{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T21:26:53Z","timestamp":1762896413712},"reference-count":31,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T00:00:00Z","timestamp":1078099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2004,3]]},"DOI":"10.1016\/s0164-1212(03)00075-x","type":"journal-article","created":{"date-parts":[[2003,10,15]],"date-time":"2003-10-15T11:38:36Z","timestamp":1066217916000},"page":"299-313","source":"Crossref","is-referenced-by-count":13,"title":["FPGA based hardware acceleration for elliptic curve public key cryptosystems"],"prefix":"10.1016","volume":"70","author":[{"given":"M.","family":"Ernst","sequence":"first","affiliation":[]},{"given":"B.","family":"Henhapl","sequence":"additional","affiliation":[]},{"given":"S.","family":"Klupsch","sequence":"additional","affiliation":[]},{"given":"S.","family":"Huss","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/S0164-1212(03)00075-X_BIB1","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/49.223883","article-title":"An implementation of elliptic curve cryptosystems over F2155","volume":"11","author":"Agnew","year":"1993","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB2","unstructured":"ANSI X9.62, 1999. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), available from the ANSI X9 catalog"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB3","doi-asserted-by":"crossref","unstructured":"Ernst, M., Klupsch, S., Hauck, O., Huss, S., 2001. Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems. In: Proceedings of the 12th IEEE Workshop on Rapid System Prototyping (RSP01), Monterey, CA","DOI":"10.1109\/IWRSP.2001.933834"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB4","series-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES2000), LNCS 1965","first-page":"1","article-title":"Software implementation of elliptic curve cryptography over binary fields","author":"Hankerson","year":"2000"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB5","doi-asserted-by":"crossref","unstructured":"Hauck, O., Katoch, A., Huss, S., 2000. VLSI system design using asynchronous wave pipelines: A 0.35 \u03bcm CMOS 1.5 GHz elliptic curve public key cryptosystem chip. In: Proceedings of the IEEE ASYNC 2000, Eilat","DOI":"10.1109\/ASYNC.2000.837014"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB6","unstructured":"Institute of Cryptography and Computer Algebra, 2001. TU Darmstadt, FlexiProvider. Available from <http:\/\/www.flexiprovider.de>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB7","unstructured":"Institute of Cryptography and Computer Algebra, TU Darmstadt, 2001. FlexiPKI. Available from <http:\/\/www.informatik.tu-darmstadt.de\/TI\/Forschung\/FlexiPKI\/Welcome.html>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB8","unstructured":"IEEE 1076.6, 1999. Standard for VHDL Register Transfer Level Synthesis. IEEE Standards Department, New York"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB9","unstructured":"IEEE 1363, 2000. Standard Specifications For Public Key Cryptography. Available from <http:\/\/grouper.ieee.org\/groups\/1363\/>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB10","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","article-title":"A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases","volume":"78","author":"Itoh","year":"1988","journal-title":"Information and Computation"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB11","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","author":"Johnson","year":"2001","journal-title":"International Journal on Information Security"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB12","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Mathematics of Computation"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB13","series-title":"Proceedings of the Workshop on Practice and Theory in Public Key Cryptography","first-page":"446","article-title":"Selecting cryptographic key sizes","author":"Lenstra","year":"2000"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB14","doi-asserted-by":"crossref","unstructured":"Leung, K.H., Ma, K.W., Wong, W.K., Leong, P.H.W., 2000. FPGA implementation of a microcoded elliptic curve cryptographic processor. In: Proceedings of the IEEE FCCM 2000. pp. 68\u201376, Napa Valley","DOI":"10.1109\/FPGA.2000.903394"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB15","series-title":"Selected Areas in Cryptography (SAC\u201998), LNCS 1556","first-page":"201","article-title":"Improved algorithms for elliptic curve arithmetic in GF(2n)","author":"Lopez","year":"1998"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB16","unstructured":"Lopez J., Dahab, R., 2000. Performance of elliptic curve cryptosystems. Technical Report, IC-00-08. Available from <http:\/\/www.dcc.unicamp.br\/ic-main\/publications-e.html>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB17","unstructured":"Massey, J., Omura, J., 1986. Computational Method and Apparatus for Finite Field Arithmetic. US Patent 4,587,627"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB18","series-title":"Elliptic Curve Public Key Cryptosystems","author":"Menezes","year":"1993"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB19","series-title":"Advances in Cryptology, Proceedings of the CRYPTO\u201985, LNCS 218","first-page":"417","article-title":"Use of elliptic curves in cryptography","author":"Miller","year":"1986"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB20","unstructured":"National Institute of Standards and Technology, Digital Signature Standard (DSS), FIPS Publication 186-2, 2000"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB21","series-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965","first-page":"25","article-title":"Implementation of elliptic curve cryptographic coprocessor over GF(2m) on an FPGA","author":"Okada","year":"2000"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB22","series-title":"Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), LNCS 1965","first-page":"25","article-title":"A high-performance reconfigurable elliptic curve processor for GF(2m)","author":"Orlando","year":"2000"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB23","doi-asserted-by":"crossref","DOI":"10.1145\/359340.359342","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB24","series-title":"Implementing Elliptic Curve Cryptography","author":"Rosing","year":"1999"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB25","unstructured":"Silicon Software, 1999. microEnable Users Guide"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB26","series-title":"Graduate Texts in Mathematics","article-title":"The arithmetic of elliptic curves","author":"Silverman","year":"1986"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB27","unstructured":"SUN, 1997. Java Cryptography Architecture. Available from <http:\/\/java.sun.com\/products\/jdk\/1.1\/docs\/guide\/security\/CryptoSpec.html>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB28","unstructured":"SUN, 1997. Java Native Interface. Available from <http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/guide\/jni\/spec\/jniTOC.doc.html>"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB29","series-title":"Proceedings of the Asia Pacific Conference on Circuits and Systems","first-page":"647","article-title":"Design and implementation of arithmetic processor F2155 for elliptic curve cryptosystems","author":"Sutikno","year":"1998"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB30","series-title":"Proceeding of the Algorithmic Number Theory Symposium III, LNCS 1423","first-page":"252","article-title":"On the performance of signature schemes based on elliptic curves","author":"Win","year":"1998"},{"key":"10.1016\/S0164-1212(03)00075-X_BIB31","unstructured":"Xilinx, 2001. Programmable Logic Data Book"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412120300075X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016412120300075X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T13:50:53Z","timestamp":1550584253000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016412120300075X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,3]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2004,3]]}},"alternative-id":["S016412120300075X"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(03)00075-x","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2004,3]]}}}