{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T13:56:12Z","timestamp":1764078972252},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/iscas.2013.6572409","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T11:40:23Z","timestamp":1376480423000},"page":"2593-2596","source":"Crossref","is-referenced-by-count":13,"title":["A GPU implementation of the Montgomery multiplication algorithm for elliptic curve cryptography"],"prefix":"10.1109","author":[{"given":"Karl","family":"Leboeuf","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Muscedere","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Ahmadi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Solving Discrete Logarithms in Smoothorder Groups with CUDA","year":"2012","author":"henry","key":"13"},{"key":"11","article-title":"Comparison of modular arithmetic algorithms on gpus","author":"giorgi","year":"2009","journal-title":"ParCo'09 International Conference on Parallel Computing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.89"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"journal-title":"Digital Signature Standards 186-3","year":"2009","key":"2"},{"journal-title":"NSA \"fact Sheet Suite B Cryptography\"","year":"2011","key":"1"},{"journal-title":"Gnu Multiple Precision Arithmetic Library","year":"0","author":"et ai","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr119"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2010.5548560"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6272196"},{"journal-title":"NVIDIA CUDA C Programming Guide","year":"2012","key":"4"},{"key":"9","first-page":"49","article-title":"The mpfq library and implementing curvebased key exchanges","author":"gaudry","year":"2007","journal-title":"Software Performance Enhancement for Encryption and Decryption"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"}],"event":{"name":"2013 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2013,5,19]]},"location":"Beijing","end":{"date-parts":[[2013,5,23]]}},"container-title":["2013 IEEE International Symposium on Circuits and Systems (ISCAS2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6560459\/6571764\/06572409.pdf?arnumber=6572409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T17:33:51Z","timestamp":1490204031000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6572409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscas.2013.6572409","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}