{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:58:33Z","timestamp":1729627113494,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/conielecomp.2013.6525770","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T14:55:03Z","timestamp":1372172103000},"page":"114-119","source":"Crossref","is-referenced-by-count":3,"title":["A performance comparison of elliptic curve scalar multiplication algorithms on smartphones"],"prefix":"10.1109","author":[{"given":"A. C.","family":"Reyes","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. K. V.","family":"Castillo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miguel","family":"Morales-Sandoval","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A.","family":"Diaz-Perez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"On the Efficiency Analysis of WNAF and WMof","year":"2005","author":"fan","key":"19"},{"journal-title":"Aplicacio?n Del Me?todo Bootstrap Al Contraste de Hipo?tesis en la Investigacio?n Educativa","year":"2005","author":"gil-flores","key":"22"},{"journal-title":"Recommended Elliptic Curve Domain Parameters","year":"2000","key":"17"},{"year":"2012","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.5120\/2395-3181"},{"key":"24","first-page":"298","article-title":"Improved techniques for fast exponentiation","author":"mo?ller","year":"2002","journal-title":"ICISC"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"journal-title":"ANSI X9 62-1998 Public Key Cryptography for The Financial Services Industry The Elliptic Curve Digital Signature Algorithm (ECDSA)","year":"1998","key":"16"},{"journal-title":"Standard Specififications for Public Key Cryptography","year":"1998","key":"13"},{"journal-title":"Recommended Elliptic Curves for Federal Government Use","year":"1999","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/18.259647"},{"key":"12","first-page":"100","article-title":"Accelerating the scalar multiplication on elliptic curve cryptosystems over prime fields","volume":"2008","author":"longa","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"key":"21","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/3-540-48892-8_16","article-title":"Improved algorithms for elliptic curve arithmetic in GF(2n)","volume":"1556","author":"lo?pez","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0311-z"},{"key":"20","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/3-540-36563-X_23","article-title":"The width-W NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks","author":"okeya","year":"2003","journal-title":"Proceedings of the 2003 RSA Conference on the Cryptographers'Track CT-RSA?03"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30955-7_17"},{"journal-title":"Practical Cryptography","year":"2003","author":"ferguson","key":"1"},{"key":"10","first-page":"417","article-title":"Use of elliptic curves in cryptography","author":"miller","year":"1985","journal-title":"Crypto"},{"journal-title":"Paralelizacio?n de la Multiplicacio?n Escalar en Curvas Eli?pticas en Una Arquitectura Multin?ucleo de Intel","year":"2010","author":"herna?ndez","key":"7"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"6"},{"key":"5","first-page":"502","article-title":"Elliptic curve cryptography on a Palm OS Device","author":"weimerskirch","year":"2001","journal-title":"ACISP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295256"},{"key":"9","first-page":"390","article-title":"Elliptic curve cryptography: The serpentine course of a paradigm shift","volume":"2008","author":"koblitz","year":"2008","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"A Reconfigurable and Interoperable Hardware Architecture for Elliptic Curve Cryptography","year":"2008","author":"morales-sandoval","key":"8"}],"event":{"name":"2013 23rd International Conference on Electronics, Communications and Computing (CONIELECOMP)","start":{"date-parts":[[2013,3,11]]},"location":"Cholula","end":{"date-parts":[[2013,3,13]]}},"container-title":["CONIELECOMP 2013, 23rd International Conference on Electronics, Communications and Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6520953\/6525736\/06525770.pdf?arnumber=6525770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T11:14:05Z","timestamp":1498043645000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6525770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/conielecomp.2013.6525770","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}