{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:26Z","timestamp":1725562406553},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540209966"},{"type":"electronic","value":"9783540246602"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24660-2_21","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:18:44Z","timestamp":1280762324000},"page":"264-277","source":"Crossref","is-referenced-by-count":1,"title":["High-Speed Modular Multiplication"],"prefix":"10.1007","author":[{"given":"Wieland","family":"Fischer","sequence":"first","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","first-page":"311","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P. Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","first-page":"311","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"E.F. Brickell","year":"1987","unstructured":"Brickell, E.F.: A fast modular multiplication algorithm with application to two key cryptography. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A.D. Booth","year":"1951","unstructured":"Booth, A.D.: A signed binary multiplication technique. Q. J. Mech. Appl. Math.\u00a04(2), 236\u2013240 (1951)","journal-title":"Q. J. Mech. Appl. Math."},{"issue":"23","key":"21_CR4","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.1049\/el:19971293","volume":"33","author":"J.-F. Dhem","year":"1997","unstructured":"Dhem, J.-F., Joye, M., Quisquater, J.-J.: Normalisation in diminished-radix modulus transformation. Electronics Letters\u00a033(23), 1931 (1997)","journal-title":"Electronics Letters"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/10721064_31","volume-title":"Smart Card. Research and Applications","author":"J.-F. Dhem","year":"2000","unstructured":"Dhem, J.-F., Quisquater, J.-J.: Recent results on modular multiplication for smart cards. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 336\u2013357. Springer, Heidelberg (2000)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-36400-5_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"W. Fischer","year":"2003","unstructured":"Fischer, W., Seifert, J.-P.: Increasing the bitlength of a crypto-coprocessor. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 71\u201381. Springer, Heidelberg (2003)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1007\/978-3-540-24587-2_74","volume-title":"Algorithms and Computation","author":"W. Fischer","year":"2003","unstructured":"Fischer, W., Seifert, J.-P.: Unfolded modular multiplication. In: Ibaraki, T., Katoh, N., Ono, H. (eds.) ISAAC 2003. LNCS, vol.\u00a02906, pp. 726\u2013735. Springer, Heidelberg (2003)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Gro\u00dfsch\u00e4del, J.: A bit-serial unified multiplier architecture for finite fields GF(p) and GF(2 m ). In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 206\u2013223. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-44709-1_18"},{"issue":"7","key":"21_CR9","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"M. Joye","year":"2000","unstructured":"Joye, M., Yen, S.-M.: Optimal left-to-right binary signed-digit exponent recoding. IEEE Transactions on Computers\u00a049(7), 740\u2013748 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"21_CR10","volume-title":"Computer Arithmetic Algorithms","author":"I. Koren","year":"1998","unstructured":"Koren, I.: Computer Arithmetic Algorithms. Brookside Court Publishers, Amherst (1998)"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/JRPROC.1961.287779","volume":"49","author":"O.L. MacSorley","year":"1961","unstructured":"MacSorley, O.L.: High-speed arithmetic in binary computers. Proc. IRE\u00a049, 67\u201391 (1961)","journal-title":"Proc. IRE"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Math. of Computation"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Naccache, D., M\u2019Raihi, D.: Arithmetic co-processors for public-key cryptography: The state of the art. IEEE Micro, 14\u201324 (1996)","DOI":"10.1109\/40.502402"},{"key":"21_CR14","unstructured":"Omura, J.: A public key cell design for smart card chips. In: Proc. of IT Workshop, pp. 27\u201330 (1990)"},{"key":"21_CR15","volume-title":"Computer Arithmetic","author":"B. Parhami","year":"2000","unstructured":"Parhami, B.: Computer Arithmetic. Oxford University Press, New York (2000)"},{"key":"21_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-322-92149-9","volume-title":"Arithmetik in Rechenanlagen","author":"O. Spaniol","year":"1976","unstructured":"Spaniol, O.: Arithmetik in Rechenanlagen. B. G. Teubner, Stuttgart (1976)"},{"key":"21_CR17","unstructured":"Quisquater, J.-J.: Encoding system according to the so-called RSA method, by means of a microcontroller and arrangement implementing this system, U.S. Patent #5,166,979, November 24 (1992)"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Comm. of the ACM"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Savas, E., Tenca, A.F., Koc, C.K.: A scalable and unified multiplier architecture for finite fields $\\mathbb{F}_{p}$ and $\\mathbb{F}_{2}$ k . In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, p. 277. Springer, Heidelberg (2000)","DOI":"10.1007\/3-540-44499-8_22"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-39118-5_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201987","author":"H. Sedlak","year":"1988","unstructured":"Sedlak, H.: The RSA cryptographic Processor: The first High Speed One-Chip Solution. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol.\u00a0304, pp. 95\u2013105. Springer, Heidelberg (1988)"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/3-540-38424-3_35","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"D. Waleffe de","year":"1991","unstructured":"de Waleffe, D., Quisquater, J.-J.: CORSAIR, a smart card for public-key cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 503\u2013513. Springer, Heidelberg (1991)"},{"key":"21_CR22","unstructured":"Walter, C.: Techniques for the Hardware Implementation of Modular Multiplication. In: Proc. of 2nd IMACS Internat. Conf. on Circuits, Systems and Computers, vol.\u00a02, pp. 945\u2013949 (1998)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24660-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:31:13Z","timestamp":1559359873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24660-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540209966","9783540246602"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24660-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}