{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:08:24Z","timestamp":1742638104203,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/pacrim.2015.7334833","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T16:52:19Z","timestamp":1448902339000},"page":"192-200","source":"Crossref","is-referenced-by-count":4,"title":["Review of Elliptic Curve Processor architectures"],"prefix":"10.1109","author":[{"given":"Ibrahim H.","family":"Hazmi","sequence":"first","affiliation":[]},{"given":"Fan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Fayez","family":"Gebali","sequence":"additional","affiliation":[]},{"given":"Turki F.","family":"Al-Somani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ECS.2014.6892615"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1109\/TCSI.2013.2283691","article-title":"Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications","volume":"61","author":"jarvinen","year":"2014","journal-title":"Circuits and Systems I Regular Papers IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TVLSI.2009.2019415"},{"year":"0","author":"sandeep","article-title":"Design of hardware implementation of elliptic curve cryptography over binary field","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TC.2007.1071"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.4218\/etrij.08.0107.0022"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/ReConFig.2011.61"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.3390\/s141017883"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/ASAP.2010.5540977"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.15446\/ing.investig.v34n2.40542"},{"year":"2007","author":"huang","article-title":"Fpga implementations of elliptic curve cryptography and tate pairing over binary field","key":"ref28"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s11704-013-2187-2","article-title":"Fpga based unified architecture for public key and private key cryptosystems","volume":"7","author":"li","year":"2013","journal-title":"Frontiers of Computer Science"},{"year":"2009","author":"gwalani","article-title":"Design and evaluation of an&#x201D; fpga based&#x201D; hardware accelerator for elliptic curve cryptography point multiplication: A thesis presented to the faculty of the graduate school, tennessee technological university","key":"ref29"},{"year":"2010","author":"shah","article-title":"An enhancement of elliptical curve cryptography for the resource constrained wireless sensor network","key":"ref2"},{"year":"2009","author":"paar","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1155\/2013\/675161"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1631\/jzus.A0820024"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.micpro.2010.04.006"},{"key":"ref24","first-page":"353","article-title":"Design and evaluation of parallel, scalable, curve based processor over binary field","volume":"10","author":"bilal","year":"2011","journal-title":"WSEAS Transactions on Computers"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.sysarc.2008.03.005"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/AICCSA.2014.7073281"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.5194\/ars-6-259-2008"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1007\/978-3-642-33027-8_32"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/ICCCAS.2006.285243"},{"key":"ref52","article-title":"Hardware implementation of elliptic curve point multiplication over gf(2m) for ecc protocols","volume":"1","author":"amara","year":"2011","journal-title":"International Journal for Information Security Research (IJISR)"},{"year":"2014","journal-title":"Cryptographic hardware accelerators","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1007\/11894063_34","article-title":"Hardware\/software co-design of elliptic curve cryptography on an 8051 microcontroller","author":"koschuch","year":"2006","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2006"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ICECS.2013.6815478"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-642-29615-4_18"},{"year":"2007","author":"fayed","journal-title":"A Security Coprocessor for next Generation IP Telephony Architecture Abstraction and Strategies","key":"ref13"},{"year":"2008","author":"morales-sandoval","article-title":"A reconfigurable and interoperable hardware architecture for elliptic curve cryptography","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/4.962304"},{"key":"ref16","first-page":"60","article-title":"A vlsi architecture evaluation system","author":"ryuichi","year":"1986","journal-title":"International Conference on Computer Design IEEE ACM Proc ICCD"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TVLSI.2013.2294649"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.4218\/etrij.15.0114.0418"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.vlsi.2011.04.001"},{"year":"2006","author":"rodnguez-hennquez","article-title":"Cryptographic algorithms on reconfigurable hardware","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.5121\/ijcsit.2011.3307"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ISVLSI.2011.39"},{"year":"2004","author":"hankerson","article-title":"Guide to elliptic curve cryptography","key":"ref5"},{"year":"2004","author":"pontow","article-title":"Elliptic curve cryptography as a case study for hardware\/software codesign","key":"ref8"},{"key":"ref7","first-page":"29","article-title":"Issues in elliptic curve cryptography implementation","volume":"1","author":"paryasto","year":"2009","journal-title":"Internetworking Indonesia Journal"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/3-540-44709-1_29","article-title":"A scalable gf (p) elliptic curve processor architecture for programmable hardware","author":"orlando","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2001"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-0-387-71817-0_8"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/SPL.2011.5782650"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/WiCOM.2012.6478726"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/978-3-642-33027-8_29","article-title":"Pushing the limits of high-speed gf(2m) elliptic curve scalar multiplication on fpgas","author":"rebeiro","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2012"},{"year":"0","author":"guitouni","article-title":"High performances asic based elliptic curve cryptographic processor over gf(2m)","key":"ref47"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.5121\/ijnsa.2010.2208"},{"key":"ref41","first-page":"135","article-title":"Elliptic curve crypto-processor with hierarchical security","volume":"13","author":"alaaeldin","year":"2014","journal-title":"WSEAS TRANS-ACTIONS on CIRCUITS and SYSTEMS"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.vlsi.2010.08.001"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/LASCAS.2013.6519014"}],"event":{"name":"2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","start":{"date-parts":[[2015,8,24]]},"location":"Victoria, BC, Canada","end":{"date-parts":[[2015,8,26]]}},"container-title":["2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7322958\/7334793\/07334833.pdf?arnumber=7334833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:43:35Z","timestamp":1498250615000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7334833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/pacrim.2015.7334833","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}