{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:21:23Z","timestamp":1752985283933,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/reconfig.2016.7857163","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:20:29Z","timestamp":1487283629000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Design and implementation of a constant-time FPGA accelerator for fast elliptic curve cryptography"],"prefix":"10.1109","author":[{"given":"Atil U.","family":"Ay","sequence":"first","affiliation":[]},{"given":"Erdinc","family":"Ozturk","sequence":"additional","affiliation":[]},{"given":"Francisco Rodriguez","family":"Henriquez","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Savas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.61"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2010.08.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2008.08.002"},{"key":"ref13","first-page":"1","article-title":"High speed ECC implementation on FPGA over GF(2m)","author":"uddin","year":"2015","journal-title":"25th International Conference on Field Programmable Logic and Applications FPL 2015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26617-6_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00200-004-0161-9"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","article-title":"Fast multiplication on elliptic curves over GF(2m) without precomputation","volume":"1717","author":"l\u00f3pez","year":"0","journal-title":"CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_23"},{"key":"ref19","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume":"218","author":"miller","year":"1985","journal-title":"Advances in Cryptology-CRYPTO?98"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_17"},{"key":"ref3","first-page":"214","article-title":"Multiplication over Fpm on FPGA: A survey","volume":"4419","author":"beuchat","year":"2007","journal-title":"ARC 2007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-014-0085-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_10"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0146-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0011-x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2323062"},{"key":"ref20","first-page":"324","article-title":"Fast point multiplication algorithms for binary elliptic curves with and without precomputation","volume":"8781","author":"thomaz","year":"2014","journal-title":"SAC 2014"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_28"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0069-z"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_6"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1007\/978-3-642-33027-8_29","article-title":"Pushing the limits of high-speed GF(2m) elliptic curve scalar multiplication on FPGAs","volume":"7428","author":"rebeiro","year":"2012","journal-title":"Cryptographic Hardware and Embedded Systems - CHES 2012"},{"journal-title":"Igor Semaev New algorithm for the discrete logarithm problem on elliptic curves Cryptology ePrint Archive Report 2015\/310","year":"2015","key":"ref26"},{"key":"ref25","article-title":"Confirming Consensus on Removing RSA Key Transport from TLS 1.3","author":"salowey","year":"2014","journal-title":"Transport Layer Security Working Group IETF Mailing List"}],"event":{"name":"2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2016,11,30]]},"location":"Cancun, Mexico","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7838017\/7856931\/07857163.pdf?arnumber=7857163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:54:54Z","timestamp":1568836494000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7857163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2016.7857163","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}