{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:00:49Z","timestamp":1725516049782},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540690450"},{"type":"electronic","value":"9783540690528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69052-8_58","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T06:38:03Z","timestamp":1217486283000},"page":"551-560","source":"Crossref","is-referenced-by-count":0,"title":["Evolutionary Public-Key Cryptographic Circuits"],"prefix":"10.1007","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza","family":"de Macedo Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"58_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"T.S. Messerges","year":"1999","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 144\u2013157. Springer, Heidelberg (1999)"},{"key":"58_CR3","volume-title":"Genetic Programming","author":"J.R. Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming. MIT Press, Cambridge (1992)"},{"key":"58_CR4","series-title":"Studies in Computational Intelligence Book Series","volume-title":"Genetic systems programming: theory & practice","year":"2006","unstructured":"Nedjah, N., Ajith, A., Mourelle, L.M. (eds.): Genetic systems programming: theory & practice. Studies in Computational Intelligence Book Series, vol.\u00a013. Springer, Heidelberg, Berlin (2006)"},{"key":"58_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/SBCCI.2002.1137629","volume-title":"Proc. of 15th Symposium on Integrated Circuits and Systems Design","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., Mourelle, L.M.: Two hardware implementations for the Montgomery multiplication: sequential vs. parallel. In: Proc. of 15th Symposium on Integrated Circuits and Systems Design, Porto Alegre, Brazil, pp. 3\u20138. IEEE Computer Society, Los Alamitos (2002)"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Nedjah, N., Mourelle, L.M. (eds.): New trends in cryptographic systems, Nova Science, Hauppauge, NY. Intelligent Systems Engineering Book Series (2006)","DOI":"10.1007\/978-3-540-33869-7"},{"key":"58_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1007\/0-387-34805-0_34","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"E.F. Brickell","year":"1990","unstructured":"Brickell, E.F.: A survey of hardware implementation of RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 368\u2013370. Springer, Heidelberg (1990)"},{"key":"58_CR8","unstructured":"Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Proc. of the 14th IEEE Symposium on Computer Arithmetic, Australia (1999)"},{"issue":"9","key":"58_CR9","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1049\/el:19980624","volume":"34","author":"A. Tiountchik","year":"1998","unstructured":"Tiountchik, A.: Systolic modular exponentiation via Montgomery algorithm. Electronic Letters\u00a034(9), 874\u2013875 (1998)","journal-title":"Electronic Letters"},{"key":"58_CR10","doi-asserted-by":"crossref","unstructured":"Fonseca, C.M., Fleming, P.J.: An overview of evolutionary algorithms in multi-objective optimisation. Evolutionary Computation 3(1), 1\u201316","DOI":"10.1162\/evco.1995.3.1.1"},{"key":"58_CR11","unstructured":"Nedjah, N., Mourelle, L.M.: Real-World Multi-objective System Engineering, Intelligent Systems Engineering Book Series, Nova Science, Hauppauge, NY (2005)"},{"key":"58_CR12","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/DSD.2002.1115373","volume-title":"Proc. of Euromicro Symposium on Digital System Design","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., Mourelle, L.M.: Reconfigurable hardware implementation of Montgomery modular multiplication and parallel binary exponentiation. In: Proc. of Euromicro Symposium on Digital System Design, Dortmund, Germany, pp. 226\u2013235. IEEE Computer Society, Los Alamitos (2002)"},{"key":"58_CR13","unstructured":"XilinxTM, Inc., http:\/\/www.xilinx.com"}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Applied Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69052-8_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T01:55:58Z","timestamp":1557712558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69052-8_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540690450","9783540690528"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69052-8_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}