{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:42:51Z","timestamp":1729626171906,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/issoc.2010.5625557","type":"proceedings-article","created":{"date-parts":[[2010,11,17]],"date-time":"2010-11-17T16:53:28Z","timestamp":1290012808000},"page":"35-42","source":"Crossref","is-referenced-by-count":3,"title":["A flexible integrated cryptoprocessor for authentication protocols based on hyperelliptic curve cryptography"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Klimm","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Haas","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Sander","sequence":"additional","affiliation":[]},{"given":"Jurgen","family":"Becker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78153-0_15"},{"key":"17","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/978-3-642-02384-2_25","article-title":"Breaking keeloq in a flash: On extracting keys at lightning speed","volume":"5580","author":"kasper","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161204"},{"journal-title":"Microblaze(tm) hardware reference guide","year":"2002","key":"33"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/SASP.2009.5226328"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.011"},{"journal-title":"Xtensa A Configurable and Extensible Processor","year":"2001","author":"gonzalez","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","article-title":"Software implementation of elliptic curve cryptography over binary fields","volume":"1965","author":"hankerson","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00424714"},{"journal-title":"FIPS PUB 197 Advanced Encryption Standard (AES)","year":"2001","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_22"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252872"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"journal-title":"Handbook of Applied Cryptography","year":"2001","author":"menezes","key":"23"},{"journal-title":"Hyperelliptic Curve Cryptosystems Closing the Performance Gap to Elliptic Curves","year":"2003","author":"pelzl","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Applied Cryptography (2nd ed ) Protocols Algorithms and Source Code in C","year":"1995","author":"schneier","key":"26"},{"key":"27","first-page":"239","article-title":"Efficient identification and signatures for smart cards","author":"schnorr","year":"1989","journal-title":"Advances in Cryptology ? CRYPTO? 89 Proceedings"},{"key":"28","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","article-title":"An improved algorithm for arithmetic on a family of elliptic curves","author":"solinas","year":"1997","journal-title":"CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology"},{"key":"29","first-page":"270","article-title":"Instruction set extensions for efficient aes implementation on 32-bit processors","author":"tillich","year":"2006","journal-title":"CHES"},{"journal-title":"Ata5811\/5812 Uhf Ask\/fsk Transceiver","year":"2006","key":"3"},{"journal-title":"At94kal Series Fpslic Datasheet","year":"2005","key":"2"},{"journal-title":"AVR Studio 4","year":"2009","key":"10"},{"journal-title":"Nios II Custom Instruction User Guide","year":"2008","key":"1"},{"journal-title":"Triscend A7s Configurable System-on-chip Platform Product Description","year":"2002","key":"30"},{"key":"7","first-page":"400","article-title":"Genus two hyperelliptic curve coprocessor","author":"boston","year":"2003","journal-title":"CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"6","first-page":"1","article-title":"Security analysis of a cryptographically-enabled rfid device","author":"bono","year":"2005","journal-title":"SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium"},{"journal-title":"Computer Architectures for Cryptosystems Based on Hyperelliptic Curves","year":"2001","author":"wollinger","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_8"},{"journal-title":"Winavr Compiler Suite","year":"0","key":"31"},{"journal-title":"8-bit AVR Instruction Set","year":"2009","key":"4"},{"journal-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","year":"2006","author":"cohen","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253189"}],"event":{"name":"2010 International Symposium on System-on-Chip - SOC","start":{"date-parts":[[2010,9,29]]},"location":"Tampere, Finland","end":{"date-parts":[[2010,9,30]]}},"container-title":["2010 International Symposium on System on Chip"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5610911\/5625509\/05625557.pdf?arnumber=5625557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:16:14Z","timestamp":1497874574000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5625557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/issoc.2010.5625557","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}