{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:40:01Z","timestamp":1748814001817,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319313009"},{"type":"electronic","value":"9783319313016"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31301-6_9","type":"book-chapter","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T21:11:22Z","timestamp":1458335482000},"page":"161-177","source":"Crossref","is-referenced-by-count":8,"title":["ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)"],"prefix":"10.1007","author":[{"given":"Debapriya Basu","family":"Roy","sequence":"first","affiliation":[]},{"given":"Poulami","family":"Das","sequence":"additional","affiliation":[]},{"given":"Debdeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"56","key":"9_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.micpro.2004.03.006","volume":"28","author":"A Daly","year":"2004","unstructured":"Daly, A., Marnane, W., Kerins, T., Popovici, E.: An FPGA implementation of a GF(p) ALU for encryption processors. Microprocess. Microsyst. 28(56), 253\u2013260 (2004). Special Issue on FPGAs: Applications and Designs","journal-title":"Microprocess. Microsyst."},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/11964254_3","volume-title":"Security and Privacy in Ad-Hoc and Sensor Networks","author":"L Batina","year":"2006","unstructured":"Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost elliptic curve cryptography for wireless sensor networks. In: Butty\u00e1n, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 6\u201317. Springer, Heidelberg (2006)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-85053-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"T G\u00fcneysu","year":"2008","unstructured":"G\u00fcneysu, T., Paar, C.: Ultra high performance ECC over NIST primes on commercial FPGAs. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 62\u201378. Springer, Heidelberg (2008)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TC.2003.1190586","volume":"52","author":"A Satoh","year":"2003","unstructured":"Satoh, A., Takano, K.: A scalable dual-field elliptic curve cryptographic processor. IEEE Trans. Comput. 52, 449\u2013460 (2003)","journal-title":"IEEE Trans. Comput."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","first-page":"356","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"G Orlando","year":"2001","unstructured":"Orlando, G., Paar, C.: A scalable $$GF$$ G F ( $$p$$ p ) elliptic curve processor architecture for programmable hardware. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 356\u2013371. Springer, Heidelberg (2001)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Alrimeih, H., Rakhmatov, D.: Pipelined modular multiplier supporting multiple standard prime fields. In: 2014 IEEE 25th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), pp. 48\u201356, June 2014","DOI":"10.1109\/ASAP.2014.6868630"},{"key":"9_CR7","unstructured":"Roy, D.B., Mukhopadhyay, D., Izumi, M., Takahashi, J., Multiplication, T.B.: An efficient strategy to optimize DSP multiplier for accelerating prime field ECC for NIST curves. In: The 51st Annual Design Automation Conference, DAC 2014, San Francisco, CA, USA, 1\u20135 June 2014, pp. 177:1\u2013177:6 (2014)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Kim, C.-J., Yun, S.-Y., Park, S.-C.: A lightweight ECC algorithm for mobile RFID service. In: Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications (CUTE 2010), pp. 1\u20136, December 2010","DOI":"10.1109\/ICUT.2010.5678170"},{"issue":"10","key":"9_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.-H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 116 (2014)","journal-title":"J. Med. Syst."},{"key":"9_CR10","unstructured":"Varchola, M., G\u00fcneysu, T., Mischke, O.: MicroECC: a lightweight reconfigurable elliptic curve crypto-processor. In: International Conference on Reconfigurable Computing and FPGAs, ReConFig 2011, Cancun, Mexico, November 30\u2013December 2, 2011, pp. 204\u2013210 (2011)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Vliegen, J., Mentens, N,. Genoe, J., Braeken, A., Kubera, S., Touhafi, A., Verbauwhede, I:. A compact FPGA-based architecture for elliptic curve cryptography over prime fields. In: 21st IEEE International Conference on Application-Specific Systems Architectures and Processors, ASAP 2010, Rennes, France, 7\u20139 July 2010, pp. 313\u2013316 (2010)","DOI":"10.1109\/ASAP.2010.5540977"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11265-009-0376-x","volume":"59","author":"LA Tawalbeh","year":"2010","unstructured":"Tawalbeh, L.A., Mohammad, A., Gutub, A.A.