{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:13:22Z","timestamp":1764936802608,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100004407","name":"Tsinghua National Laboratory for Information Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tvlsi.2015.2453360","type":"journal-article","created":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T14:52:25Z","timestamp":1439563945000},"page":"1223-1232","source":"Crossref","is-referenced-by-count":46,"title":["High-Performance Pipelined Architecture of Elliptic Curve Scalar Multiplication Over GF(2<sup>m<\/sup>)"],"prefix":"10.1109","volume":"24","author":[{"given":"Lijuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Shuguo","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2051343"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(88)90024-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2009.2020088"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_27"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000728"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2012.2234916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2010.08.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2323062"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2008.03.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2010.04.006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2012.2186104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.165"},{"key":"ref18","first-page":"309","article-title":"Low latency elliptic curve cryptography accelerators for NIST curves over binary fields","author":"shu","year":"2005","journal-title":"Proc IEEE Int Conf Field-Program Technol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.133"},{"journal-title":"Recommended Elliptic Curves for Federal Government Use","year":"1999","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.47"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2002.801608"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2005.857179"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190586"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2009.5410842"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_33"},{"key":"ref2","first-page":"256","article-title":"Exploring the design space of prime field vs. binary field ECC-hardware implementations","author":"wenger","year":"2011","journal-title":"Proc 16th Nord Conf Secure IT Syst Inf Security Technol Appl (NordSec)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912228"},{"journal-title":"Cryptographic Algorithms on Reconfigurable Hardware","year":"2006","author":"rodr\u00edguez-henr\u00edquez","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2230410"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2004.03.003"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.23"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2012.2198502"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1017695"},{"key":"ref25","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"karatsuba","year":"1963","journal-title":"Sov Phys Doklady"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/7436835\/7194842.pdf?arnumber=7194842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:44Z","timestamp":1633919684000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7194842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":33,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2015.2453360","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}