{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:24:03Z","timestamp":1761708243451},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540694984"},{"type":"electronic","value":"9783540694991"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69499-1_7","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"77-87","source":"Crossref","is-referenced-by-count":12,"title":["Modular Reduction in GF(2 n ) without Pre-computational Phase"],"prefix":"10.1007","author":[{"given":"M.","family":"Kne\u017eevi\u0107","sequence":"first","affiliation":[]},{"given":"K.","family":"Sakiyama","sequence":"additional","affiliation":[]},{"given":"J.","family":"Fan","sequence":"additional","affiliation":[]},{"given":"I.","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","first-page":"311","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P. Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/A:1008208521515","volume":"14","author":"\u00c7.K. Ko\u00e7","year":"1998","unstructured":"Ko\u00e7, \u00c7.K., Acar, T.: Montgomery multiplication in GF(2\n                    k\n                  ). Designs, Codes and Cryptography\u00a014, 57\u201369 (1998)","journal-title":"Designs, Codes and Cryptography"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/978-3-540-45238-6_17","volume-title":"Proceedings of 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES)","author":"J.-F. Dhem","year":"2003","unstructured":"Dhem, J.-F.: Efficient modular reduction algorithm in \n                    \n                      \n                    \n                    $\\mathbb{f}_q[x]$\n                   and its application to left to right modular multiplication in \n                    \n                      \n                    \n                    $\\mathbb{f}_2[x]$\n                  . In: Proceedings of 5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES). LNCS, pp. 203\u2013213. Springer, Heidelberg (2003)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. Math. Comp.\u00a048, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology: Proceedings of CRYPTO 1985","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) Advances in Cryptology: Proceedings of CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"170","key":"7_CR9","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular multiplication without trial division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"7_CR11","unstructured":"Shen, H., Jin, Y., You, R.: Unbalanced Exponent Modular Reduction over Binary Field and Its Implementation. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, pp. 190\u2013193 (2006)"},{"key":"7_CR12","unstructured":"Standards for Efficient Cryptography. Elliptic Curve Cryptography, Version 1.5, draft (2005), \n                    \n                      http:\/\/www.secg.org"}],"container-title":["Lecture Notes in Computer Science","Arithmetic of Finite Fields"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69499-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T13:33:41Z","timestamp":1551533621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69499-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540694984","9783540694991"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69499-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}