{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:21:50Z","timestamp":1729660910282,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2003.1193005","type":"proceedings-article","created":{"date-parts":[[2003,12,22]],"date-time":"2003-12-22T12:34:10Z","timestamp":1072096450000},"page":"807-811","source":"Crossref","is-referenced-by-count":5,"title":["Fast algorithms for common-multiplicand multiplication and exponentiation by performing complements"],"prefix":"10.1109","author":[{"family":"Chin-Chen Chang","sequence":"first","affiliation":[]},{"family":"Ying-Tse Kuo","sequence":"additional","affiliation":[]},{"family":"Chu-Hsing Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1049\/el:19960662","article-title":"fast exponentiation method obtained by folding the exponent in half","volume":"32","author":"lou","year":"1996","journal-title":"Electronics Letters"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/el:19890785"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/el:19951189"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystem","volume":"21","author":"rivest","year":"0","journal-title":"Communications of the ACM"},{"key":"ref8","first-page":"1160","article-title":"Improved Common-multiplicand multiplication and fast exponentiation by exponent decomposition","volume":"e80 a","author":"yen","year":"1997","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/el:19931055"},{"article-title":"The art of computer programming. vol. II:seminumerical algorithms","year":"1969","author":"knuth","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"}],"event":{"name":"17th International Conference on Advanced Information Networking and Applications. AINA 2003","acronym":"AINA-03","location":"Xi'an, China"},"container-title":["17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8485\/26745\/01193005.pdf?arnumber=1193005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:57:59Z","timestamp":1497567479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1193005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/aina.2003.1193005","relation":{},"subject":[]}}