{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:17:27Z","timestamp":1729617447476,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029487","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"596-599","source":"Crossref","is-referenced-by-count":1,"title":["A modular design of elliptic-curve point multiplication for resource constrained devices"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wei","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chip-Hong","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2005.009953"},{"journal-title":"Hardware Implementation of Finite-Field Arithmetic","year":"2009","author":"deschamps","key":"11"},{"key":"12","first-page":"157","article-title":"Reconfigurable implementation of elliptic curve crypto algorithms","author":"bednara","year":"2002","journal-title":"Proc 9-th Reconfigurable Architecture Workshop Forida USA"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2004.03.003"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2186104"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2004.1342462"},{"key":"10","doi-asserted-by":"crossref","first-page":"1596","DOI":"10.3844\/ajassp.2009.1596.1603","article-title":"Reconfigurable elliptic curve crypto-hardware over the Galois field GF(2163)","volume":"6","author":"bencherif","year":"2009","journal-title":"American J of Applied Sciences"},{"journal-title":"FIPS PUB 186-2 Digital Signature Standard (DSS)","year":"2009","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/49.223883"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2010.04.006"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912228"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.sysarc.2006.09.002","article-title":"High-speed hardware implementations of elliptic curve cryptography: A survey","volume":"53","author":"de dormale","year":"2007","journal-title":"J of Syst Architecture"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029487.pdf?arnumber=7029487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:16:39Z","timestamp":1498180599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029487","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}