{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:50Z","timestamp":1725725450616},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_107","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"920-925","source":"Crossref","is-referenced-by-count":0,"title":["Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array"],"prefix":"10.1007","author":[{"given":"Kee-Won","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jun-Cheol","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"107_CR1","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TC.2010.258","volume":"60","author":"A. Hariri","year":"2011","unstructured":"Hariri, A., Reyhani-Masoleh, A.: Concurrent Error Detection in Montgomery Multiplication over Binary Extension Fields. IEEE Trans. Computers\u00a060(9), 1341\u20131353 (2011)","journal-title":"IEEE Trans. Computers"},{"key":"107_CR2","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.matcom.2007.09.005","volume":"79","author":"J.C. Jeon","year":"2008","unstructured":"Jeon, J.C., Yoo, K.Y.: Montgomery exponent architecture based on programmable cellular automata. Mathematics and Computers in Simulation\u00a079, 1189\u20131196 (2008)","journal-title":"Mathematics and Computers in Simulation"},{"issue":"170","key":"107_CR3","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular Multiplication without Trial Division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"issue":"1","key":"107_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/A:1008208521515","volume":"14","author":"C. Koc","year":"1998","unstructured":"Koc, C., Acar, T.: Montgomery Multiplication in GF(2k). Designs, Codes and Cryptography\u00a014(1), 57\u201369 (1998)","journal-title":"Designs, Codes and Cryptography"},{"issue":"9","key":"107_CR5","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/TC.2005.147","volume":"54","author":"C.Y. Lee","year":"2005","unstructured":"Lee, C.Y., Horng, J.S., Jou, I.C., Lu, E.H.: Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2m). IEEE Transactions on Computers\u00a054(9), 1061\u20131070 (2005)","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"107_CR6","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1109\/TC.2010.258","volume":"60","author":"A. Hariri","year":"2011","unstructured":"Hariri, A., Reyhani-Masoleh, A.: Concurrent Error Detection in Montgomery Multiplication over Binary Extension Fields. IEEE Trans. Computers\u00a060(9), 1341\u20131353 (2011)","journal-title":"IEEE Trans. Computers"},{"issue":"3","key":"107_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1049\/iet-ifs.2009.0160","volume":"4","author":"W.T. Huang","year":"2010","unstructured":"Huang, W.T., Chang, C.H., Chiou, C.W., Chou, F.H.: Concurrent error detection and correction in a polynomial basis multiplier over GF(2m). IET Information Security\u00a04(3), 111\u2013124 (2010)","journal-title":"IET Information Security"},{"issue":"2","key":"107_CR8","first-page":"122","volume":"1","author":"K.W. Kim","year":"2012","unstructured":"Kim, K.W., Jeon, J.C.: Finite Field Arithmetic Architecture Based on Cellular Array. Int\u2019l Journal of Cyber-Security and Digital Forensics\u00a01(2), 122\u2013129 (2012)","journal-title":"Int\u2019l Journal of Cyber-Security and Digital Forensics"},{"key":"107_CR9","unstructured":"Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge Univ. Press (1986)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T21:48:09Z","timestamp":1557697689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_107","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}