{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:02:25Z","timestamp":1777964545575,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540226666","type":"print"},{"value":"9783540286325","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28632-5_9","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T16:45:31Z","timestamp":1285001131000},"page":"119-132","source":"Crossref","is-referenced-by-count":521,"title":["Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs"],"prefix":"10.1007","author":[{"given":"Nils","family":"Gura","sequence":"first","affiliation":[]},{"given":"Arun","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Arvinderpal","family":"Wander","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Eberle","sequence":"additional","affiliation":[]},{"given":"Sheueling Chang","family":"Shantz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Atmel Corporation, \n                    \n                      http:\/\/www.atmel.com\/"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/BFb0055748","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D.V. Bailey","year":"1998","unstructured":"Bailey, D.V., Paar, C.: Optimal Extension Fields for Fast Arithmetic in Public- Key Algorithms. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 472\u2013485. Springer, Heidelberg (1998)"},{"key":"9_CR3","unstructured":"Ko\u00e7, \u00c7.K.: High-Speed RSA Implementation. Technical report, RSA Laboratories TR201 (November 1994)"},{"key":"9_CR4","unstructured":"Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Version 1.0 (September 2000)"},{"key":"9_CR5","unstructured":"Chang Shantz, S.: From Euclid\u2019s GCD to Montgomery Multiplication to the Great Divide. Technical report, Sun Microsystems Laboratories TR-2001-95 (June 2001)"},{"key":"9_CR6","unstructured":"Chipcon AS, \n                    \n                      http:\/\/www.chipcon.com\/"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"9_CR8","unstructured":"Crossbow Technology, Inc., \n                    \n                      http:\/\/www.xbow.com\/"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/CAHPC.2002.1180754","volume-title":"14th Symposium on Computer Architecture and High Performance Computing","author":"J. Gro\u00dfsch\u00e4dl","year":"2002","unstructured":"Gro\u00dfsch\u00e4dl, J.: Instruction Set Extension for Long Integer Modulo Arithmetic on RISC-Based Smart Cards. In: 14th Symposium on Computer Architecture and High Performance Computing, October 2002, pp. 13\u201319. IEEE Computer Society, Los Alamitos (2002)"},{"key":"9_CR10","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/BFb0054024","volume-title":"Public Key Cryptography","author":"T. Hasegawa","year":"1998","unstructured":"Hasegawa, T., Nakajima, J., Matsui, M.: A practical implementation of elliptic curve cryptosystems over GF (p) on a 16-bit microcomputer. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 182\u2013194. Springer, Heidelberg (1998)"},{"issue":"E","key":"9_CR12","doi-asserted-by":"crossref","first-page":"C354","DOI":"10.21914\/anziamj.v44i0.686","volume":"44","author":"Y. Hitchcock","year":"2003","unstructured":"Hitchcock, Y., Dawson, E., Clark, A., Montague, P.: Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card. ANZIAM Journal\u00a044(E), C354\u2013C377 (2003)","journal-title":"ANZIAM Journal"},{"key":"#cr-split#-9_CR13.1","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of Many-Digital Numbers by Automatic Computers. Doklady Akad. Nauk??(145), 293???294 (1963);"},{"key":"#cr-split#-9_CR13.2","unstructured":"Translation in Physics-Doklady 7, 595???596"},{"key":"9_CR14","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"Morain, F., Olivos, J.: Speeding up the computations on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications\u00a024, 531\u2013543 (1990)","journal-title":"Theoretical Informatics and Applications"},{"key":"9_CR15","unstructured":"National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use (August 1999)"},{"key":"9_CR16","unstructured":"Pietil\u00e4inen, H.: Elliptic curve cryptography on smart cards. Helsinki University of Technology, Faculty of Information Technology (October 2000) Master\u2019s Thesis"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Woodbury, A.D., Bailey, D.V., Paar, C.: Elliptic Curve Cryptography on Smart Cards without Coprocessors. In: The Fourth Smart Card Research and Advanced Applications (CARDIS2000) Conference, Bristol, UK (September 2000)","DOI":"10.1007\/978-0-387-35528-3_5"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28632-5_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:28:44Z","timestamp":1619998124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28632-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226666","9783540286325"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28632-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}