{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:37:57Z","timestamp":1725565077032},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220077"},{"type":"electronic","value":"9783540246770"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24677-0_37","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T21:37:46Z","timestamp":1283981866000},"page":"351-360","source":"Crossref","is-referenced-by-count":1,"title":["Evolutionary RSA-Based Cryptographic Hardware Using the Co-Design Methodology"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza","family":"de Macedo Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"37_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystems. Communication of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communication of ACM"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Proceedings of the 14th. IEEE Symposium on Computer Arithmetic, Australia (1999)","DOI":"10.1109\/ARITH.1999.762831"},{"issue":"3","key":"37_CR3","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/12.210181","volume":"42","author":"C.D. Walter","year":"1993","unstructured":"Walter, C.D.: Systolic modular multiplication. IEEE Transactions on Computers\u00a042(3), 376\u2013378 (1993)","journal-title":"IEEE Transactions on Computers"},{"key":"37_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/SBCCI.2002.1137629","volume-title":"Proceedings of the 15th. Symposium on Integrated Circuits and Systems Design","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., Mourelle, L.M.: Two hardware implementations for the Montgomery multiplication: sequential vs. parallel. In: Proceedings of the 15th. Symposium on Integrated Circuits and Systems Design, Brazil, pp. 3\u20138. IEEE Computer Society, Los Alamitos (2002)"},{"key":"37_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-48035-8_10","volume-title":"Developments in Applied Artificial Intelligence","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., Mourelle, L.M.: Minimal addition chains for efficient modular exponentiation using genetic algorithms. In: Hendtlass, T., Ali, M. (eds.) IEA\/AIE 2002. LNCS (LNAI), vol.\u00a02358, pp. 88\u201398. Springer, Heidelberg (2002)"},{"key":"37_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-6127-9","volume-title":"Hardware-software co-design of embedded systems: the polis approach","author":"F. Balarin","year":"1997","unstructured":"Balarin, F., et al.: Hardware-software co-design of embedded systems: the polis approach. Kluwer Academic Publishers, Dordrecht (1997)"},{"key":"37_CR7","first-page":"124","volume-title":"Proceedings of the Third International Conference on Genetic Algorithms","author":"K. DeJong","year":"1989","unstructured":"DeJong, K., Spears, W.M.: Using genetic algorithms to solve NP-complete problems. In: Proceedings of the Third International Conference on Genetic Algorithms, pp. 124\u2013132. Morgan Kaufmann, San Francisco (1989)"},{"key":"37_CR8","volume-title":"Practical genetic algorithms","author":"R.L. Haupt","year":"1998","unstructured":"Haupt, R.L., Haupt, S.E.: Practical genetic algorithms. John Wiley and Sons, Chichester (1998)"},{"key":"37_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/3-540-36077-8_43","volume-title":"Advances in Information Systems","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., Mourelle, L.M.: Efficient parallel modular exponentiation algorithm. In: Yakhno, T. (ed.) ADVIS 2002. LNCS, vol.\u00a02457, pp. 405\u2013414. Springer, Heidelberg (2002)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication without trial division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"37_CR11","unstructured":"Xess (2003), \n                    \n                      http:\/\/www.xess.com"},{"key":"37_CR12","unstructured":"Intel, MCS\n                    TM\n                  51 family of micro-controllers architectural overview (2003), \n                    \n                      http:\/\/www.intel.com"},{"key":"37_CR13","unstructured":"Xilinx (2003), \n                    \n                      http:\/\/www.xilinx.com"}],"container-title":["Lecture Notes in Computer Science","Innovations in Applied Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24677-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T20:33:25Z","timestamp":1548448405000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24677-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220077","9783540246770"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24677-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}