{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T17:31:12Z","timestamp":1706031072540},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T00:00:00Z","timestamp":1373328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11235-013-9738-6","type":"journal-article","created":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T21:29:40Z","timestamp":1373318980000},"page":"345-357","source":"Crossref","is-referenced-by-count":2,"title":["High-throughput cryptographic system using window-based modular exponentiation for secure communications"],"prefix":"10.1007","volume":"54","author":[{"given":"Nadia","family":"Nedjah","sequence":"first","affiliation":[]},{"given":"Luiza","family":"de Macedo Mourelle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,9]]},"reference":[{"key":"9738_CR1","volume-title":"14th IEEE symposium on computer arithmetic","author":"T. Blum","year":"1999","unstructured":"Blum, T., & Paar, C. (1999). Montgomery modular exponentiation on reconfigurable hardware. In 14th IEEE symposium on computer arithmetic, 14\u201316 April 1999, Adelaide, Australia."},{"issue":"7","key":"9738_CR2","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1109\/12.936241","volume":"50","author":"T. Blum","year":"2001","unstructured":"Blum, T., & Paar, C. (2001). High radix Montgomery modular exponentiation on reconfigurable hardware. IEEE Transactions on Computers, 50(7), 759\u2013764.","journal-title":"IEEE Transactions on Computers"},{"key":"9738_CR3","series-title":"Lecture notes in computer science","first-page":"400","volume-title":"Proc. CRYPTO\u201998","author":"J. Bos","year":"1989","unstructured":"Bos, J., & Coster, M. (1989). Addition chain heuristics. In Lecture notes in computer science: Vol.\u00a0435. Proc. CRYPTO\u201998 (pp.\u00a0400\u2013407). Berlin: Springer."},{"key":"9738_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES\u2014the advanced encryption standard","author":"J. Daemen","year":"2002","unstructured":"Daemen, J., Borg, S., & Rijmen, V. (2002). The design of Rijndael: AES\u2014the advanced encryption standard. Berlin: Springer."},{"issue":"6","key":"9738_CR5","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/12.277287","volume":"42","author":"S. E. Eldridge","year":"1993","unstructured":"Eldridge, S. E., & Walter, C. D. (1993). Hardware implementation of Montgomery\u2019s modular multiplication algorithm. IEEE Transactions on Computers, 42(6), 619\u2013624.","journal-title":"IEEE Transactions on Computers"},{"key":"9738_CR6","unstructured":"FIPS\u2014Federal Information Processing Standards Publication, Data encryption standard, FIPS-pub. 46-3, National Bureau of Standards (1999). http:\/\/csrc.nist.gov\/publications\/fips ."},{"issue":"3","key":"9738_CR7","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11235-005-1689-0","volume":"29","author":"M. S. Hwang","year":"2005","unstructured":"Hwang, M. S., Lee, C. C., Lee, J. Z., & Yang, C. C. (2005). A\u00a0secure protocol for bluetooth PICONETS using elliptic curve cryptography. Telecommunications Systems, 29(3), 165\u2013180.","journal-title":"Telecommunications Systems"},{"key":"9738_CR8","volume-title":"The art of programming: semi-numerical algorithms","author":"D. E. Knuth","year":"1981","unstructured":"Knuth, D. E. (1981). The art of programming: semi-numerical algorithms (2nd ed., Vol.\u00a02). Reading: Addison-Wesley.","edition":"2"},{"key":"9738_CR9","unstructured":"Ko\u00e7, \u00c7. K. (1994). High-speed RSA implementation. Technical report, RSA Laboratories Redwood City, CA, USA, November."},{"issue":"1","key":"9738_CR10","first-page":"60","volume":"83-A","author":"N. Kunihiro","year":"2000","unstructured":"Kunihiro, N., & Yamamoto, H. (2000). New methods for generating short addition chain. IEICE Transactions on Electronics, 83-A(1), 60\u201367.","journal-title":"IEICE Transactions on Electronics"},{"issue":"10","key":"9738_CR11","doi-asserted-by":"crossref","first-page":"3998","DOI":"10.1109\/TIE.2009.2017091","volume":"56","author":"S. K. Lam","year":"2009","unstructured":"Lam, S. K., Srikanthan, T., & Clarke, C. T. (2009). Selecting profitable custom instructions for area\u2013time-efficient realization on reconfigurable architectures. IEEE Transactions on Industrial Electronics, 56(10), 3998\u20134005.