{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:45:57Z","timestamp":1729633557471,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/isads.2009.5207355","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T15:09:10Z","timestamp":1251126550000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device"],"prefix":"10.1109","author":[{"given":"Panagiotis","family":"Papaioannou","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Nastou","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Stamatiou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Zaroliagis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2001","author":"turan","journal-title":"ECDSA Optimizations on ARM Processor for A NIST Curve over GF(2 m)","key":"15"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","author":"silverman","year":"1986","journal-title":"The Arithmetic of Elliptic Curves"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/s001459900052"},{"key":"11","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","article-title":"an improved algorithm for computing logarithms over gf(p)","volume":"24","author":"pohlig","year":"1978","journal-title":"IEEE Transactions on Information Theory"},{"key":"12","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1090\/S0025-5718-98-00887-4","article-title":"evaluation of discrete logarithms on some elliptic curves","volume":"67","author":"semaev","year":"1998","journal-title":"Mathematics of Computation"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1090\/S0025-5718-1993-1199989-X"},{"year":"0","journal-title":"1X-2001 Port-Based Network Access Control","article-title":"ieee std 802","key":"2"},{"key":"1","article-title":"ieee medium access control (mac)","author":"enhancements","year":"0","journal-title":"IEEE Task Group i P802 11i"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/18.259647"},{"year":"2005","author":"konstantinou","journal-title":"Theory and Applications of EC Based Public-Key Cryptosystems","key":"7"},{"key":"6","first-page":"33","article-title":"su di un metodo per la rizoluzione in numeri interi dell' equazione hn=0chxn-hy h = p","volume":"46","author":"cornacchia","year":"1908","journal-title":"Giornale di Matemai Battaglini"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1017\/CBO9781107360211"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1049\/ip-com:20010511"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/3-540-36400-5_25"},{"key":"8","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/3-540-45749-6_55","article-title":"a software library for elliptic curve cryptography in algorithms","volume":"2461","author":"konstantinou","year":"2002","journal-title":"Proc European Symposium on Algorithms - ESA 2002"}],"event":{"name":"2009 International Symposium on Autonomous Decentralized Systems (ISADS)","start":{"date-parts":[[2009,3,23]]},"location":"Athens, Greece","end":{"date-parts":[[2009,3,25]]}},"container-title":["2009 International Symposium on Autonomous Decentralized Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5185482\/5207317\/05207355.pdf?arnumber=5207355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T23:05:14Z","timestamp":1497827114000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5207355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isads.2009.5207355","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}