{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:26:43Z","timestamp":1725496003950},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768357"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76843-2_46","type":"book-chapter","created":{"date-parts":[[2007,11,21]],"date-time":"2007-11-21T01:07:44Z","timestamp":1195607264000},"page":"1785-1802","source":"Crossref","is-referenced-by-count":2,"title":["Compiler Assisted Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"M.","family":"Barbosa","sequence":"first","affiliation":[]},{"given":"A.","family":"Moss","sequence":"additional","affiliation":[]},{"given":"D.","family":"Page","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-36400-5_4","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"D. Agrawal","year":"2003","unstructured":"Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 29\u201345. Springer, Heidelberg (2003)"},{"key":"46_CR2","unstructured":"ARM Limited. ARM946E-S Technical Reference Manual. Available from: http:\/\/www.arm.com\/documentation\/"},{"key":"46_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-540-28632-5_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"R.M. Avanzi","year":"2004","unstructured":"Avanzi, R.M.: Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 148\u2013162. Springer, Heidelberg (2004)"},{"key":"46_CR4","series-title":"Lecture Notes in Computer Science","first-page":"311","volume-title":"Advances in Cryptology - CRYPTO \u201986","author":"P.D. Barrett","year":"1987","unstructured":"Barrett, P.D.: Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 311\u2013323. Springer, Heidelberg (1987)"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Barbosa, M., Page, D.: On the Automatic Construction of Indistinguishable Operations. Cryptology ePrint Archive Report 2005\/174 (2005)","DOI":"10.1007\/11586821_16"},{"key":"46_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"46_CR7","volume-title":"Advances in Elliptic Curve Cryptography","author":"I.F. Blake","year":"2004","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. Cambridge University Press, Cambridge (2004)"},{"key":"46_CR8","unstructured":"Camenisch, J., Rohe, M., Sadeghi, A-R.: Sokrates - A Compiler Framework for Zero-Knowledge Protocols. In: WEWoRC. Western European Workshop on Research in Cryptology (2005)"},{"key":"46_CR9","unstructured":"Computational Algebra Group, University of Sydney. Magma Computational Algebra System. Available from: http:\/\/magma.maths.usyd.edu.au\/magma\/"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Consel, C., Hornof, L., Marlet, R., Muller, G., Thibault, S., Volanschi, E-N., Lawall, J., Noy\u00e1, J.: Tempo: Specializing Systems Applications and Beyond. ACM Computing Surveys\u00a030(3) (1998)","DOI":"10.1145\/289121.289140"},{"key":"46_CR11","unstructured":"Crescenzi, P., Kann, V.: A Compendium of NP Optimization Problems. Available from: http:\/\/www.nada.kth.se\/~viggo\/problemlist\/"},{"issue":"1","key":"46_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/0021-9991(90)90201-B","volume":"90","author":"G. Dueck","year":"1990","unstructured":"Dueck, G., Scheuer, T.: Threshold Accepting: A General Purpose Optimization Algorithm Appearing Superior to Simulated Annealing. Journal of Computational Physics\u00a090(1), 161\u2013175 (1990)","journal-title":"Journal of Computational Physics"},{"key":"46_CR13","unstructured":"Gaudry, P., Thom\u00e9, E.: The mpF q Library and Implementing Curve-based Key Exchanges. In: SPEED. Software Performance Enhancement for Encryption and Decryption, pp. 49\u201364 (2007)"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, D., Malloy, B., McRae, A.: The Complexity of Scheduling for Data Cache Optimization. Information Sciences\u00a0100(1-4) (1997)","DOI":"10.1016\/S0020-0255(96)00273-3"},{"key":"46_CR15","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"46_CR16","volume-title":"Computer Architecture: A Quantitative Approach","author":"J.L. Hennessy","year":"2006","unstructured":"Hennessy, J.L., Patterson, D.A.: Computer Architecture: A Quantitative Approach. Morgan Kaufmann, San Francisco (2006)"},{"key":"46_CR17","volume-title":"The Art of Computer Programming, Seminumerical Algorithms","author":"D. Knuth","year":"1999","unstructured":"Knuth, D.: The Art of Computer Programming, Seminumerical Algorithms, vol.