author":"X Hu","year":"2018","unstructured":"Hu, X., Zheng, X., Zhang, S., Cai, S., Xiong, X.: A low hardware consumption elliptic curve cryptographic architecture over GF($$p$$) in embedded application. Electronics 7(7), 13p (2018)","journal-title":"Electronics"},{"issue":"5","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/6371403","volume":"2016","author":"K Javeed","year":"2016","unstructured":"Javeed, K., Wang, X.: FPGA based high speed SPA resistant elliptic curve scalar multiplier architecture. Int. J. Reconfig. Comput. 2016(5), 1\u201310 (2016)","journal-title":"Int. J. Reconfig. Comput."},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1002\/cta.2295","volume":"45","author":"K Javeed","year":"2016","unstructured":"Javeed, K., Wang, X.: Low latency flexible FPGA implementation of point multiplication on elliptic curves over GF($$p$$). Int. J. Circuit Theory Appl. 45(2), 214\u2013228 (2016)","journal-title":"Int. J. Circuit Theory Appl."},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/978-3-030-21548-4_36","volume-title":"Information Security and Privacy","author":"Y Jin","year":"2019","unstructured":"Jin, Y., Miyaji, A.: Secure and compact elliptic curve cryptosystems. In: Jang-Jaccard, J., Guo, F. (eds.) ACISP 2019. LNCS, vol. 11547, pp. 639\u2013650. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21548-4_36"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-642-05445-7_22","volume-title":"Selected Areas in Cryptography","author":"M Joye","year":"2009","unstructured":"Joye, M.: Highly regular m-Ary powering ladders. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 350\u2013363. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05445-7_22"},{"issue":"7","key":"15_CR18","first-page":"595","volume":"7","author":"AA Karatsuba","year":"1963","unstructured":"Karatsuba, A.A., Ofman, Y.: Multiplication of multidigit numbers on automata. Soviet Phys. Doklady 7(7), 595\u2013596 (1963)","journal-title":"Soviet Phys. Doklady"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"issue":"9","key":"15_CR21","doi-asserted-by":"publisher","first-page":"827","DOI":"10.35940\/ijitee.I7605.078919","volume":"8","author":"T Kudithi","year":"2019","unstructured":"Kudithi, T., Sakthivel, R.: An efficient hardware implementation of finite field inversion for elliptic curve cryptography. Int. J. Innov. Technol. Explor. Eng. 8(9), 827\u2013932 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng."},{"issue":"1","key":"15_CR22","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11227-018-02740-2","volume":"75","author":"T Kudithi","year":"2019","unstructured":"Kudithi, T., Sakthivel, R.: High-performance ECC processor architecture design for IoT security applications. J. Supercomput. 75(1), 447\u2013474 (2019). https:\/\/doi.org\/10.1007\/s11227-018-02740-2","journal-title":"J. Supercomput."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Le, D.-P., Nguyen, B.P.: Fast point quadrupling on elliptic curves. In: Proceedings of Symposium on Information and Communication Technology, pp. 218\u2013222 (2012)","DOI":"10.1145\/2350716.2350750"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Ma, Y., Liu, Z., Pan, W., Jing, J.: A high-speed elliptic curve cryptographic processor for generic curves over GF($$p$$). In: Proceedings of International Conference on Selected Areas in Cryptography, pp. 421\u2013437 (2013)","DOI":"10.1007\/978-3-662-43414-7_21"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Mamiya, H., Miyaji, A., Morimoto, H.: Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(8):2207\u20132215 (2006)","DOI":"10.1093\/ietfec\/e89-a.8.2207"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Marzouqi, H., Al-Qutayri, M., Salah, K., Saleh, H.: A 65 nm ASIC based 256 NIST prime field ECC processor. In: Proceedings of IEEE 59th International Midwest Symposium on Circuits and Systems, pp. 1\u20134 (2016)","DOI":"10.1109\/MWSCAS.2016.7870035"},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Marzouqi, H., Al-Qutayri, M., Salah, K., Schinianakis, D., Stouraitis, T.: A high-speed FPGA implementation of an RSD-based ECC processor. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 24(1), 151\u2013164 (2016)","DOI":"10.1109\/TVLSI.2015.2391274"},{"key":"15_CR28","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"15_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-45811-5_31","volume-title":"Information Security","author":"B M\u00f6ller","year":"2002","unstructured":"M\u00f6ller, B.: Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 402\u2013413. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45811-5_31"},{"issue":"170","key":"15_CR31","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"15_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-662-49890-3_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Renes","year":"2016","unstructured":"Renes, J., Costello, C., Batina, L.: Complete addition formulas for prime order elliptic curves. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 403\u2013428. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49890-3_16"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Shylashree, N., Sridhar, V., Patawardhan, D.: FPGA based efficient elliptic curve cryptosystem processor for NIST 256 prime field. In: Proceedings of IEEE Region 10 Conference, pp. 194\u2013199 (2016)","DOI":"10.1109\/TENCON.2016.7847988"},{"key":"15_CR34","unstructured":"Wu, X., Chouliaras, V., Goodall, R.: An application-specific processor hard macro for real-time control. In: Proceedings of IEEE International SOC Conference, pp. 369\u2013372 (2004)"},{"key":"15_CR35","unstructured":"Xilinx, Inc.: 7 Series FPGAs Data Sheet: Overview, DS180 (v2.6)"},{"key":"15_CR36","unstructured":"Xilinx, Inc.: UltraScale Architecture DSP Slice User Guide, UG579 (v1.10)"},{"key":"15_CR37","unstructured":"Xilinx, Inc.: Vivado Design Suite User Guide, Synthesis UG901 (v2020.1)"},{"key":"15_CR38","unstructured":"Xilinx, Inc.: ZCU104 Evaluation Board User Guide, UG1267 (v1.1)"},{"key":"15_CR39","unstructured":"Xilinx, Inc.: Zynq UltraScale+ MPSoC Data Sheet: Overview, DS891 (v1.8)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78372-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:30:52Z","timestamp":1709821852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78372-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030783716","9783030783723"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78372-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kamakura","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"186","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.89","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7.81","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference took place virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}