{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:12:33Z","timestamp":1758892353254},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T00:00:00Z","timestamp":1396310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/tcsi.2013.2283674","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:41:04Z","timestamp":1391190064000},"page":"1156-1169","source":"Crossref","is-referenced-by-count":35,"title":["Multifunction Residue Architectures for Cryptography"],"prefix":"10.1109","volume":"61","author":[{"given":"Dimitrios","family":"Schinianakis","sequence":"first","affiliation":[]},{"given":"Thanos","family":"Stouraitis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/12.709376"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/71.382314"},{"key":"ref33","first-page":"277","article-title":"A scalable and unified multiplier architecture for finite fields <ref_formula><tex Notation=\"TeX\">$GF(p)$<\/tex><\/ref_formula> and <ref_formula> <tex Notation=\"TeX\">$GF(2^{m})$<\/tex><\/ref_formula>","author":"sava?","year":"2000","journal-title":"Cryptographic Hardware and Embedded Systems ? CHES 2000"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190586"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2005.9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1228516"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2001239"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/368434.368726"},{"key":"ref35","article-title":"A fast kernel for unifying <ref_formula> <tex Notation=\"TeX\">$GF(p)$<\/tex><\/ref_formula> and <ref_formula><tex Notation=\"TeX\">$GF(2^{m})$<\/tex> <\/ref_formula> Montgomery multiplications in a scalable pipelined architecture","author":"satzoda","year":"2006","journal-title":"Proc IEEE Int Symp Circuits and Systems"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1049\/ip-cdt:20040047","article-title":"Multiplier architectures for <ref_formula> <tex Notation=\"TeX\">$GF(p)$<\/tex><\/ref_formula> and <ref_formula><tex Notation=\"TeX\">$GF(2^{n})$<\/tex> <\/ref_formula>","volume":"151","author":"sava?","year":"2004","journal-title":"IEE Proc ?Computers and Digital Techniques"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"39","DOI":"10.29292\/jics.v3i1.280","article-title":"Parallelized radix-4 scalable Montgomery multipliers","volume":"3","author":"pinckney","year":"2008","journal-title":"Proc Integr Circuits Syst Des"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074513"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.72"},{"key":"ref2","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curves Cryptography"},{"key":"ref1","author":"blake","year":"2002","journal-title":"Elliptic Curves in Cryptography"},{"key":"ref20","first-page":"980","article-title":"Elliptic curve point multiplication in <ref_formula><tex Notation=\"TeX\">$GF(2^{n})$<\/tex><\/ref_formula> using Polynomial Residue Arithmetic","author":"schinianakis","year":"2009","journal-title":"Proc IEEE Int Conf Electronics Circuits and Systems (ICECS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20040791"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/78.80821"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000524"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/VLSISOC.2007.4402507"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2000.862386"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_13"},{"key":"ref50","year":"2012","journal-title":"Xilinx Downloads"},{"key":"ref51","first-page":"202","article-title":"A bit-serial unified multiplier architecture for finite fields <ref_formula><tex Notation=\"TeX\">$GF(p)$<\/tex> <\/ref_formula> and <ref_formula><tex Notation=\"TeX\">$GF(2^{m})$<\/tex><\/ref_formula>","author":"gro\ufffdsch\ufffddl","year":"2001","journal-title":"CHES'01 Proc 3rd Int Workshop on Cryptographic Hardware and Embedded Systems"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572280"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/82.475249"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44709-1_30","article-title":"Implementation of RSA algorithm based on RNS Montgomery multiplication","author":"nozaki","year":"2001","journal-title":"Proc 2nd Workshop on Cryptographic Hardware and Embedded Systems (CHES 00)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASM.2010.5622857"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2005.34"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-15031-9_4","article-title":"A high speed coprocessor for elliptic curve scalar multiplications over <ref_formula><tex Notation=\"TeX\">$F_{p}$<\/tex> <\/ref_formula>","author":"guillermin","year":"2010","journal-title":"Cryptographic Hardware and Embedded Systems, CHES 2010"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659138"},{"key":"ref15","year":"1986","journal-title":"Computational method and apparatus for finite field arithmetic"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(88)90090-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/49.223883"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/3-540-44750-4_4","article-title":"Fast key exchange with elliptic curve systems","author":"schroeppel","year":"1995","journal-title":"CRYPTO '95 Proc 15th Annu Int Cryptology Conf Advances in Cryptology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008208521515"},{"key":"ref4","author":"lidl","year":"1986","journal-title":"Introduction to Finite Fields and Their Applications"},{"key":"ref3","author":"deschamps","year":"2009","journal-title":"Hardware Implementation of Finite-Field Arithmetic"},{"key":"ref6","first-page":"523","article-title":"Cox-Rower architecture for fast parallel Montgomery multiplication","author":"kawamura","year":"2000","journal-title":"EUROCRYPT'00 Proc 19th Int Conf Theory and Application of Cryptographic Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.2008507"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.2"},{"key":"ref49","year":"2012","journal-title":"Xilinx Data Sheet"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008389508626"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-1983-2","author":"mceliece","year":"1987","journal-title":"Finite field for scientists and engineers"},{"key":"ref45","first-page":"3033","article-title":"<ref_formula><tex Notation=\"TeX\">$GF(2^{n})$<\/tex> <\/ref_formula> Montgomery multiplication using polynomial residue arithmetic","author":"schinianakis","year":"2012","journal-title":"Proc IEEE Int Symp Circuits and Systems"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.247"},{"key":"ref47","author":"ercegovac","year":"2004","journal-title":"Digital Arithmetic"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1049\/ip-g-2.1991.0022","article-title":"improved mixed-radix conversion for residue number system architectures","volume":"138","author":"yassine","year":"1991","journal-title":"Circuits Devices and Systems IEE Proceedings G"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.84"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5937776"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/6777988\/06693749.pdf?arnumber=6693749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T20:04:41Z","timestamp":1648152281000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":52,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2013.2283674","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4]]}}}