\u00a02. Addison-Wesley, Reading (1999)"},{"key":"46_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"46_CR19","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"3","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology\u00a03, 139\u2013150 (1989)","journal-title":"Journal of Cryptology"},{"key":"46_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"46_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"46_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-36574-5_10","volume-title":"Algorithms for Memory Hierarchies","author":"M. Kowarschik","year":"2003","unstructured":"Kowarschik, M., Wei, C.: An Overview of Cache Optimization Techniques and Cache-Aware Numerical Algorithms. In: Meyer, U., Sanders, P., Sibeyn, J.F. (eds.) Algorithms for Memory Hierarchies. LNCS, vol.\u00a02625, pp. 213\u2013232. Springer, Heidelberg (2003)"},{"key":"46_CR23","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1109\/MILCOM.2003.1290218","volume":"2","author":"J.R. Lewis","year":"2003","unstructured":"Lewis, J.R., Martin, B.: Cryptol: High Assurance, Retargetable Crypto Development and Validation. Military Communications Conference\u00a02, 820\u2013825 (2003)","journal-title":"Military Communications Conference"},{"key":"46_CR24","unstructured":"Lucks, S., Schmoigl, N., Tatli, E.I.: The Idea and the Architecture of a Cryptographic Compiler. In: WEWoRC. Western European Workshop on Research in Cryptology (2005)"},{"key":"46_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-540-24638-1_16","volume-title":"Theory of Cryptography","author":"S. Micali","year":"2004","unstructured":"Micali, S., Reyzin, L.: Physically Observable Cryptography (Extended Abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol.\u00a02951, pp. 278\u2013296. Springer, Heidelberg (2004)"},{"key":"46_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"46_CR27","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication Without Trial Division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"46_CR28","volume-title":"Advanced Compiler Design and Implementation","author":"S.S. Muchnick","year":"1997","unstructured":"Muchnick, S.S.: Advanced Compiler Design and Implementation. Morgan Kaufmann, San Francisco (1997)"},{"key":"46_CR29","doi-asserted-by":"crossref","unstructured":"Nielsen, J.D., Schwartzbach, M.I.: A Domain-Specific Programming Language for Secure Multiparty Computation. In: PLAS. Programming Languages and Analysis for Security (2007)","DOI":"10.1145\/1255329.1255333"},{"key":"46_CR30","unstructured":"Page, D.: CAO: A Cryptography Aware Language and Compiler, http:\/\/www.cs.bris.ac.uk\/home\/page\/research\/cao.html"},{"key":"46_CR31","doi-asserted-by":"crossref","unstructured":"Sermulins, J., Thies, W., Rabbah, R., Amarasinghe, S.: Cache Aware Optimization of Stream Programs. In: ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (2005)","DOI":"10.1145\/1065910.1065927"},{"key":"46_CR32","unstructured":"Standards for Efficient Cryptography Group (SECG). SEC 2: Recommended Elliptic Curve Domain Parameters (2000), Available from http:\/\/www.secg.org"},{"key":"46_CR33","unstructured":"Shoup, V.: NTL: A Library for doing Number Theory. Available from: http:\/\/www.shoup.net\/ntl\/"},{"key":"46_CR34","unstructured":"Solinas, J.A.: Generalized Mersenne Numbers. Technical Report CORR 99-39, University of Waterloo (1999)"},{"key":"46_CR35","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1049\/el:19991230","volume":"35","author":"C.D. Walter","year":"1999","unstructured":"Walter, C.D.: Montgomery Exponentiation Needs No Final Subtractions. Electronics Letters\u00a035, 1831\u20131832 (1999)","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76843-2_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:41:43Z","timestamp":1619520103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76843-2_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768357"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76843-2_46","relation":{},"subject":[]}}