{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:14:57Z","timestamp":1725416097846},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/isicir.2014.7029534","type":"proceedings-article","created":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T09:52:27Z","timestamp":1423561947000},"page":"440-443","source":"Crossref","is-referenced-by-count":3,"title":["Baba&amp;#x00EF; round-off CVP method in RNS: Application to lattice based cryptographic protocols"],"prefix":"10.1109","author":[{"given":"Jean-Claude","family":"Bajard","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Julien","family":"Eynard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nabil","family":"Merkiche","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Plantard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/71.382314"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02165411"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44670-2_11","article-title":"Improving lattice-based cryptosystems using the Hermite normal form","author":"micciancio","year":"2001","journal-title":"Proc Cryptography and Lattices Conf Providence"},{"journal-title":"Residue Arithmetic and Its Applications to Compututer Technology","year":"1967","author":"szabo","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"24","first-page":"247","author":"svoboda","year":"1955","journal-title":"Operational Circuits Stroje Na Zpracovani Informaci"},{"key":"15","article-title":"Cox-Rower Architecture for Fast Parallel Montgomery Multiplication","author":"kawamura","year":"2000","journal-title":"Proc EUROCRYPT Bruges Belgium"},{"key":"16","article-title":"Finding the closest lattice vector when it's unusually close","author":"klein","year":"2000","journal-title":"Symp on Discrete Algorithms SODA San Francisco"},{"key":"13","article-title":"A high speed coprocessor for elliptic curve scalar multiplications over Fp","author":"guillermin","year":"2010","journal-title":"Proc CHES Santa Barbara"},{"key":"14","first-page":"122","article-title":"NTRUSIGN: Digital signatures using the NTRU lattice","author":"hoffstein","year":"2003","journal-title":"Proc RSA Conf on the Cryptographers' Track"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"12","first-page":"112","article-title":"Public-key cryptosystems from lattice reduction problems","author":"goldreich","year":"1997","journal-title":"Proc Crypto"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/12.16508"},{"key":"3","article-title":"Residue systems efficiency for modular products summation: Application to elliptic curves cryptography","author":"bajard","year":"2006","journal-title":"Proc Adv Signal Process Algo Architectures and Implementations SPIE 16 San Diego"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2001.930104"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579403"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"7","first-page":"421","article-title":"FPGA implementation of pairings using residue number system and lazy reduction","author":"cheung","year":"2011","journal-title":"Proc Cryptographic Hardware and Embedded Syst CHES Nara Japan"},{"key":"6","article-title":"Efficient RNS bases for Cryptography","author":"bajard","year":"2005","journal-title":"Proc of Applied Mathematics and Simulation IMACS05 Paris"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2009.20"},{"key":"4","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1117\/12.557891","article-title":"RNS bases and conversions","author":"bajard","year":"2004","journal-title":"Proc SPIE 14 Denver"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2011.35"},{"key":"8","first-page":"433","article-title":"Learning a zonotope and more: Cryptanalysis of NTRU sign countermeasures","author":"ducas","year":"2012","journal-title":"Proc ASIACRYPT"}],"event":{"name":"2014 International Symposium on Integrated Circuits (ISIC)","start":{"date-parts":[[2014,12,10]]},"location":"Singapore","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Symposium on Integrated Circuits (ISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7005969\/7029433\/07029534.pdf?arnumber=7029534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:16:39Z","timestamp":1498180599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isicir.2014.7029534","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}