{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:13:32Z","timestamp":1746245612548,"version":"3.40.4"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_14","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T04:22:02Z","timestamp":1400646122000},"page":"215-234","source":"Crossref","is-referenced-by-count":18,"title":["New Speed Records for Montgomery Modular Multiplication on 8-Bit AVR Microcontrollers"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Liu","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Atmel Corporation. 8-bit ARV\u00ae Instruction Set. User Guide (July 2008), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc0856.pdf"},{"key":"14_CR2","unstructured":"Atmel Corporation. 8-bit ARV\u00ae Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet (June 2008), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S. Barreto","year":"2002","unstructured":"Barreto, P.S., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P. Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"14_CR5","unstructured":"CertiVox Corporation. CertiVox MIRACL SDK. Source code (June 2012), http:\/\/www.certivox.com"},{"issue":"4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1147\/sj.294.0526","volume":"29","author":"P.G. Comba","year":"1990","unstructured":"Comba, P.G.: Exponentiation cryptosystems on the IBM PC. IBM Systems Journal\u00a029(4), 526\u2013538 (1990)","journal-title":"IBM Systems Journal"},{"issue":"6","key":"14_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-46877-3_21","volume-title":"Advances in Cryptology - EUROCRYPT \u201990","author":"S.R. Duss\u00e9","year":"1991","unstructured":"Duss\u00e9, S.R., Kaliski Jr., B.S.: A cryptographic library for the Motorola DSP 56000. In: Damg\u00e5rd, I.B. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 230\u2013244. Springer, Heidelberg (1991)"},{"issue":"1","key":"14_CR9","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11545262_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"J. Gro\u00dfsch\u00e4dl","year":"2005","unstructured":"Gro\u00dfsch\u00e4dl, J., Avanzi, R.M., Sava\u015f, E., Tillich, S.: Energy-efficient software implementation of long integer modular arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-540-45203-4_32","volume-title":"Applied Cryptography and Network Security","author":"J. Gro\u00dfsch\u00e4dl","year":"2003","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Architectural enhancements for montgomery multiplication on embedded RISC processors. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 418\u2013434. Springer, Heidelberg (2003)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-39881-3_22","volume-title":"Security in Pervasive Computing","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Optimized RISC architecture for multiple-precision modular arithmetic. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing 2003. LNCS, vol.\u00a02802, pp. 253\u2013270. Springer, Heidelberg (2004)"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit cPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"14_CR14","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer (2004)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-23951-9_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M. Hutter","year":"2011","unstructured":"Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 459\u2013474. Springer, Heidelberg (2011)"},{"issue":"7","key":"14_CR16","first-page":"595","volume":"7","author":"A.A. Karatsuba","year":"1963","unstructured":"Karatsuba, A.A., Ofman, Y.P.: Multiplication of multidigit numbers on automata. Soviet Physics - Doklady\u00a07(7), 595\u2013596 (1963)","journal-title":"Soviet Physics - Doklady"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"\u00c7.K. Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, \u00c7.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro\u00a016(3), 26\u201333 (1996)","journal-title":"IEEE Micro"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245\u2013256. IEEE Computer Society Press (2008)","DOI":"10.1109\/IPSN.2008.47"},{"key":"14_CR19","unstructured":"Liu, Z., Gro\u00dfsch\u00e4dl, J., Kizhvatov, I.: Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers. In: Proceedings of the 1st International Workshop on the Security of the Internet of Things, SECIOT 2010 (2010)"},{"key":"14_CR20","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer (2007)"},{"issue":"170","key":"14_CR21","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"14_CR22","unstructured":"National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS). FIPS Publication 186-4 (July 2013), http:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf"},{"issue":"2","key":"14_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"14_CR24","unstructured":"Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007\/299 (2007), http:\/\/eprint.iacr.org"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-35416-8_5","volume-title":"Information Security Applications","author":"H. Seo","year":"2012","unstructured":"Seo, H., Kim, H.: Multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol.\u00a07690, pp. 55\u201367. Springer, Heidelberg (2012)"},{"issue":"3","key":"14_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.7763\/IJCCE.2013.V2.183","volume":"2","author":"H. Seo","year":"2013","unstructured":"Seo, H., Kim, H.: Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors. International Journal of Computer and Communication Engineering\u00a02(3), 255\u2013259 (2013)","journal-title":"International Journal of Computer and Communication Engineering"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73275-4_6","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Uhsadel","year":"2007","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: Enabling full-size public-key algorithms on 8-bit sensor nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 73\u201386. Springer, Heidelberg (2007)"},{"issue":"21","key":"14_CR28","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1049\/el:19991230","volume":"38","author":"C.D. Walter","year":"1999","unstructured":"Walter, C.D.: Montgomery exponentiation needs no final subtractions. Electronics Letters\u00a038(21), 1831\u20131832 (1999)","journal-title":"Electronics Letters"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-28632-5_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"C.D. Walter","year":"2004","unstructured":"Walter, C.D.: Simple power analysis of unified code for ECC double and add. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 191\u2013204. Springer, Heidelberg (2004)"},{"key":"14_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/3-540-45353-9_15","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"C.D. Walter","year":"2001","unstructured":"Walter, C.D., Thompson, S.: Distinguishing exponent digits by observing modular subtractions. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 192\u2013207. Springer, Heidelberg (2001)"},{"issue":"2","key":"14_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/ip-cdt:20020235","volume":"149","author":"T. Yan\u0131k","year":"2002","unstructured":"Yan\u0131k, T., Sava\u015f, E., K. Ko\u00e7, \u00c7.: Incomplete reduction in modular arithmetic. IEE Proceedings \u2013 Computers and Digital Techniques\u00a0149(2), 46\u201352 (2002)","journal-title":"IEE Proceedings \u2013 Computers and Digital Techniques"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Gro\u00dfsch\u00e4dl, J.: Efficient prime-field arithmetic for elliptic curve cryptography on wireless sensor nodes. In: Proceedings of the 1st International Conference on Computer Science and Network Technology (ICCSNT 2011), vol.\u00a01, pp. 459\u2013466. IEEE (2011)","DOI":"10.1109\/ICCSNT.2011.6181997"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:09:32Z","timestamp":1746230972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}