{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T18:19:55Z","timestamp":1761934795257,"version":"build-2065373602"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fpt.2003.1275731","type":"proceedings-article","created":{"date-parts":[[2004,6,30]],"date-time":"2004-06-30T19:38:21Z","timestamp":1088624301000},"page":"52-59","source":"Crossref","is-referenced-by-count":12,"title":["Modular exponentiation using parallel multipliers"],"prefix":"10.1109","author":[{"given":"S.H.","family":"Tang","sequence":"first","affiliation":[]},{"given":"K.S.","family":"Tsui","sequence":"additional","affiliation":[]},{"given":"P.H.W.","family":"Leong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ARITH.1995.465359"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ARITH.1991.145533"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/359340.359342"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ARITH.1993.378085"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/370155.370419"},{"year":"2001","journal-title":"Xilinx Inc","article-title":"Vertex-II Platform FPGA Handbook","key":"ref15"},{"key":"ref4","volume":"2","author":"knuth","year":"1981","journal-title":"The art of computer programming"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48059-5_7","article-title":"Fast implemenation of public-key cryptography on a DSP TMS320C6201","author":"itoh","year":"1999","journal-title":"Proc Workshop Cryptographic Hardware and Embedded Systems (CHES '05)"},{"key":"ref6","first-page":"277","article-title":"High-radix modular multiplication for cryp-tosystems","author":"komerup","year":"1993","journal-title":"Proceedings of the 11th IEEE Symposium on Computer Arithmetic"},{"key":"ref5","article-title":"High-speed RSA implementation. Paper","author":"koc","year":"1994","journal-title":"RSA Lab-oratories"},{"key":"ref8","article-title":"VLSI Array Processors","author":"kung","year":"1988","journal-title":"Prentice-Hall Inc"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/12.295851"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-46877-3_21","article-title":"A cryptographic library for the motorola dc;p56000","volume":"473","author":"dusse","year":"1990","journal-title":"Advances in Cryptology EUROCRYPT 90 Lecture Notes in Computer Science"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/12.936241"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.2307\/2007970"}],"event":{"acronym":"FPT-03","name":"2003 IEEE International Conference on Field-Programmable Technology (FPT)","location":"Tokyo, Japan"},"container-title":["Proceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT) (IEEE Cat. No.03EX798)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8988\/28529\/01275731.pdf?arnumber=1275731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T08:26:47Z","timestamp":1497601607000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1275731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fpt.2003.1275731","relation":{},"subject":[]}}