{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:35:16Z","timestamp":1729618516477,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/iscas.2012.6272196","type":"proceedings-article","created":{"date-parts":[[2012,8,22]],"date-time":"2012-08-22T12:02:44Z","timestamp":1345636964000},"page":"93-96","source":"Crossref","is-referenced-by-count":2,"title":["High performance prime field multiplication for GPU"],"prefix":"10.1109","author":[{"given":"Karl","family":"Leboeuf","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Muscedere","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Ahmadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172769"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"2"},{"journal-title":"Gnu Multiple Precision Arithmetic Library","year":"2011","key":"10"},{"journal-title":"AMD AMD Fusion Family of APUs Enabling A Superior","year":"2010","key":"1"},{"key":"7","first-page":"315","article-title":"Comparison of modular arithmetic algorithms on GPUs","volume":"19","author":"giorgi","year":"2009","journal-title":"Proc International Conference on Parallel Computing ParCo Ser Advances in Parallel Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2010.5548560"},{"key":"5","article-title":"Programming massively parallel processors: A hands-on approach","volume":"5","author":"kirk","year":"2010","journal-title":"Published February"},{"journal-title":"186-3 Digital Signature Standard (DSS]","year":"2009","author":"fips","key":"4"},{"key":"9","first-page":"131","article-title":"The billion-mulmod-per-second pc","author":"bernstein","year":"2009","journal-title":"SHARCS'09Specialpurpose Hardware for Attacking Cryptographic Systems"},{"key":"8","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/978-3-642-01001-9_28","article-title":"ECM on graphics cards","author":"bernstein","year":"2009","journal-title":"Advances in Cryptology-EUROCRYPT 2009"}],"event":{"name":"2012 IEEE International Symposium on Circuits and Systems - ISCAS 2012","start":{"date-parts":[[2012,5,20]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2012,5,23]]}},"container-title":["2012 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6257548\/6270389\/06272196.pdf?arnumber=6272196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:10:05Z","timestamp":1497985805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6272196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iscas.2012.6272196","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}