{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:37:39Z","timestamp":1729625859492,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/iccd.2009.5413128","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T18:35:32Z","timestamp":1266431732000},"page":"372-377","source":"Crossref","is-referenced-by-count":4,"title":["Efficient architectures for elliptic curve cryptography processors for RFID"],"prefix":"10.1109","author":[{"given":"Lawrence","family":"Leinweber","sequence":"first","affiliation":[]},{"given":"Christos","family":"Papachristou","sequence":"additional","affiliation":[]},{"given":"Francis G.","family":"Wolff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1017\/CBO9781107360211"},{"key":"ref11","article-title":"Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure Against the Timing Attack","volume":"1977","author":"okeya","year":"2000","journal-title":"Progress in Cryptography"},{"key":"ref12","article-title":"Projective Coordinates Leak","volume":"3027","author":"naccache","year":"2004","journal-title":"Advances in Cryptography"},{"key":"ref13","article-title":"Hardware Design Issues in Elliptic Curve Cryptography","author":"fournaris","year":"2007","journal-title":"Wireless Security and Cryptography Specifications and Implementations"},{"key":"ref14","article-title":"State of the Art in Hardware Implementations of Cryptographic Algorithms","author":"batina","year":"2006","journal-title":"Information Society Technologies Publication IST-2002&#x2013;507932"},{"key":"ref15","article-title":"RFID-Tags for Anti-Counterfeiting","volume":"3860","author":"tuyls","year":"2006","journal-title":"Proc Cryptographers Track-RSA Conf (CT-RSA)"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/11964254_3","article-title":"Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks","volume":"4357","author":"batina","year":"2006","journal-title":"3rd European Workshop on Security and Privacy in Ad hoc and Sensor Networks"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/PERCOMW.2007.98"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TC.2008.148"},{"year":"1999","article-title":"Recommended Elliptic Curves for Federal Government Use","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","author":"mceliece","year":"1987","journal-title":"Finite Fields for Computer Scientists and Engineers"},{"year":"0","article-title":"The Case for Elliptic Curve Cryptography","key":"ref3"},{"year":"2003","author":"washington","journal-title":"Elliptic Curves Number Theory and Cryptography","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/0890-5401(88)90024-7"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"year":"2005","author":"avanzi","journal-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","key":"ref7"},{"year":"2005","author":"garfinkel","journal-title":"RFID Applications Security and Privacy","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","author":"finkenzeller","year":"2003","journal-title":"RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation","volume":"1717","author":"lopez","year":"1999","journal-title":"Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref20","article-title":"A Compact Finite Field Processor over GF(2m) for Elliptic Curve Cryptography","author":"kim","year":"2002","journal-title":"IEEE Int Symp on Circuits and Systems"},{"key":"ref21","article-title":"Scalable Elliptic Curve Encryption Processor for Portable Application","author":"huang","year":"2003","journal-title":"International Conference on ASIC"}],"event":{"name":"2009 IEEE International Conference on Computer Design (ICCD 2009)","start":{"date-parts":[[2009,10,4]]},"location":"Lake Tahoe, CA, USA","end":{"date-parts":[[2009,10,7]]}},"container-title":["2009 IEEE International Conference on Computer Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5406656\/5413104\/05413128.pdf?arnumber=5413128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,24]],"date-time":"2024-03-24T03:19:09Z","timestamp":1711250349000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5413128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iccd.2009.5413128","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}