{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T05:17:23Z","timestamp":1739078243085,"version":"3.37.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Gener Comput"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/bf03037659","type":"journal-article","created":{"date-parts":[[2009,4,24]],"date-time":"2009-04-24T03:41:12Z","timestamp":1240544472000},"page":"259-275","source":"Crossref","is-referenced-by-count":0,"title":["Secure evolvable hardware for public-key cryptosystems"],"prefix":"10.1007","volume":"23","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza","family":"de Macedo Mourelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03037659_CR1","unstructured":"Aho, A.V., Ravi, S. and Ullman, J.D., \u201cCompilers: Principles, Techniques and Tools,\u201d Addison-Wesley, 1986."},{"key":"BF03037659_CR2","doi-asserted-by":"crossref","unstructured":"Blum, T. and Paar, C., \u201cMontgomery Modular Exponentiation on Reconfigurable Hardware,\u201d inProc. of the 14th. IEEE Symposium on Computer Arithmetic, Australia, 1999.","DOI":"10.1109\/ARITH.1999.762831"},{"key":"BF03037659_CR3","doi-asserted-by":"crossref","unstructured":"Brickell, E.F., \u201cA Survey of Hardware Implementation of RSA,\u201d inAdvances in Cryptology, LNCS (Brassard, G. ed.),435, pp. 368\u2013370, Springer-Verlag, 1989.","DOI":"10.1007\/0-387-34805-0_34"},{"key":"BF03037659_CR4","doi-asserted-by":"crossref","unstructured":"Dabbish, E.A. and Sloan, R.H., \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards,\u201d inProc. Cryptographic Hardware and Embedded Systems, LNCS, 1717, pp. 144\u2013157, 1999.","DOI":"10.1007\/3-540-48059-5_14"},{"key":"BF03037659_CR5","unstructured":"Ercegovac, M.D., Lang, T. and Moreno, J.H., \u201cIntroduction to Digital Systems,\u201d John Wiley, 1999."},{"issue":"1","key":"BF03037659_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1162\/evco.1995.3.1.1","volume":"3","author":"C.M. Fonseca","year":"1995","unstructured":"Fonseca, C.M. and Fleming, P.J., \u201cAn Overview of Evolutionary Algorithms in Multi-objective Optimization,\u201dEvolutionary Computation, 3, 1, pp. 1\u201316, 1995.","journal-title":"Evolutionary Computation"},{"key":"BF03037659_CR7","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M., \u201cA Survey of Fast Exponentiation Methods,\u201dJournal of Algorithms, 27, pp. 129\u2013146, 1998.","journal-title":"Journal of Algorithms"},{"key":"BF03037659_CR8","unstructured":"Haupt, R.L. and Haupt, S.E., \u201cPractical Genetic Algorithms,\u201d John Wiley and Sons, 1998."},{"issue":"1","key":"BF03037659_CR9","first-page":"593","volume":"72","author":"M. Karnaugh","year":"1953","unstructured":"Karnaugh, M., \u201cA Map Method for Synthesis of Combinational Logic Circuits,\u201dTransactions of the AIEE, Communications and Electronics, 72, 1, pp. 593\u2013599, November 1953.","journal-title":"Transactions of the AIEE, Communications and Electronics"},{"key":"BF03037659_CR10","unstructured":"Koza, J.R., \u201cGenetic Programming,\u201d MIT Press, 1992."},{"issue":"5","key":"BF03037659_CR11","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1002\/j.1538-7305.1956.tb03835.x","volume":"35","author":"E.J. Mccluskey","year":"1956","unstructured":"Mccluskey, E.J., \u201cMinimisation of Boolean Functions,\u201dBell Systems Technical Journal, 35, 5, 1417\u20131444, November 1956.","journal-title":"Bell Systems Technical Journal"},{"key":"BF03037659_CR12","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Van Oorschot, P.C. and Scott A. Vanstone, \u201cHandbook of Applied Cryptography,\u201d CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"BF03037659_CR13","doi-asserted-by":"crossref","unstructured":"Messerges, T.S., Dabbish, E.A. and