{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:28Z","timestamp":1725566128266},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540230038"},{"type":"electronic","value":"9783540301028"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30102-8_24","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T18:38:53Z","timestamp":1284662333000},"page":"282-295","source":"Crossref","is-referenced-by-count":8,"title":["A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"American National Standards Institute (ANSI). X9.62-1998, Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA) (January 1999)"},{"key":"24_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"24_CR3","volume-title":"Design of High-Performance Microprocessor Circuits","author":"A. Chandrakasan","year":"2001","unstructured":"Chandrakasan, A., Bowhill, W., Fox, F.: Design of High-Performance Microprocessor Circuits. IEEE Press, Los Alamitos (2001)"},{"key":"24_CR4","unstructured":"Gaisler, J.: The LEON-2 Processor User\u2019s Manual (Version 1.0.10) (January 2003), Available for download at \n                    \n                      http:\/\/www.gaisler.com\/doc\/leon2-1.0.10.pdf"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/ASAP.2003.1212868","volume-title":"Proceedings of the 14th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2003)","author":"J. Gro\u00dfsch\u00e4dl","year":"2003","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2m). In: Proceedings of the 14th IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP 2003), pp. 455\u2013468. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-24591-9_18","volume-title":"Information Security Applications","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Low-power design of a functional unit for arithmetic in finite fields GF(p) and GF(2m). In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 227\u2013243. Springer, Heidelberg (2004)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"D. Hankerson","year":"2000","unstructured":"Hankerson, D., L\u00f3pez Hernandez, J., Menezes, A.J.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 1\u201324. Springer, Heidelberg (2000)"},{"key":"24_CR8","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/A:1008208521515","volume":"14","author":"\u00c7.K. Ko\u00e7","year":"1998","unstructured":"Ko\u00e7, \u00c7.K., Acar, T.: Montgomery multiplication in GF(2k). Designs, Codes and Cryptography\u00a014(1), 57\u201369 (1998)","journal-title":"Designs, Codes and Cryptography"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J. L\u00f3pez","year":"1999","unstructured":"L\u00f3pez, J., Dahab, R.: Fast multiplication on elliptic curves over GF(2m) without precomputation. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 316\u2013327. Springer, Heidelberg (1999)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-44495-5_18","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"J. L\u00f3pez","year":"2000","unstructured":"L\u00f3pez, J., Dahab, R.: High-speed software multiplication in IF2m. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 203\u2013212. Springer, Heidelberg (2000)"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/HPCS.1995.662009","volume-title":"Proceedings of the 3rd IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems (HPCS 1995)","author":"E. Nahum","year":"1995","unstructured":"Nahum, E., O\u2019Malley, S., Orman, H., Schroeppel, R.: Towards high performance cryptographic software. In: Proceedings of the 3rd IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems (HPCS 1995), pp. 69\u201372. IEEE, Los Alamitos (1995)"},{"key":"24_CR13","unstructured":"National Institute of Standards and Technology (NIST). Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186-2 (2000)"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/3-540-44750-4_4","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"R. Schroeppel","year":"1995","unstructured":"Schroeppel, R., Orman, H., O\u2019Malley, S., Spatscheck, O.: Fast key exchange with elliptic curve systems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 43\u201356. Springer, Heidelberg (1995)"},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1145\/378239.378467","volume-title":"Proceedings of the 38th Design Automation Conference (DAC 2001)","author":"A. Sinha","year":"2001","unstructured":"Sinha, A., Chandrakasan, A.: Jouletrack \u2013 A web based tool for software energy profiling. In: Proceedings of the 38th Design Automation Conference (DAC 2001), pp. 220\u2013225. ACM Press, New York (2001)"},{"key":"24_CR16","unstructured":"SPARC International, Inc. The SPARC Architecture Manual Version 8. (August 1993), Available for download at \n                    \n                      http:\/\/www.sparc.org\/standards\/V8.pdf"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/3-540-45067-X_8","volume-title":"Information Security and Privacy","author":"A. Weimerskirch","year":"2003","unstructured":"Weimerskirch, A., Stebila, D., Chang Shantz, S.: Generic GF(2m) arithmetic in software and its application to ECC. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 79\u201392. Springer, Heidelberg (2003)"},{"key":"24_CR18","unstructured":"XESS Corporation. XSV-800 Virtex Prototyping Board with 2.5V, 800,000-gate FPGA. Product brief (2001), available online at \n                    \n                      http:\/\/www.xess.com\/prod014_4.php3"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Systems Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30102-8_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:45:14Z","timestamp":1620013514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30102-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540230038","9783540301028"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30102-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}