{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:04:06Z","timestamp":1748577846472,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319213552"},{"type":"electronic","value":"9783319213569"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21356-9_7","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T01:20:09Z","timestamp":1436923209000},"page":"94-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform"],"prefix":"10.1007","author":[{"given":"Nele","family":"Mentens","sequence":"first","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]},{"given":"Sel\u00e7uk","family":"Bakt\u0131r","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"7_CR1","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"RM Avanzi","year":"2005","unstructured":"Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall\/CRC, Boca Raton (2005)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/11902140_103","volume-title":"Computer and Information Sciences \u2013 ISCIS 2006","author":"S Bakt\u0131r","year":"2006","unstructured":"Bakt\u0131r, S., Sunar, B.: Finite field polynomial multiplication in the frequency domain with application to elliptic curve cryptography. In: Levi, A., Sava\u015f, E., Yenig\u00fcn, H., Balc\u0131soy, S., Sayg\u0131n, Y. (eds.) ISCIS 2006. LNCS, vol. 4263, pp. 991\u20131001. Springer, Heidelberg (2006)"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11036-007-0022-4","volume":"12","author":"S Baktir","year":"2007","unstructured":"Baktir, S., Kumar, S., Paar, C., Sunar, B.: A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain. Mob. Netw. Appl. 12(4), 259\u2013270 (2007)","journal-title":"Mob. Netw. Appl."},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"DJ Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 29\u201350. Springer, Heidelberg (2007)"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TVLSI.2007.912228","volume":"16","author":"WN Chelton","year":"2008","unstructured":"Chelton, W.N., Benaissa, M.: Fast elliptic curve cryptography on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 16(2), 198\u2013205 (2008)","journal-title":"IEEE Trans. Very Large Scale Integr. Syst."},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity. IEEE Trans. Comput. 53(6), 760\u2013768 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"HM Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Am. Math. Soc."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. Math. Comp. 48, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 388. Springer, Heidelberg (1999)"},{"issue":"11","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"YK Lee","year":"2008","unstructured":"Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic curve based security processor for RFID. IEEE Transact. Comput. 57(11), 1514\u20131527 (2008)","journal-title":"IEEE Transact. Comput."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Lutz, J., Hasan, A.: High performance FPGA based elliptic curve cryptographic co-processor. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2004), vol. 2, p. 486. IEEE Computer Society (2004)","DOI":"10.1109\/ITCC.2004.1286701"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Mentens, N., \u00efrs, S.B., Preneel, B.: An FPGA implementation of an elliptic curve processor GF$$(2^m)$$. In: Proceedings of the 14th ACM Great Lakes Symposium on VLSI, GLSVLSI 2004, pp. 454\u2013457. ACM (2004)","DOI":"10.1145\/988952.989062"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"7_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P Montgomery","year":"1987","unstructured":"Montgomery, P.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Morales-Sandoval, M., Feregrino-Uribe, C., Cumplido, R., Algredo-Badillo, I.: A reconfigurable GF$$(2^m)$$ elliptic curve cryptographic coprocessor. In: 2011 VII Southern Conference on Programmable Logic (SPL), pp. 209\u2013214, April 2011","DOI":"10.1109\/SPL.2011.5782650"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44499-8_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"G Orlando","year":"2000","unstructured":"Orlando, G., Paar, C.: A high-performance reconfigurable elliptic curve processor for GF$$(2^m)$$. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, p. 41. Springer, Heidelberg (2000)"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1090\/S0025-5718-1971-0301966-0","volume":"25","author":"JM Pollard","year":"1971","unstructured":"Pollard, J.M.: The fast fourier transform in a finite field. Math. Comput. 25, 365\u2013374 (1971)","journal-title":"Math. Comput."}],"container-title":["Lecture Notes in Computer Science","Cryptography and Information Security in the Balkans"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21356-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:15:58Z","timestamp":1748499358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21356-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319213552","9783319213569"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21356-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}