{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T05:47:44Z","timestamp":1744436864454},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fpt.2003.1275732","type":"proceedings-article","created":{"date-parts":[[2004,6,30]],"date-time":"2004-06-30T19:38:21Z","timestamp":1088624301000},"page":"60-67","source":"Crossref","is-referenced-by-count":8,"title":["Implementation of Elliptic Curve Cryptosystems on a reconfigurable computer"],"prefix":"10.1109","author":[{"given":"N.","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"K.","family":"Gaj","sequence":"additional","affiliation":[]},{"given":"D.","family":"Caliga","sequence":"additional","affiliation":[]},{"given":"T.","family":"El-Ghazawi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5207-9"},{"journal-title":"SRCInc Web Paae","year":"0","key":"ref3"},{"key":"ref10","first-page":"1","article-title":"Software Implementation of Elliptic CUIVe Cryptography over Binary Fields","author":"hankerson","year":"2000","journal-title":"CHES 2000 LNCS 1965"},{"journal-title":"Irnnlementina Elliptic Curve Crvntozraohv","year":"1999","author":"rosing","key":"ref6"},{"key":"ref11","first-page":"500","article-title":"Dual-Field Arithmetic Unit for GF(p) and GF(2m)","author":"wolkerstorfer","year":"2002","journal-title":"CHES 2002 LNCS 2523"},{"journal-title":"IEEE P1363 Standard Specifications for Public Key Cryptography","year":"1999","key":"ref5"},{"journal-title":"LiDIA A Library for Computational Number Theory Technical University of Darmstadt","year":"0","key":"ref12"},{"key":"ref8","first-page":"349","article-title":"An End-to-End Systems Approach to Elliptic Curve Cryptography","author":"gura","year":"2002","journal-title":"CHES 2002 LNCS 2523"},{"journal-title":"FIPS 186&#x2013;2 Digital Signature Standard (DSS)","year":"2000","key":"ref7"},{"key":"ref2","article-title":"Factoring Lame Numbers with the TWIRL Device","author":"shamir","year":"2003","journal-title":"CRYPTO 2003 LNCS 2729"},{"key":"ref9","first-page":"25","article-title":"Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2rm) on FPGA","author":"okada","year":"2000","journal-title":"CHES 2000 LNCS 1965"},{"article-title":"Circuits for Integer Factorization: A Proposal","year":"0","author":"bernstein","key":"ref1"}],"event":{"name":"2003 IEEE International Conference on Field-Programmable Technology (FPT)","acronym":"FPT-03","location":"Tokyo, Japan"},"container-title":["Proceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT) (IEEE Cat. No.03EX798)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8988\/28529\/01275732.pdf?arnumber=1275732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T03:56:37Z","timestamp":1489463797000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1275732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/fpt.2003.1275732","relation":{},"subject":[]}}