{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:49:26Z","timestamp":1729669766634,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscas.2003.1206213","type":"proceedings-article","created":{"date-parts":[[2003,11,21]],"date-time":"2003-11-21T01:19:26Z","timestamp":1069377566000},"page":"V-149-V-152","source":"Crossref","is-referenced-by-count":0,"title":["An efficient inverse multiplier\/divider architecture for cryptography systems"],"prefix":"10.1109","volume":"5","author":[{"family":"Junhyung Um","sequence":"first","affiliation":[]},{"family":"Sangwoo Lee","sequence":"additional","affiliation":[]},{"family":"Youngsoo Park","sequence":"additional","affiliation":[]},{"family":"Sungik Jun","sequence":"additional","affiliation":[]},{"family":"Thewhan KimU","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","article-title":"Finite Fields for Computer Scientists and Engineers","author":"mcelice","year":"1987"},{"year":"2000","key":"ref12","article-title":"Design Compiler User Guider"},{"journal-title":"0 25-Micron 2 5V Standard Cell Databook","year":"2001","key":"ref13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676616"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/12.238496"},{"key":"ref6","first-page":"66","article-title":"&#x00EE;Ef&#x00DD;cient Computation of Multiplicative Inverses for Cryptographic Applicationsi","author":"hasan","year":"2001","journal-title":"15th IEEE Symposium on Computer Arithmetic"},{"key":"ref5","first-page":"37","article-title":"&#x00EE;Ef&#x00DD;cient Construction of Gate Circuit for Computing Multiplicative Inverses over GF(2nd)i","volume":"e72","author":"morii","year":"1989","journal-title":"Trans IEICE"},{"key":"ref8","article-title":"iFrom Euclidis GCD to Montgomery Multiplication to the Great Divider, Sun Microsystems","author":"shantz","year":"2001","journal-title":"TR-2001-95"},{"key":"ref7","first-page":"1","article-title":"iSoftware Implementation of Elliptic Curve Cryptography over Binary Fieldsi","author":"hankerson","year":"2000","journal-title":"Proc Of Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/12.156540"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(88)90024-7"},{"key":"ref9","first-page":"11","article-title":"iElliptic Curve Cryptography on a Palm OS Devicei","author":"weimerskirch","year":"2001","journal-title":"The 6th Austaliasian Conference on Information Security and Privacy (ACISP 2001)"}],"event":{"name":"ISCAS 2003. International Symposium on Circuits and Systems","acronym":"ISCAS-03","location":"Bangkok, Thailand"},"container-title":["Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8570\/27139\/01206213.pdf?arnumber=1206213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T02:26:58Z","timestamp":1497580018000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscas.2003.1206213","relation":{},"subject":[]}}