{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:17:07Z","timestamp":1729649827585,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/hpec.2013.6670320","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T16:58:31Z","timestamp":1386089911000},"page":"1-5","source":"Crossref","is-referenced-by-count":5,"title":["A novel fast modular multiplier architecture for 8,192-bit RSA cryposystem"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xinming","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626410000259"},{"key":"18","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/ISCAS.2001.922322","article-title":"Design of an efficient FFT processor for DAB system","volume":"4","author":"lo","year":"2001","journal-title":"The 2001 IEEE International Symposium on Circuits and Systems 2001"},{"key":"15","first-page":"311","article-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor","author":"barrett","year":"1987","journal-title":"Advances in Cryptology ? CRYPTO? 86"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/82.142032"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626411000266"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2012.6211795"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/BF02242355"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2003.812308"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2004.1269231"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.922321"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000524"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2080653"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1465668"},{"key":"8","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1049\/ip-cdt:20040791","article-title":"Modified Montgomery modular multiplication and RSA exponentiation techniques","volume":"151","author":"mcivor","year":"2004","journal-title":"Computers and Digital Techniques IEE Proceedings"}],"event":{"name":"2013 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2013,9,10]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2013,9,12]]}},"container-title":["2013 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6661474\/6670313\/06670320.pdf?arnumber=6670320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:35:21Z","timestamp":1498088121000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6670320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/hpec.2013.6670320","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}