{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T14:56:32Z","timestamp":1729608992113,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/recosoc.2013.6581530","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:13:41Z","timestamp":1377710021000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["On a FPGA-based method for authentication using Edwards curves"],"prefix":"10.1109","author":[{"given":"Andre","family":"Himmighofen","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Jungk","sequence":"additional","affiliation":[]},{"given":"Steffen","family":"Reith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","article-title":"DiS","author":"kocher","year":"1999","journal-title":"Advances Cryptology CRYPTO'99"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"journal-title":"Mutating Runtime Architectures As A Countermeasure Against Power Analysis Attacks","year":"2013","author":"sto?ttinger","key":"18"},{"journal-title":"Number Theory and Cryptography","year":"2008","key":"15"},{"key":"16","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","article-title":"Twisted edwards curves revisited","volume":"5350","author":"hisil","year":"2008","journal-title":"Advances in Cryptology-ASIACRYPT 2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0039-x"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_3"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2011.61"},{"key":"12","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-85053-3_5","article-title":"Ultra high performance ecc over nist primes on commercial fpgas","volume":"5154","author":"gneysu","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2010.5513110"},{"key":"20","first-page":"144","article-title":"Power analysis attacks of modular exponentiation in smartcards","author":"messerges","year":"1999","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 1999"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_40"},{"key":"23","article-title":"Generalized mersenne numbers","author":"solinas","year":"1999","journal-title":"Tech Rep"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"24"},{"journal-title":"January 2000 U S Department of Commerce\/National Institute of Standards and Technology","year":"0","key":"25"},{"key":"26","first-page":"368","article-title":"Comprehensive evaluation of high-speed and medium-speed implementations of five sha-3 finalists using xilinx and altera fpgas","author":"gaj","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"27","article-title":"The arithmetic of elliptic curves","author":"silverman","year":"1986","journal-title":"Ser Graduate Texts in Mathematics Series"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56445-1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.77"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_22"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_11"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00641-8_41"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2010.06.015"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-07-01153-6"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28419"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"}],"event":{"name":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","start":{"date-parts":[[2013,7,10]]},"location":"Darmstadt, Germany","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6575424\/6581516\/06581530.pdf?arnumber=6581530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:33Z","timestamp":1498064013000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6581530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/recosoc.2013.6581530","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}