{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:43:14Z","timestamp":1729636994249,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/asicon.2011.6157314","type":"proceedings-article","created":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T15:44:14Z","timestamp":1330443854000},"page":"751-754","source":"Crossref","is-referenced-by-count":1,"title":["A security processor based on MIPS 4KE architecture"],"prefix":"10.1109","author":[{"family":"Shuai Wang","sequence":"first","affiliation":[]},{"family":"Yang Li","sequence":"additional","affiliation":[]},{"family":"Junbao Liu","sequence":"additional","affiliation":[]},{"family":"Jun Han","sequence":"additional","affiliation":[]},{"family":"Xiaoyang Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/TC.2005.1","article-title":"A Hardware Algorithm for Modular Multiplication\/Division","volume":"54","author":"marcelo","year":"2005","journal-title":"IEEE Transactions on Computers"},{"key":"2","first-page":"189","article-title":"High-radix design of a scalable modular multiplier","author":"tenca","year":"2001","journal-title":"Proceedings 3rd International Workshop on CHES"},{"key":"10","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1109\/TCSII.2009.2019327","article-title":"A Highly Efficient Cipher Processor for Dual-Field Elliptic Curve Cryptography","volume":"56","author":"lai","year":"2009","journal-title":"Circuits and Systems II Express Briefs IEEE Transactions on"},{"key":"1","first-page":"247","article-title":"An algorithm and hardware architecture for integrated modular division and multiplication in GF(p) and GF(2n)","author":"tawalbeh","year":"2004","journal-title":"ASAP 2004 Proceedings 15th IEEE International Conf"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2005.49"},{"key":"6","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-36400-5_13","article-title":"Efficient Software Implementation of AES on 32-Bit Platforms","volume":"2523","author":"bertoni","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"MIPS32 4KE Processor Core Family Software User's Manual","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ASSCC.2006.357891"},{"key":"9","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/3-540-45439-X_18","article-title":"Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator","author":"xu","year":"2001","journal-title":"Proc Information Security (ISC 2001)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190586"}],"event":{"name":"2011 IEEE 9th International Conference on ASIC (ASICON 2011)","start":{"date-parts":[[2011,10,25]]},"location":"Xiamen, China","end":{"date-parts":[[2011,10,28]]}},"container-title":["2011 9th IEEE International Conference on ASIC"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6153219\/6157041\/06157314.pdf?arnumber=6157314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T10:57:15Z","timestamp":1497956235000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6157314\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/asicon.2011.6157314","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}