{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T10:34:09Z","timestamp":1720089249152},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Texas Instruments Faculty Award granted to R. Azarderakhsh and M. Mozaffari-Kermani"},{"name":"Department of Information and Computer Science, Aalto University"},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"crossref","award":["138358"],"award-info":[{"award-number":["138358"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tcad.2014.2387866","type":"journal-article","created":{"date-parts":[[2015,1,6]],"date-time":"2015-01-06T19:50:53Z","timestamp":1420573853000},"page":"332-340","source":"Crossref","is-referenced-by-count":4,"title":["Secure and Efficient Architectures for Single Exponentiations in Finite Fields Suitable for High-Performance Cryptographic Applications"],"prefix":"10.1109","volume":"34","author":[{"given":"Reza","family":"Azarderakhsh","sequence":"first","affiliation":[]},{"given":"Mehran","family":"Mozaffari-Kermani","sequence":"additional","affiliation":[]},{"given":"Kimmo","family":"Ja\u0308rvinen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2014.2365099"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2014.2382715"},{"key":"ref33","year":"2013"},{"key":"ref32","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Proc 9th Annu Int Cryptol Conf (CRYPTO)"},{"key":"ref31","first-page":"318","article-title":"Efficient subgroup exponentiation in quadratic and sixth degree extensions","author":"stam","year":"2002","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/12.45211"},{"key":"ref37","first-page":"256","article-title":"Exploring the design space of prime field vs. binary field ECC-hardware implementations","author":"wenger","year":"2011","journal-title":"Proc 16th Nord Conf Secure IT Syst Inf Security Technol Appl (NordSec)"},{"key":"ref36","year":"2015","journal-title":"Synopsys"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2196010"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","article-title":"Resistance against differential power analysis for elliptic curve cryptosystems","author":"coron","year":"1999","journal-title":"Cryptographic Hardware and Embedded SystemsCHES '07"},{"key":"ref10","first-page":"243","article-title":"Efficient arithmetic on Hessian curves","author":"farashahi","year":"2010","journal-title":"Proc 13th Int Conf Pract Theory Public Key Cryptography (PKC)"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1109\/TCAD.2014.2307002","article-title":"Efficient and concurrent reliable realization of the secure cryptographic SHA-3 algorithm","volume":"33","author":"bayat-sarmadi","year":"2014","journal-title":"IEEE Trans Comput -Aided Design Integr Circuits Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.70"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2006.887835"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.138"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.87"},{"key":"ref15","first-page":"335","article-title":"Extended double-base number system with applications to elliptic curve cryptography","author":"doche","year":"2006","journal-title":"Proc Int Conf Cryptol India (INDOCRYPT)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.96"},{"key":"ref17","first-page":"384","article-title":"Improved three-way split formulas for binary polynomial multiplication","author":"cenk","year":"2011","journal-title":"Proc Conf Sel Areas Cryptography"},{"key":"ref18","first-page":"389","article-title":"Efficient exponentiation using procomputation and vector addition chains","volume":"950","author":"de rooij","year":"1995","journal-title":"Proc Int Conf EUROCRYPT"},{"key":"ref19","first-page":"243","article-title":"High-performance computing VLSI system for bit-parallel exponentiation in ${GF}(2^{m})$","volume":"19","author":"han","year":"2013","journal-title":"Int J Electron"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10440-006-9071-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.843826"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2010.499799"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2013.158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166783"},{"key":"ref29","author":"massey","year":"1986","journal-title":"Computational method and apparatus for finite field arithmetic"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218252"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.64"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2059831"},{"key":"ref2","first-page":"203","article-title":"Emerging frontiers in embedded security","author":"mozaffari-kermani","year":"2013","journal-title":"Proc IEEE Int Conf Embedded Syst VLSI Design"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.1076"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.22"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ENC.2003.1232886"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.906082"},{"key":"ref21","first-page":"747","article-title":"On the optimal computaion of finite field exponentiation","author":"cort\u00e9s","year":"2004","journal-title":"Proc Ibero-Amer Conf Adv Artif Intell (IBERAMIA)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.176"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2260570"},{"key":"ref23","first-page":"200","article-title":"Fast exponentiation with precomputation (extended abstract)","volume":"658","author":"brickell","year":"1993","journal-title":"Proc Int Conf EUROCRYPT"},{"key":"ref26","author":"menezes","year":"1993","journal-title":"Applications of Finite Fields"},{"key":"ref43","first-page":"572","article-title":"Parity-based fault detection architecture of S-box for advanced encryption standard","author":"mozaffari-kermani","year":"2006","journal-title":"Proc IEEE Int Symp Defect Fault Tolerance VLSI Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866113-7"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/7042867\/07001750.pdf?arnumber=7001750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:00:04Z","timestamp":1642003204000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7001750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2014.2387866","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"value":"0278-0070","type":"print"},{"value":"1937-4151","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}