{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:57:33Z","timestamp":1729659453588,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,15]]},"DOI":"10.1109\/acit52158.2021.9548534","type":"proceedings-article","created":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T03:29:27Z","timestamp":1633145367000},"page":"494-498","source":"Crossref","is-referenced-by-count":0,"title":["Sustainability and Time Complexity Estimation of \u0421ryptographic Algorithms Main Operations on Elliptic Curves"],"prefix":"10.1109","author":[{"given":"Igor","family":"Yakymenko","sequence":"first","affiliation":[]},{"given":"Mykhailo","family":"Kasianchuk","sequence":"additional","affiliation":[]},{"given":"Vasyl","family":"Yatskiv","sequence":"additional","affiliation":[]},{"given":"Ruslan","family":"Shevchuk","sequence":"additional","affiliation":[]},{"given":"Vasyl","family":"Koval","sequence":"additional","affiliation":[]},{"given":"Solomiya","family":"Yatskiv","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"3129","article-title":"On the discrete logarithm problem in finite fields of fixed characteristic","author":"granger","year":"2018","journal-title":"Trans Am Math Soc"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.11591\/ijins.v1i3.749"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-015-9192-5"},{"key":"ref13","first-page":"7","article-title":"Ishikawa Hirofumi The order of elliptic curves over finite fields of characteristic two using the Schoof algorithm","volume":"12","author":"keigo","year":"2007","journal-title":"Journal of the Faculty of Environmental Science and Technology Okayama University"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516734"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/CMCE.2010.5609834","article-title":"An efficient elliptic curve scalar multiplication algorithm against side channel attacks","author":"pang","year":"2010","journal-title":"2010 International Conference on Computer Mechatronics Control and Electronic Engineering"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1109\/TIE.2012.2186104","article-title":"Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations","volume":"60","author":"gustavo","year":"2013","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"ref17","first-page":"18","article-title":"Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers","author":"chung","year":"2016","journal-title":"Selected Areas in Cryptography - SAC 2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725326"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CADSM.2015.7230866"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s10559-021-00358-6","article-title":"Symmetric Cryptoalgorithms in the Residue Number System","volume":"57","author":"kasianchuk","year":"2021","journal-title":"Cybernetics and Systems Analysis"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"ref3","first-page":"49","author":"papachristodoulou","year":"2017","journal-title":"Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336262"},{"key":"ref5","first-page":"9053","article-title":"RSA and ECC: A Comparative Analysis","volume":"12","author":"mahto","year":"2017","journal-title":"International Journal of Applied Engineering Research"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzy035"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208923"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET49122.2020.235572"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18588-0"},{"key":"ref1","first-page":"232","article-title":"The Method of Factorizing Multi-Digit Numbers Based on the Operation of Adding Odd Numbers","author":"kasianchuk","year":"0","journal-title":"Proceedings of the International Conference &#x201C;Advanced Computer Information Technology (ACIT 2018)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1615\/JAutomatInfScien.v48.i8.60"},{"key":"ref22","first-page":"5","article-title":"Analysis and optimization of elliptic-curve single-scalar multiplication","author":"daniel","year":"2007","journal-title":"Contemporary Mathematics"},{"key":"ref21","first-page":"241","article-title":"Matrix Algorithms of Processing of the Information Flow in Computer Systems Based on Theoretical and Numerical Krestenson&#x2019;s Basis","author":"yakymenko","year":"2010","journal-title":"Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET&#x2013;2010) Proceedings of the X&#x2013;th International Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03441-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_21"},{"key":"ref26","article-title":"A New Double Point Multiplication Method and its Implementation on Binary Elliptic Curves with Endomorphisms","author":"azarderakhsh","year":"2002","journal-title":"Algebra"},{"key":"ref25","first-page":"255","article-title":"Fast Simultaneous. Scalar Multiplication on Elliptic Curve with Montgomery Form, Selected Areas in Cryptology(SAC) 2001","volume":"2259","author":"akishita","year":"0","journal-title":"LNCS"}],"event":{"name":"2021 11th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2021,9,15]]},"location":"Deggendorf, Germany","end":{"date-parts":[[2021,9,17]]}},"container-title":["2021 11th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9548321\/9548113\/09548534.pdf?arnumber=9548534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:39:36Z","timestamp":1725863976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9548534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/acit52158.2021.9548534","relation":{},"subject":[],"published":{"date-parts":[[2021,9,15]]}}}