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"9738_CR12","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11235-009-9255-9","volume":"44","author":"D. G. Lee","year":"2010","unstructured":"Lee, D. G., Kim, J., Song, J., Lee, Y. S., & Rho, S. (2010). Cryptanalysis of block-wise stream ciphers suitable for protection of multimedia and ubiquitous systems. Telecommunications Systems, 44, 297\u2013306.","journal-title":"Telecommunications Systems"},{"issue":"6","key":"9738_CR13","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1049\/ip-cdt:20040791","volume":"151","author":"C. McIvor","year":"2004","unstructured":"McIvor, C., McLoone, M., & McCanny, J. V. (2004). Modified Montgomery modular multiplication and RSA exponentiation techniques. IEE Proceedings. Computers and Digital Techniques, 151(6), 402\u2013408.","journal-title":"IEE Proceedings. Computers and Digital Techniques"},{"key":"9738_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A. J. Menezes","year":"1996","unstructured":"Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. Boca Raton: CRC Press."},{"key":"9738_CR15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11235-006-9135-5","volume":"32","author":"A. A. Moldovyan","year":"2006","unstructured":"Moldovyan, A. A., Moldovyan, N. A., & Sklavos, N. (2006). Controlled elements for designing ciphers suitable to efficient VLSI implementation. Telecommunications Systems 32, 149\u2013163.","journal-title":"Telecommunications Systems"},{"key":"9738_CR16","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. L. Montgomery","year":"1985","unstructured":"Montgomery, P. L. (1985). Modular multiplication without trial division. Mathematics of Computation, 44, 519\u2013521.","journal-title":"Mathematics of Computation"},{"key":"9738_CR17","volume-title":"VHDL\u2014analysis and modeling of digital systems","author":"Z. Navabi","year":"1998","unstructured":"Navabi, Z. (1998). VHDL\u2014analysis and modeling of digital systems (2nd ed.). New York: McGraw Hill.","edition":"2"},{"key":"9738_CR18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/SBCCI.2002.1137629","volume-title":"Proc. of the 15th. symposium on integrated circuits and systems design","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., & Mourelle, L. M. (2002). Two hardware implementations for the Montgomery multiplication: sequential vs. parallel. In Proc. of the 15th. symposium on integrated circuits and systems design (pp.\u00a03\u20138). Los Alamitos: IEEE Comput. Soc."},{"key":"9738_CR19","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-48035-8_10","volume-title":"Developments in applied artificial intelligence","author":"N. Nedjah","year":"2002","unstructured":"Nedjah, N., & Mourelle, L. M. (2002). Minimal addition chain for efficient modular exponentiation using genetic algorithms. In Lecture notes in computer science: Vol.\u00a02358. Developments in applied artificial intelligence (pp.\u00a088\u201398). Berlin: Springer."},{"key":"9738_CR20","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/S1383-7621(03)00089-4","volume":"49","author":"N. Nedjah","year":"2003","unstructured":"Nedjah, N., & Mourelle, L. M. (2003). Fast reconfigurable systolic hardware for modular multiplication. Journal of Systems Architecture, 49, 387\u2013396.","journal-title":"Journal of Systems Architecture"},{"key":"9738_CR21","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/3-540-45034-3_63","volume-title":"Developments in applied artificial intelligence","author":"N. Nedjah","year":"2003","unstructured":"Nedjah, N., & Mourelle, L. M. (2003). Efficient pre-processing for large window-based modular exponentiation using genetic algorithms. In Lecture notes in computer science: Vol.\u00a02718. Developments in applied artificial intelligence (pp.\u00a0625\u2013635). Berlin: Springer."},{"key":"9738_CR22","first-page":"210","volume-title":"Proc. 3rd international conference on information technology: new generations","author":"N. Nedjah","year":"2006","unstructured":"Nedjah, N., & Mourelle, L. M. (2006). Four hardware implementations for the M-ary modular exponentiation. In Proc. 3rd international conference on information technology: new generations (pp.\u00a0210\u2013215). Los Alamitos: IEEE Comput. Soc."},{"issue":"3","key":"9738_CR23","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1109\/TCSI.2005.858767","volume":"53","author":"N. Nedjah","year":"2006","unstructured":"Nedjah, N., & Mourelle, L. M. (2006). Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic. IEEE Transactions on Circuits and Systems. I, Fundamental Theory and Applications, 53(3), 627\u2013633.","journal-title":"IEEE Transactions on Circuits and Systems. I, Fundamental Theory and Applications"},{"key":"9738_CR24","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.sysarc.2006.09.008","volume":"53","author":"N. Nedjah","year":"2007","unstructured":"Nedjah, N., & Mourelle, L. M. (2007). Fast hardware for modular exponentiation with efficient exponent pre-processing. Journal of Systems Architecture, 53, 99\u2013108.","journal-title":"Journal of Systems Architecture"},{"issue":"1","key":"9738_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.vlsi.2005.12.010","volume":"40","author":"N. Nedjah","year":"2007","unstructured":"Nedjah, N., & Mourelle, L. M. (2007). Efficient and secure cryptographic systems based on addition chains: hardware design vs. software\/hardware co-design. Integration, 40(1), 36\u201344.","journal-title":"Integration"},{"issue":"6","key":"9738_CR26","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s10766-009-0108-7","volume":"37","author":"N. Nedjah","year":"2009","unstructured":"Nedjah, N., & Mourelle, L. M. (2009). High-performance hardware of the sliding-window method for parallel computation of modular exponentiations. International Journal of Parallel Programming, 37(6), 537\u2013555.","journal-title":"International Journal of Parallel Programming"},{"key":"9738_CR27","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., & Adleman, L. (1978). A\u00a0method for obtaining digital signature and public-key cryptosystems. Communications of the ACM, 21, 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"9738_CR28","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1090\/S0025-5718-1964-0159775-8","volume":"18","author":"J. L. Selfridge","year":"1964","unstructured":"Selfridge, J. L., & Hurwitz, A. (1964). Fermat numbers and Mersenne numbers. Mathematic Computations, 18, 146\u2013148.","journal-title":"Mathematic Computations"},{"issue":"9","key":"9738_CR29","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.1109\/TVLSI.2008.2000524","volume":"16","author":"M. D. Shieh","year":"2008","unstructured":"Shieh, M. D., Chen, J. H., Wu, H. H., & Lin, W. C. (2008). A\u00a0new modular exponentiation architecture for efficient design of RSA cryptosystem. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16(9), 1151\u20131161.","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"},{"key":"9738_CR30","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/3-540-45353-9_17","volume-title":"Proceedings of the cryptographer track at RSA conference (CT-RSA 2001)","author":"A. Tiountchik","year":"2001","unstructured":"Tiountchik, A., & Trichina, E. (2001). Modular exponentiation on fine-grained FPGA. In Lecture notes in computer science: Vol.\u00a02020. Proceedings of the cryptographer track at RSA conference (CT-RSA 2001) (pp.\u00a0223\u2013234)."},{"issue":"9","key":"9738_CR31","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1109\/TC.2003.1228516","volume":"52","author":"A. F. Tenca","year":"2003","unstructured":"Tenca, A. F., & Ko\u00e7, \u00c7. K. (2003). A\u00a0scalable architecture for modular multiplication based on Montgomery\u2019s algorithm. IEEE Transactions on Computers, 52(9), 1215\u20131221.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"9738_CR32","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/12.210181","volume":"42","author":"C. D. Walter","year":"1993","unstructured":"Walter, C. D. (1993). Systolic modular multiplication. IEEE Transactions on Computers, 42(3), 376\u2013378.","journal-title":"IEEE Transactions on Computers"},{"key":"9738_CR33","unstructured":"Xilinx\u2122, Inc. Foundation series. http:\/\/www.xilinx.com ."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9738-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-013-9738-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9738-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T17:09:36Z","timestamp":1563383376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-013-9738-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,9]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["9738"],"URL":"https:\/\/doi.org\/10.1007\/s11235-013-9738-6","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,9]]}}}