{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T19:18:11Z","timestamp":1725391091529},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/fpt.2010.5681440","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T09:09:43Z","timestamp":1294391383000},"page":"308-311","source":"Crossref","is-referenced-by-count":4,"title":["Reconfigurable Number Theoretic Transform architectures for cryptographic applications"],"prefix":"10.1109","author":[{"given":"Gavin Xiaoxu","family":"Yao","sequence":"first","affiliation":[]},{"given":"Ray","family":"Cheung","sequence":"additional","affiliation":[]},{"given":"Cetin","family":"Kaya Koc","sequence":"additional","affiliation":[]},{"given":"Kim Fung","family":"Man","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cryptographic Key Length Recommendation","year":"2010","author":"giry","key":"ref10"},{"journal-title":"Has the RSA algorithm been compromised as a result of Bernstein?s Paper?","year":"2002","author":"silverman","key":"ref11"},{"key":"ref12","first-page":"158","article-title":"Efficient VLSI implementation of modulo (2n&#x00B1; 1) addition and multiplication","author":"zimmermann","year":"1999","journal-title":"Computer Arithmetic 1999 Proceedings 14th IEEE Symposium on"},{"journal-title":"Computer Arithmetic Algorithms and Hardware Designs","year":"2010","author":"parhami","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.34"},{"key":"ref3","article-title":"Spectral modular arithmetic","author":"saldamh","year":"2005","journal-title":"Ph D Dissertation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2307\/2004932"},{"key":"ref5","article-title":"Frequency domain finite field arithmetic for elliptic curve cryptography","author":"baktir","year":"2008","journal-title":"Ph D Dissertation"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/78.149994"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1974.1162555"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2005.858612"}],"event":{"name":"2010 International Conference on Field-Programmable Technology (FPT)","start":{"date-parts":[[2010,12,8]]},"location":"Beijing, China","end":{"date-parts":[[2010,12,10]]}},"container-title":["2010 International Conference on Field-Programmable Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5677390\/5681421\/05681440.pdf?arnumber=5681440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:02:49Z","timestamp":1490050969000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5681440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/fpt.2010.5681440","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}