{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:24:57Z","timestamp":1773843897744,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540408222","type":"print"},{"value":"9783540452348","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45234-8_76","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T06:12:05Z","timestamp":1294467125000},"page":"786-795","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Fast Modular Division for Application in ECC on Reconfigurable Logic"],"prefix":"10.1007","author":[{"given":"Alan","family":"Daly","sequence":"first","affiliation":[]},{"given":"William","family":"Marnane","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Kerins","sequence":"additional","affiliation":[]},{"given":"Emanuel","family":"Popovici","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,9,30]]},"reference":[{"key":"76_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"76_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp.\u00a048, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"76_CR3","series-title":"London Mathematical Society Lecture Note Series","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"2000","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series, vol.\u00a0265. Cambridge University Press, Cambridge (2000)"},{"key":"76_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/3-540-36400-5_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Ernst","year":"2003","unstructured":"Ernst, M., Jung, M., Madlener, F., Huss, S., Bl\u00fcmel, R.: A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 381\u2013399. Springer, Heidelberg (2003)"},{"key":"76_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1007\/3-540-46117-5_77","volume-title":"Field-Programmable Logic and Applications. Reconfigurable Computing Is Going Mainstream","author":"T. Kerins","year":"2002","unstructured":"Kerins, T., Popovici, E., Marnane, W., Fitzpatrick, P.: Fully Parameterizable Elliptic Curve Cryptography Processor over GF(2m)\u2019. In: Glesner, M., Zipf, P., Renovell, M. (eds.) FPL 2002. LNCS, vol.\u00a02438, pp. 750\u2013759. Springer, Heidelberg (2002)"},{"key":"76_CR6","unstructured":"IEEE Standards Department. IEEE 1363\/D13 Standard Specifications for Public Key Cryptography (2000)"},{"key":"76_CR7","unstructured":"ANSI X9.62. Public Key Cryptography for the Financial Services Industry. The Elliptic Curve Digital Signature Algorithm (ECDSA) (1999)"},{"key":"76_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/3-540-44709-1_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"G. Orlando","year":"2001","unstructured":"Orlando, G., Paar, C.: A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 348\u2013363. Springer, Heidelberg (2001)"},{"issue":"8","key":"76_CR9","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/12.403725","volume":"44","author":"B.S. Kaliski Jr.","year":"1995","unstructured":"Kaliski Jr., B.S.: The Montgomery Inverse and it\u2019s applications. IEEE Trans. on Computers\u00a044(8), 1064\u20131065 (1995)","journal-title":"IEEE Trans. on Computers"},{"key":"76_CR10","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication without Trial Division. Math. Computation\u00a044, 519\u2013521 (1985)","journal-title":"Math. Computation"},{"key":"76_CR11","doi-asserted-by":"crossref","unstructured":"Daly, A., Marnane, W.: Efficient Architectures for Implementing Montgomery Modular Multiplication and RSA Modular Exponentiation on Reconfigurable Logic. In: 10th Intl Symposium on FPGA (FPGA 2002), February 2002, pp. 40\u201349 (2002)","DOI":"10.1145\/503048.503055"},{"key":"76_CR12","doi-asserted-by":"crossref","unstructured":"Gutub, A., Tenca, A.F., Koc, C.K.: Scalable VLSI Architecture for GF(p) Montgomery Modular Inverse Computation. In: IEEE Computer Society Annual Symposium on VLSI, April 2002, pp. 53\u201358 (2002)","DOI":"10.1109\/ISVLSI.2002.1016874"},{"key":"76_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/3-540-36400-5_35","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"A. Gutub","year":"2003","unstructured":"Gutub, A., Tenca, A.F., Savas, E., Koc, C.K.: Scalable and unified hardware to compute Montgomery inverse in GF(p) and GF(2n). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 484\u2013499. Springer, Heidelberg (2003)"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Daly, A., Marnane, W., Popovici, E.: Fast Modular Inversion in the Montgomery Domain on Reconfigurable Logic. In: Irish Signals and Systems Conference 2003 (July 2003) (to appear)","DOI":"10.1007\/978-3-540-45234-8_76"},{"issue":"7","key":"76_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/12.863048","volume":"49","author":"E. Savas","year":"2000","unstructured":"Savas, E., Koc, C.K.: The Montgomery Modular Inverse - Revisited. IEEE Trans. on Computers\u00a049(7), 763\u2013766 (2000)","journal-title":"IEEE Trans. on Computers"},{"issue":"5","key":"76_CR16","first-page":"733","volume":"E82-A","author":"T. Kobayashi","year":"1999","unstructured":"Kobayashi, T., Morita, H.: Fast Modular Inversion Algorithm to Match any Operation Unit. IEICE Trans. Fundamentals\u00a0E82-A(5), 733\u2013740 (1999)","journal-title":"IEICE Trans. Fundamentals"},{"key":"76_CR17","unstructured":"Shantz, S.C.: From Euclid\u2019s GCD to Montgomery Multiplication to the Great Divide. Technical Report TR-2001-95, Sun Microsystems Laboratories (2001)"}],"container-title":["Lecture Notes in Computer Science","Field Programmable Logic and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45234-8_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:56:20Z","timestamp":1740840980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45234-8_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408222","9783540452348"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45234-8_76","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"30 September 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}