{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:06:33Z","timestamp":1761645993860},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/asap.2010.5540977","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"313-316","source":"Crossref","is-referenced-by-count":44,"title":["A compact FPGA-based architecture for elliptic curve cryptography over prime fields"],"prefix":"10.1109","author":[{"given":"Jo","family":"Vliegen","sequence":"first","affiliation":[]},{"given":"Nele","family":"Mentens","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Genoe","sequence":"additional","affiliation":[]},{"given":"An","family":"Braeken","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Kubera","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Touhafi","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Verbauwhede","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"journal-title":"National Institute of Standards and Technology","first-page":"186","year":"2009","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2003.1212866"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/00207210701293264"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/el:19991230"},{"key":"ref4","first-page":"62","article-title":"Ultra high performance ECC over NIST primes on commercial FPGAs","author":"g\u00fcneysu","year":"2008","journal-title":"Proceedings of the 10th international workshop on Cryptographic Hardware and Embedded Systems (CHES) number 5154 in Lecture Notes in Computer Science"},{"journal-title":"Cryptographic Key Length Recommendation","year":"2009","author":"giry","key":"ref3"},{"key":"ref6","first-page":"296","article-title":"Improved Elliptic Curve multiplication methods resistant against Side Channel Attacks","author":"izu","year":"2002","journal-title":"Progress in Cryptology (IndoCrypt) number 2551 in Lecture Notes in Computer Science"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"ref5"},{"key":"ref8","first-page":"104","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO) number 1109 in Lecture Notes in Computer Science"},{"key":"ref7","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO) number 1666 in Lecture Notes in Computer Science"},{"key":"ref2","first-page":"292","article-title":"Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems","author":"coron","year":"1999","journal-title":"Proceedings of the 1 st international workshop on Cryptographic Hardware and Embedded Systems (CHES) number 1717 in Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20040606"}],"event":{"name":"2010 21st IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2010,7,7]]},"location":"Rennes, France","end":{"date-parts":[[2010,7,9]]}},"container-title":["ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5523683\/5540749\/05540977.pdf?arnumber=5540977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:55:17Z","timestamp":1489856117000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5540977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/asap.2010.5540977","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}