{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:10Z","timestamp":1725749110080},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_4","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T07:32:11Z","timestamp":1379316731000},"page":"50-65","source":"Crossref","is-referenced-by-count":0,"title":["Dedicated Hardware for Attribute-Based Credential Verification"],"prefix":"10.1007","author":[{"given":"Geoffrey","family":"Ottoy","sequence":"first","affiliation":[]},{"given":"Jorn","family":"Lapon","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]},{"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]},{"given":"Lieven","family":"De Strycker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Amberg, P., Pinckney, N., Harris, D.M.: Parallel high-radix montgomery multipliers. In: 2008 42nd Asilomar Conference on Signals, Systems and Computers, pp. 772\u2013776 (October 2008)","DOI":"10.1109\/ACSSC.2008.5074513"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Bajard, J.-C., Didier, L.-S., Kornerup, P.: An rns montgomery modular multiplication algorithm. In: Proceedings of the 13th IEEE Symposium on Computer Arithmetic, pp. 234\u2013239 (July 1997)","DOI":"10.1109\/ARITH.1997.614900"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-32805-3_5","volume-title":"Communications and Multimedia Security","author":"P. Bichsel","year":"2012","unstructured":"Bichsel, P., Camenisch, J., De Decker, B., Lapon, J., Naessens, V., Sommer, D.: Data-minimizing authentication goes mobile. In: De Decker, B., Chadwick, D.W. (eds.) CMS 2012. LNCS, vol.\u00a07394, pp. 55\u201371. Springer, Heidelberg (2012)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1145\/1653662.1653734","volume-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009","author":"P. Bichsel","year":"2009","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 600\u2013610. ACM, New York (2009)"},{"key":"4_CR5","unstructured":"Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Proceedings of the 14th IEEE Symposium on Computer Arithmetic, pp. 70\u201377 (1999)"},{"issue":"7","key":"4_CR6","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/12.936241","volume":"50","author":"T. Blum","year":"2001","unstructured":"Blum, T., Paar, C.: High-radix montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers\u00a050(7), 759\u2013764 (2001)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A. Booth","year":"1951","unstructured":"Booth, A.: A Signed Binary Multiplication Technique. Quarterly Journal of Mechanics and Applied Mathematics\u00a04(2), 236\u2013240 (1951)","journal-title":"Quarterly Journal of Mechanics and Applied Mathematics"},{"key":"4_CR8","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"S. Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132\u2013145. ACM (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J.L. Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/3-540-36413-7_20","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2003","unstructured":"Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol.\u00a02576, pp. 268\u2013289. Springer, Heidelberg (2003)"},{"issue":"10","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commununications of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Commununications of the ACM"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"de la Piedra, A., Touhafi, A., Cornetta, G.: Cryptographic accelerator for 802.15.4 transceivers with key agreement engine based on montgomery arithmetic. In: 2011 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT), pp. 1\u20135 (November 2011)","DOI":"10.1109\/SCVT.2011.6101307"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-14597-1_6","volume-title":"Trusted Systems","author":"K. Dietrich","year":"2010","unstructured":"Dietrich, K.: Anonymous credentials for java enabled platforms: A performance evaluation. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol.\u00a06163, pp. 88\u2013103. Springer, Heidelberg (2010)"},{"key":"4_CR15","unstructured":"France-Massay, T.: MULTOS - the high security smart card OS. Technical report, MAOSCO Limited (2005)"},{"issue":"6","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/TCSI.2008.2008503","volume":"56","author":"Y. He","year":"2009","unstructured":"He, Y., Chang, C.-H.: A new redundant binary booth encoding for fast 2 n -bit multiplier design. IEEE Transactions on Circuits and Systems I: Regular Papers\u00a056(6), 1192\u20131201 (2009)","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"4_CR17","unstructured":"Specification of the Identity Mixer cryptographic library \u2013 version 2.3.2, IBM Research \u2013 Zurich (2010)"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1080\/00207210310001598074","volume":"90","author":"Y.-P. Lai","year":"2003","unstructured":"Lai, Y.-P., Chang, C.-C.: An efficient multi-exponentiation scheme based on modified booth\u2019s method. International Journal of Electronics\u00a090(3), 221\u2013233 (2003)","journal-title":"International Journal of Electronics"},{"issue":"170","key":"4_CR19","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trail division. Mathematics of Computation\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"4_CR20","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-31909-9_14","volume-title":"Security and Privacy in Communication Networks","author":"W. Mostowski","year":"2012","unstructured":"Mostowski, W., Vullers, P.: Efficient U-prove implementation for anonymous credentials on smart cards. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol.