{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:01:58Z","timestamp":1730239318964,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/iceac.2012.6471015","type":"proceedings-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T16:49:04Z","timestamp":1363798144000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Comparing performance metrics of a parallel ECC architecture vs. input data patterns and granularity"],"prefix":"10.1109","author":[{"given":"Esmaeil","family":"Amini","sequence":"first","affiliation":[]},{"given":"Zahra","family":"Jeddi","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Farah","sequence":"additional","affiliation":[]},{"given":"Magdy","family":"Bayoumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.5120\/239-393"},{"key":"13","article-title":"A dual-field elliptic curve cryptographic processor based on a systolic arithmetic unit","author":"chen","year":"0","journal-title":"IEEE International Symposium on Circuits and Systems 2008 ISCAS 2008"},{"key":"14","article-title":"A Power-Aware Selectable Operand-Size Modular Multiplication Architecture for GF(2m)","volume":"7","author":"faisal","year":"2011","journal-title":"Journal of Low Power Electronics"},{"key":"11","first-page":"349","article-title":"An end-to-end systems approach to elliptic curve cryptography","author":"gura","year":"2002","journal-title":"Cryptographic Hardware and Embedded Systems"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.115"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/81.735445"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2005288"},{"key":"6","first-page":"259","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curve Cryptography"},{"journal-title":"Integrating Elliptic Curve Cryptography (ECC) into the Web's Security Infrastructure","year":"0","author":"gupta","key":"5"},{"journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard","year":"2002","author":"daemen","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/12.238496"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1986.1146305"}],"event":{"name":"2012 International Conference on Energy Aware Computing (ICEAC)","start":{"date-parts":[[2012,12,3]]},"location":"Guzelyurt, Cyprus","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 International Conference on Energy Aware Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6464905\/6470998\/06471015.pdf?arnumber=6471015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:26:35Z","timestamp":1490210795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6471015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iceac.2012.6471015","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}