{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:12:33Z","timestamp":1725689553003},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642314933"},{"type":"electronic","value":"9783642314940"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31494-0_28","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:28:40Z","timestamp":1340803720000},"page":"243-251","source":"Crossref","is-referenced-by-count":11,"title":["High-Speed Unified Elliptic Curve Cryptosystem on FPGAs Using Binary Huff Curves"],"prefix":"10.1007","author":[{"given":"Ayantika","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Indranil","family":"Sengupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Ansari, B., Hasan, M.A.: High Performance Architecture of Elliptic Curve Scalar Multiplication. Tech. rep., Department of Electrical and Computer Engineering, University of Waterloo (2006)"},{"key":"28_CR2","unstructured":"Bernstein, D.J., Lange, T., Farashahi, R.R.: Binary edwards curves. Cryptology ePrint Archive, Report 2008\/171 (2008), http:\/\/eprint.iacr.org\/"},{"key":"28_CR3","volume-title":"GLSVLSI 2011: Proceedings of the 21st ACM Great Lakes Symposium on VLSI","author":"A. Chatterjee","year":"2011","unstructured":"Chatterjee, A., Sengupta, I.: Fpga implementation of binary edwards curve using ternary representation. In: GLSVLSI 2011: Proceedings of the 21st ACM Great Lakes Symposium on VLSI. ACM, Lausanne (2011)"},{"issue":"2","key":"28_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TVLSI.2007.912228","volume":"16","author":"W.N. Chelton","year":"2008","unstructured":"Chelton, W.N., Benaissa, M.: Fast Elliptic Curve Cryptography on FPGA. IEEE Transactions on Very Large Scale Integration (VLSI) Systems\u00a016(2), 198\u2013205 (2008)","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-19074-2_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J. Devigne","year":"2011","unstructured":"Devigne, J., Joye, M.: Binary Huff Curves. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 340\u2013355. Springer, Heidelberg (2011)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Hoffstein, J.: An introduction to mathematical cryptography. Springer (2009)","DOI":"10.1007\/978-0-387-77993-5_6"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-36288-6_17","volume-title":"Public Key Cryptography - PKC 2003","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: Exceptional Procedure Attackon Elliptic Curve Cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 224\u2013239. Springer, Heidelberg (2002)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-642-14518-6_20","volume-title":"Algorithmic Number Theory","author":"M. Joye","year":"2010","unstructured":"Joye, M., Tibouchi, M., Vergnaud, D.: Huff\u2019s Model for Elliptic Curves. In: Hanrot, G., Morain, F., Thom\u00e9, E. (eds.) ANTS-IX. LNCS, vol.\u00a06197, pp. 234\u2013250. Springer, Heidelberg (2010)"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Pu, Q., Huang, J.: A Microcoded Elliptic Curve Processor for GF(2 m ) Using FPGA Technology. In: 2006 International Conference on Communications, Circuits and Systems Proceedings, vol.\u00a04, pp. 2771\u20132775 (June 2006)","DOI":"10.1109\/ICCCAS.2006.285243"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-540-89754-5_29","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"C. Rebeiro","year":"2008","unstructured":"Rebeiro, C., Mukhopadhyay, D.: High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 376\u2013388. Springer, Heidelberg (2008)"},{"key":"28_CR13","volume-title":"Implementing Elliptic Curve Cryptography","author":"M. Rosing","year":"1998","unstructured":"Rosing, M.: Implementing Elliptic Curve Cryptography. Manning Publications Co., Sound View Ct. 3B Greenwich (1998)"},{"key":"28_CR14","unstructured":"Saqib, N.A., Rodr\u00ediguez-Henr\u00edquez, F., Diaz-Perez, A.: A Parallel Architecture for Fast Computation of Elliptic Curve Scalar Multiplication Over GF(2 m ). In: Proceedings of the 18th International Parallel and Distributed Processing Symposium (2004)"}],"container-title":["Lecture Notes in Computer Science","Progress in VLSI Design and Test"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31494-0_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T22:40:00Z","timestamp":1687560000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31494-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642314933","9783642314940"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31494-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}