\u00a096, pp. 243\u2013260. Springer, Heidelberg (2012)"},{"key":"4_CR21","unstructured":"Nedjah, N., de Macedo Mourelle, L.: Reconfigurable hardware implementation of montgomery modular multiplication and parallel binary exponentiation. In: Proceedings of the Euromicro Symposium on Digital System Design, pp. 226\u2013233 (2002)"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1109\/TCSI.2005.858767","volume":"53","author":"N. Nedjah","year":"2006","unstructured":"Nedjah, N., Mourelle, L.M.: Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic. IEEE Transactions on Circuits and Systems I: Regular Papers\u00a053(3), 627\u2013633 (2006)","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Neto, J.C., Tenca, A.F., Ruggiero, W.V.: A parallel k-partition method to perform montgomery multiplication. In: 2011 IEEE International Conference on Application-Specific Systems, Architectures and Processors, ASAP, pp. 251\u2013254 (September 2011)","DOI":"10.1109\/ASAP.2011.6043280"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"\u00d6rs, S.B., Batina, L., Preneel, B., Vandewalle, J.: Hardware implementation of a montgomery modular multiplier in a systolic array. In: Proceedings of the International Parallel and Distributed Processing Symposium, p. 8 (April 2003)","DOI":"10.1109\/IPDPS.2003.1213341"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-24712-5_15","volume-title":"Communications and Multimedia Security","author":"G. Ottoy","year":"2011","unstructured":"Ottoy, G., Martens, J., Saeys, N., Preneel, B., De Strycker, L., Goemaere, J.-P., Hamelinckx, T.: A Modular Test Platform for Evaluation of Security Protocols in NFC Applications. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol.\u00a07025, pp. 171\u2013177. Springer, Heidelberg (2011)"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-36812-7_11","volume-title":"Reconfigurable Computing: Architectures, Tools and Applications","author":"G. Ottoy","year":"2013","unstructured":"Ottoy, G., Preneel, B., Goemaere, J.-P., De Strycker, L.: Flexible design of a modular simultaneous exponentiation core for embedded platforms. In: Brisk, P., de Figueiredo Coutinho, J.G., Diniz, P.C. (eds.) ARC 2013. LNCS, vol.\u00a07806, pp. 115\u2013121. Springer, Heidelberg (2013)"},{"key":"4_CR27","unstructured":"Preneel, B., Goemaere, J.-P., Stevens, N., De Strycker, L., Ottoy, G.: Open-source hardware for embedded security. In: EDN (2013)"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Phillips, B.: Modular multiplication in the montgomery residue number system. In: Conference Record of the Thirty-Fifth Asilomar Conference on Signals, Systems and Computers, vol.\u00a02, pp. 1637\u20131640 (November 2001)","DOI":"10.1109\/ACSSC.2001.987762"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Pinckney, N., Harris, D.M.: Parallelized radix-4 scalable montgomery multipliers. In: Petraglia, A., Pedroni, V.A., Cauwenberghs, G. (eds.) Proceedings of the 20th Annual Symposium on Integrated Circuits and Systems Design, SBCCI 2007, Copacabana, Rio de Janeiro, Brazil, September 3-6, pp. 306\u2013311. ACM (2007)","DOI":"10.1145\/1284480.1284562"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Pinckney, N., Harris, D.M.: Parallelized radix-4 scalable montgomery multipliers. Journal of Integrated Circuits and Systems, 39 \u201345 (2008)","DOI":"10.1145\/1284480.1284562"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Shigemoto, K., Kawakami, K., Nakano, K.: Accelerating montgomery modulo multiplication for redundant radix-64k number system on the fpga using dual-port block rams. In: IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, vol.\u00a01, pp. 44\u201351 (December 2008)","DOI":"10.1109\/EUC.2008.30"},{"key":"4_CR32","unstructured":"Christian\u00a0Paquin Stefan\u00a0Brands. U-Prove cryptographic specification v1.0, Microsoft Corporation (2010)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Sterckx, M., Gierlichs, B., Preneel, B., Verbauwhede, I.: Efficient implementation of anonymous credentials on Java Card smart cards. In: First IEEE International Workshop on Information Forensics and Security, WIFS 2009, pp. 106\u2013110 (December 2009)","DOI":"10.1109\/WIFS.2009.5386474"},{"issue":"7","key":"4_CR34","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1109\/TIE.2010.2080653","volume":"58","author":"G.D. Sutter","year":"2011","unstructured":"Sutter, G.D., Deschamps, J.-P., Imana, J.L.: Modular multiplication and exponentiation architectures for fast rsa cryptosystem based on digit serial computation. IEEE Transactions on Industrial Electronics\u00a058(7), 3101\u20133109 (2011)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/3-540-48059-5_10","volume-title":"Cryptographic Hardware and Embedded Systems","author":"A.F. Tenca","year":"1999","unstructured":"Tenca, A.F., Ko\u00e7, \u00c7.K.: A scalable architecture for montgomery multiplication. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 94\u2013108. Springer, Heidelberg (1999)"},{"issue":"9","key":"4_CR36","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/TC.2003.1228516","volume":"52","author":"A.F. Tenca","year":"2003","unstructured":"Tenca, A.F., Ko\u00e7, \u00c7.K.: A scalable architecture for modular multiplication based on montgomery\u2019s algorithm. IEEE Transactions on Computers\u00a052(9), 1215\u20131221 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"4_CR37","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-642-03944-7_8","volume-title":"Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks","author":"Hendrik Tews","year":"2009","unstructured":"Tews, H., Jacobs, B.: Performance issues of selective disclosure and blinded issuing protocols on java card. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 95\u2013111. Springer, Heidelberg (2009)"},{"key":"4_CR38","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-37282-7_5","volume-title":"Policies and Research in Identity Management","author":"P. Vullers","year":"2013","unstructured":"Vullers, P., Alp\u00e1r, G.: Efficient selective disclosure on smart cards using idemix. In: Fischer-H\u00fcbner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol.\u00a0396, pp. 53\u201367. Springer, Heidelberg (2013)"},{"key":"4_CR39","unstructured":"Zhou, Y., Wang, X.: An improved implementation of montgomery algorithm using efficient pipelining and structured parallelism techniques. In: Signals and Systems Conference (ISSC 2010), pp. 7\u201311. IET Irish (June 2010)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T00:04:17Z","timestamp":1563926657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}