{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:09:56Z","timestamp":1760202596657},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642126772"},{"type":"electronic","value":"9783642126789"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12678-9_14","type":"book-chapter","created":{"date-parts":[[2010,4,29]],"date-time":"2010-04-29T11:28:35Z","timestamp":1272540515000},"page":"225-242","source":"Crossref","is-referenced-by-count":14,"title":["ECC2K-130 on Cell CPUs"],"prefix":"10.1007","author":[{"given":"Joppe W.","family":"Bos","sequence":"first","affiliation":[]},{"given":"Thorsten","family":"Kleinjung","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Niederhagen","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Bailey, D.V., Baldwin, B., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., van Damme, G., de Meulenaer, G., Fan, J., G\u00fcneysu, T., Gurkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L.: The Certicom challenges ECC2-X. In: Workshop Record of SHARCS 2009: Special-purpose Hardware for Attacking Cryptographic Systems, pp. 51\u201382 (2009), \n                    \n                      http:\/\/www.hyperelliptic.org\/tanja\/SHARCS\/record2.pdf"},{"key":"14_CR2","unstructured":"Bailey, D.V., Batina, L., Bernstein, D.J., Birkner, P., Bos, J.W., Chen, H.-C., Cheng, C.-M., Van Damme, G., de Meulenaer, G., Dominguez Perez, L.J., Fan, J., G\u00fcneysu, T., G\u00fcrkaynak, F., Kleinjung, T., Lange, T., Mentens, N., Niederhagen, R., Paar, C., Regazzoni, F., Schwabe, P., Uhsadel, L., Van Herrewege, A., Yang, B.-Y.: Breaking ECC2K-130 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/2009\/541"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-03356-8_19","volume-title":"CRYPTO 2009","author":"D.J. Bernstein","year":"2009","unstructured":"Bernstein, D.J.: Batch binary Edwards. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 317\u2013336. Springer, Heidelberg (2009)"},{"key":"14_CR4","unstructured":"Bernstein, D.J.: Minimum number of bit operations for multiplication (May 2009), \n                    \n                      http:\/\/binary.cr.yp.to\/m.html\n                    \n                    \n                   (accessed 2009-12-07)"},{"key":"14_CR5","unstructured":"Bernstein, D.J.: Optimizing linear maps modulo 2. In: Workshop Record of SPEED-CC: Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers, pp. 3\u201318 (2009), \n                    \n                      http:\/\/www.hyperelliptic.org\/SPEED\/record09.pdf"},{"key":"14_CR6","unstructured":"Bernstein, D.J., Lange, T.: Explicit-formulas database, \n                    \n                      http:\/\/www.hyperelliptic.org\/EFD\/\n                    \n                    \n                   (accessed 2010-01-05)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0052352","volume-title":"Fast Software Encryption","author":"E. Biham","year":"1997","unstructured":"Biham, E.: A fast new DES implementation in software. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 260\u2013272. Springer, Heidelberg (1997)"},{"key":"14_CR8","unstructured":"Bos, J.W., Kaihara, M.E., Montgomery, P.L.: Pollard rho on the PlayStation 3. In: Workshop Record of SHARCS 2009: Special-purpose Hardware for Attacking Cryptographic Systems, pp. 35\u201350 (2009), \n                    \n                      http:\/\/www.hyperelliptic.org\/tanja\/SHARCS\/record2.pdf"},{"key":"14_CR9","unstructured":"Certicom. Certicom ECC Challenge (1997), \n                    \n                      http:\/\/www.certicom.com\/images\/pdfs\/cert_ecc_challenge.pdf"},{"key":"14_CR10","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1214\/aoms\/1177705677","volume":"31","author":"B. Harris","year":"1960","unstructured":"Harris, B.: Probability distributions related to random mappings. The Annals of Mathematical Statistics\u00a031, 1045\u20131062 (1960)","journal-title":"The Annals of Mathematical Statistics"},{"key":"14_CR12","first-page":"258","volume-title":"HPCA 2005","author":"H. Peter Hofstee","year":"2005","unstructured":"Peter Hofstee, H.: Power efficient processor architecture and the Cell processor. In: HPCA 2005, pp. 258\u2013262. IEEE Computer Society, Los Alamitos (2005)"},{"key":"14_CR13","unstructured":"IBM. IBM SDK for multicore acceleration (version 3.1), \n                    \n                      http:\/\/www.ibm.com\/developerworks\/power\/cell\/downloads.html?S_TACT=105AGX16&S_CMP=LP"},{"key":"14_CR14","unstructured":"IBM DeveloperWorks. Cell Broadband Engine programming handbook (version 1.11), (May 2008), \n                    \n                      https:\/\/www-01.ibm.com\/chips\/techlib\/techlib.nsf\/techdocs\/1741C509C5F64B3300257460006FD68D"},{"key":"14_CR15","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of many-digital numbers by automatic computers. In: Proceedings of the USSR Academy of Science, vol.\u00a0145, pp. 293\u2013294 (1962)"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048, 243\u2013264 (1987)","journal-title":"Mathematics of Computation"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J.M. Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo methods for index computation (mod p). Mathematics of Computation\u00a032, 918\u2013924 (1978)","journal-title":"Mathematics of Computation"},{"issue":"3","key":"14_CR18","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/0021-9991(67)90047-2","volume":"1","author":"J. Stein","year":"1967","unstructured":"Stein, J.: Computational problems associated with Racah algebra. Journal of Computational Physics\u00a01(3), 397\u2013405 (1967)","journal-title":"Journal of Computational Physics"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-73074-3_6","volume-title":"Arithmetic of Finite Fields","author":"J. zur Gathen von","year":"2007","unstructured":"von zur Gathen, J., Shokrollahi, A., Shokrollahi, J.: Efficient multiplication using type 2 optimal normal bases. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 55\u201368. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12678-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:44:47Z","timestamp":1619783087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12678-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642126772","9783642126789"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12678-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}