{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:53:55Z","timestamp":1729666435641,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icecs.2013.6815481","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T23:05:07Z","timestamp":1400281507000},"page":"581-584","source":"Crossref","is-referenced-by-count":10,"title":["Low area ECC implementation on FPGA"],"prefix":"10.1109","author":[{"given":"Zia Uddin Ahamed","family":"Khan","sequence":"first","affiliation":[]},{"given":"M.","family":"Benaissa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2006.352569"},{"key":"17","first-page":"349","article-title":"An end-to-end systems approach to elliptic curve cryptography","author":"gura","year":"2003","journal-title":"CHES '02"},{"key":"18","first-page":"309","article-title":"Low latency elliptic curve cryptography accelerators for NIST curves over binary fields","author":"shu","year":"2005","journal-title":"Proc IEEE Intl Conf on Field-Programmable Technology"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660801"},{"key":"16","first-page":"486","article-title":"Efficient fpga elliptic curve cryptographic processor over gf(2m)","volume":"2","author":"antao","year":"2008","journal-title":"Proc IEEE Int Conf on ICECE Technology FPT 2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DELTA.2008.118"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912228"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.18"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCS.2008.4746947"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2010.04.006"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.133"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2186104"},{"key":"23","first-page":"415","article-title":"Superscalar coprocessor for high-speed curve-based cryptography","volume":"4249","author":"sakiyama","year":"2006","journal-title":"CHES Ser LNCS"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286701"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13797-6_18"},{"key":"26","first-page":"73","article-title":"Hardware implementation of arithmetic for elliptic curve cryptosystems over GF(2m)","author":"amara","year":"2011","journal-title":"Proc 2011 IEEE Conf on Worldcis"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(88)90024-7"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2013.03.003"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517885"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2010.5540977"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"30","first-page":"115","author":"tuyls","year":"2006","journal-title":"RFID-tags for Anti-Counterfeiting"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1693714"},{"key":"6","article-title":"Are standards compliant elliptic curve cryptosystems feasible on rfid","author":"kumar","year":"2006","journal-title":"Printed handout of Workshop on RFID Security (RFIDSec 06)"},{"key":"5","first-page":"25","article-title":"Elliptic-urve point-multiplication over gf(2163)","author":"deschamps","year":"2008","journal-title":"Proc IEEE Conf on PL"},{"key":"4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","article-title":"An improved algorithm for arithmetic on a family of elliptic curves","author":"solinas","year":"1997","journal-title":"Advances in Cryptology-CRYPTO'97"},{"key":"9","first-page":"209","article-title":"A reconfigurable gf(2m) elliptic curve cryptographic coprocessor","author":"morales-sandoval","year":"2011","journal-title":"Proc IEEE 2011 VII Southern Conf on SPL Cordoba"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2004.1393285"}],"event":{"name":"2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)","start":{"date-parts":[[2013,12,8]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2013,12,11]]}},"container-title":["2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6810206\/6815321\/06815481.pdf?arnumber=6815481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T13:22:12Z","timestamp":1498137732000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6815481\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icecs.2013.6815481","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}