{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:16:46Z","timestamp":1742397406246},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540226666"},{"type":"electronic","value":"9783540286325"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28632-5_4","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:45:31Z","timestamp":1285015531000},"page":"45-61","source":"Crossref","is-referenced-by-count":13,"title":["Long Modular Multiplication for Cryptographic Applications"],"prefix":"10.1007","author":[{"given":"Laszlo","family":"Hars","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"ALTERA Literature: Stratix II Devices, \n                    \n                      http:\/\/www.altera.com\/literature\/lit-stx2.jsp","key":"4_CR1"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","first-page":"311","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P.D. Barrett","year":"1987","unstructured":"Barrett, P.D.: Implementing the Rivest Shamir Adleman public key encryption algorithm on standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-48329-2_16","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Bosselaers","year":"1994","unstructured":"Bosselaers, A., Govaerts, R., Vandewalle, J.: Comparison of three modular reduction functions. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 175\u2013186. Springer, Heidelberg (1994)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/0-387-34805-0_34","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"E.F. Brickell","year":"1990","unstructured":"Brickell, E.F.: A Survey of Hardware Implementations of RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 368\u2013370. Springer, Heidelberg (1990)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","first-page":"350","volume-title":"Smart Card. Research and Applications","author":"J.-F. Dhem","year":"2000","unstructured":"Dhem, J.-F., Quisquater, J.-J.: Recent results on modular multiplications for smart cards. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 350\u2013366. Springer, Heidelberg (2000)"},{"unstructured":"GNU Multiple Precision Arithmetic Library, \n                    \n                      http:\/\/www.swox.com\/gmp\/gmp-man-4.1.2.pdf","key":"4_CR6"},{"unstructured":"Hensel, K.: Theorie der algebraische Zahlen. Leipzig (1908)","key":"4_CR7"},{"issue":"17","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1049\/el:19890785","volume":"25","author":"J. Jedwab","year":"1989","unstructured":"Jedwab, J., Mitchell, C.J.: Minimum weight modified signed-digit representations and fast exponentiation. Electronics Letters\u00a025(17), 1171\u20131172 (1989)","journal-title":"Electronics Letters"},{"unstructured":"Knuth, D.E.: The Art of Computer Programming. Seminumerical Algorithms, vol.\u00a02. Addison-Wesley, Reading (1981) Algorithm 4.3.3R","key":"4_CR9"},{"unstructured":"Krandick, W., Johnson, J.R.: Efficient Multiprecision Floating Point Multiplication with Exact Rounding, Tech. Rep. 93-76, RISC-Linz, Johannes Kepler University, Linz, Austria (1993)","key":"4_CR10"},{"key":"4_CR11","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"170","key":"4_CR12","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication without Trial Division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"unstructured":"Quisquater, J.-J.: Presentation at the rump session of Eurocrypt 1990","key":"4_CR13"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"unstructured":"SNIA OSD Technical Work Group, \n                    \n                      http:\/\/www.snia.org\/tech_activities\/workgroups\/osd\/","key":"4_CR15"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-46766-1_26","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"C.D. Walter","year":"1992","unstructured":"Walter, C.D.: Faster modular multiplication by operand scaling. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 313\u2013323. Springer, Heidelberg (1992)"},{"unstructured":"Hars, L.: manuscript (2003)","key":"4_CR17"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28632-5_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:28:42Z","timestamp":1620012522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28632-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226666","9783540286325"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28632-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}