{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T02:11:12Z","timestamp":1768443072518,"version":"3.49.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/dtis.2014.6850661","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T18:24:23Z","timestamp":1406658263000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Investigating large integer arithmetic on Intel Xeon Phi SIMD extensions"],"prefix":"10.1109","author":[{"given":"Anastasis","family":"Keliris","sequence":"first","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"207","volume":"2006","author":"bernstein","year":"2006","journal-title":"Curve25519 New Diffie-Hellman Speed Records in Public Key Cryptography-PKC"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_19"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14390-8_50"},{"key":"15","article-title":"Using streaming SIMD extensions (SSE2) to perform big multiplications","author":"moore","year":"0","journal-title":"Application Note AP-941 Intel Corporation"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670327"},{"key":"13","year":"2013","journal-title":"Intel Xeon Phi Coprocessor Developers Quick Start Guide"},{"key":"14","author":"reinders","year":"2013","journal-title":"AVX-512 Instructions"},{"key":"11","year":"2014","journal-title":"Architectures Software Developer Manuals"},{"key":"12","author":"cortex","year":"2012","journal-title":"A9 Technical Reference Manual"},{"key":"21","author":"granlund","year":"2013","journal-title":"GMP Development Team GNU MP The GNU Multiple Precision Arithmetic Library"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"22","first-page":"334","volume":"2005","author":"cook","year":"2005","journal-title":"Cryptographics Secret Key Cryptography Using Graphics Cards in Topics in Cryptology-CT-RSA"},{"key":"23","first-page":"213","volume":"2007","author":"fleissner","year":"2007","journal-title":"Gpu-accelerated Montgomery Exponentiation in Computational Science-ICCS"},{"key":"24","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1109\/IPDPS.2013.44","article-title":"Exploring SIMD for molecular dynamics","author":"pennycook","year":"2013","journal-title":"Using Intel Xeon Processors and Intel Xeon Phi Coprocessors in Parallel &Distributed Processing (IPDPS) 2013 IEEE 27th International Symposium On IEEE"},{"key":"25","author":"fang","year":"2013","journal-title":"An Empirical Study of Intel Xeon Phi"},{"key":"26","author":"barth","year":"0","journal-title":"Best Practice Guide Intel Xeon"},{"key":"27","author":"reinders","year":"2012","journal-title":"An Overview of Programming for Intel Xeon Processors and Intel Xeon Phi Coprocessors"},{"key":"28","year":"2012","journal-title":"Intel Xeon Phi Coprocessor Instruction Set Architecture Reference Manual"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996853"},{"key":"3","author":"ferguson","year":"2012","journal-title":"Cryptography Engineering Design Principles and Practical Applications"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"10","author":"patterson","year":"2013","journal-title":"Computer Organization and Design The Hardware\/Software Interface"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"30","year":"2014","journal-title":"Intel Instruction Set Architecture Extensions"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"32","first-page":"714","article-title":"The complexity of a scheme of functional elements realizing the multiplication of integers","volume":"3","author":"toom","year":"1963","journal-title":"Soviet Mathematics Doklady"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"31","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"karatsuba","year":"1963","journal-title":"Soviet Physics Doklady"},{"key":"4","first-page":"644","article-title":"New directions in cryptography information theory","volume":"22","author":"diffie","year":"1976","journal-title":"IEEE Transactions on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31662-3_9"},{"key":"8","year":"2013","journal-title":"Digital signature standard"}],"event":{"name":"2014 9th International Conference on Design & Technology of Integrated Systems in Nanoscale Era (DTIS)","location":"Santorini, Greece","start":{"date-parts":[[2014,5,6]]},"end":{"date-parts":[[2014,5,8]]}},"container-title":["2014 9th IEEE International Conference on Design &amp; Technology of Integrated Systems in Nanoscale Era (DTIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6844517\/6850634\/06850661.pdf?arnumber=6850661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:30:40Z","timestamp":1498152640000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6850661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/dtis.2014.6850661","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}