-A.: Efficient FPGA implementation of a programmable architecture for GF(p) elliptic curve crypto computations. Signal Process. Syst. 59(3), 233\u2013244 (2010)","journal-title":"Signal Process. Syst."},{"issue":"2","key":"9_CR13","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.compeleceng.2008.06.009","volume":"35","author":"S Ghosh","year":"2009","unstructured":"Ghosh, S., Alam, M., Chowdhury, D.R., Gupta, I.S.: Parallel crypto-devices for GF(P) elliptic curve multiplication resistant against side channel attacks. Comput. Electr. Eng. 35(2), 329\u2013338 (2009)","journal-title":"Comput. Electr. Eng."},{"key":"9_CR14","unstructured":"Xilinx Inc.: Virtex-II and Virtex-II Pro X FPGA User Guide, 14 February 2011"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Driessen, B., G\u00fcneysu, T., Kavun, E.B., Mischke, O., Paar, C., P\u00f6ppelmann, T.: IPSecco: a lightweight and reconfigurable IPSec core. In: International Conference on Reconfigurable Computing and FPGAs, ReConFig 2012, Cancun, Mexico, 5\u20137 December 2012, pp. 1\u20137 (2012)","DOI":"10.1109\/ReConFig.2012.6416757"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-319-05960-0_24","volume-title":"Reconfigurable Computing: Architectures, Tools, and Applications","author":"C P\u00f6pper","year":"2014","unstructured":"P\u00f6pper, C., Mischke, O., G\u00fcneysu, T.: MicroACP - a fast and secure reconfigurable asymmetric crypto-processor. In: Goehringer, D., Santambrogio, M.D., Cardoso, J.M.P., Bertels, K. (eds.) ARC 2014. LNCS, vol. 8405, pp. 240\u2013247. Springer, Heidelberg (2014)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Himmighofen, A., Jungk, B., Reith, S.: On a FPGA-based method for authentication using edwards curves. In: 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Darmstadt, Germany, 10\u201312 July 2013, pp. 1\u20137 (2013)","DOI":"10.1109\/ReCoSoC.2013.6581530"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Fan, J., Batina, L., Verbauwhede, I.: Light-weight Implementation options for curve-based cryptography: HECC is also ready for RFID. In: ICITST, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICITST.2009.5402516"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Kavun, E.B., Yalcin, T.: RAM-based ultra-lightweight FPGA implementation of PRESENT. In: International Conference on Reconfigurable Computing and FPGAs (ReConFig 2011), pp. 280\u2013285, November 2011","DOI":"10.1109\/ReConFig.2011.74"},{"key":"9_CR20","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2003)"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1177\/002072098802500408","volume":"25","author":"F Mavaddat","year":"1988","unstructured":"Mavaddat, F., Parhamt, B.: URISC: the ultimate reduced instruction set computer. Int. J. Electr. Eng. Educ. 25, 327\u2013334 (1988)","journal-title":"Int. J. Electr. Eng. Educ."},{"key":"9_CR22","series-title":"The Springer International Series in Engineering and Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0237-1","volume-title":"Computer Architecture : A Minimalist Perspective","author":"WF Gilreath","year":"2003","unstructured":"Gilreath, W.F., Laplante, P.A.: Computer Architecture : A Minimalist Perspective. The Springer International Series in Engineering and Computer Science. Springer, New York (2003)"},{"key":"9_CR23","unstructured":"Naccache, D.: Is theoretical cryptography any good in practice? In: CHES (2010)"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-41224-0_2","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"NG Tsoutsos","year":"2013","unstructured":"Tsoutsos, N.G., Maniatakos, M.: Investigating the application of one instruction set computing for encrypted data computation. In: Gierlichs, B., Guilley, S., Mukhopadhyay, D. (eds.) SPACE 2013. LNCS, vol. 8204, pp. 21\u201337. Springer, Heidelberg (2013)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P., Tinyecc,: A configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN, pp. 245\u2013256. IEEE Computer Society (2008)","DOI":"10.1109\/IPSN.2008.47"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2015"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31301-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:09:05Z","timestamp":1748812145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31301-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319313009","9783319313016"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31301-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}