Sloan, R.H., \u201dPower Analysis Attacks of Modular Exponentiation in Smartcards,\u201d inProc. Cryptographic Hardware and Embedded Systems, LNCS, 1717, pp. 144\u2013157, 1999.","DOI":"10.1007\/3-540-48059-5_14"},{"key":"BF03037659_CR14","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1023\/A:1010016313373","volume":"1","author":"J.F. Miller","year":"2000","unstructured":"Miller, J.F., Job, D. and Vassilev, V.K., \u201cPrinciples in the Evolutionary Design of Digital Circuits,\u201dJournal of Genetic Programming and Evolvable Machines, 1, pp. 7\u201335, 2000.","journal-title":"Journal of Genetic Programming and Evolvable Machines"},{"key":"BF03037659_CR15","doi-asserted-by":"crossref","unstructured":"Nedjah, N. and Mourelle, L.M., \u201cTwo Hardware Implementations for the Montgomery Multiplication: Sequential vs. Parallel,\u201d inProc. of the 15th. Symposium on Integrated Circuits and Systems Design, Porto Alegre, RS, Brazil, (Reis R. and Calazans, N. Eds.), IEEE Computer Society Press, pp. 3\u20138, 2002.","DOI":"10.1109\/SBCCI.2002.1137629"},{"key":"BF03037659_CR16","doi-asserted-by":"crossref","unstructured":"Nedjah, N. and Mourelle, L.M., \u201cReconfigurable Hardware Implementation of Montgomery Modular Multiplication and Parallel Binary Exponentiation,\u201d inProc. of the Euromicro Symposium on Digital System Design, IEEE Computer Society Press, pp. 226\u2013235, Dortmund, Germany, 2002.","DOI":"10.1109\/DSD.2002.1115373"},{"key":"BF03037659_CR17","unstructured":"Poli, R., \u201cEfficient Evolution of Parallel Binary Multipliers and Continuous Symbolic Regression Expressions with Sub-machine Code GP,\u201dTechnical Report CSRP-9819, University of Birmingham, School of Computer Science, December 1998."},{"key":"BF03037659_CR18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A. and Adleman, L., \u201cA Method for Obtaining Digital Signature and Public-key Cryptosystems,\u201dCommunications of the ACM, 21, pp. 120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"BF03037659_CR19","unstructured":"Rhyne, V.T., \u201cFundamentals of Digital Systems Design (Kuo, F.F. ed.),\u201d Prentice-Hall Electrical Engineering Series, 1973."},{"issue":"9","key":"BF03037659_CR20","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1049\/el:19980624","volume":"34","author":"A. Tiountchik","year":"1998","unstructured":"Tiountchik, A., \u201cSystolic Modular Exponentiation via Montgomery Algorithm,\u201dElectronic Letters, 34, 9, pp. 874\u2013875, 1998.","journal-title":"Electronic Letters"},{"issue":"1","key":"BF03037659_CR21","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/13.485236","volume":"39","author":"B.C.H. Turton","year":"1996","unstructured":"Turton, B.C.H., \u201cExtending Quine-McCluskey for Exclusive-or Logic Synthesis,\u201dIEEE Transactions on Education, 39, 1, pp. 81\u201385, February 1996.","journal-title":"IEEE Transactions on Education"},{"key":"BF03037659_CR22","unstructured":"XILINXTM, Inc., foundation Series Software, http:\/\/www.xilinx.com, 2002."}],"container-title":["New Generation Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037659.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03037659\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03037659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T04:42:21Z","timestamp":1739076141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03037659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["BF03037659"],"URL":"https:\/\/doi.org\/10.1007\/bf03037659","relation":{},"ISSN":["0288-3635","1882-7055"],"issn-type":[{"type":"print","value":"0288-3635"},{"type":"electronic","value":"1882-7055"}],"subject":[],"published":{"date-parts":[[2005,9]]}}}