{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:28:04Z","timestamp":1775312884811,"version":"3.50.1"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/tvlsi.2016.2557965","type":"journal-article","created":{"date-parts":[[2016,5,25]],"date-time":"2016-05-25T14:20:48Z","timestamp":1464186048000},"page":"3257-3267","source":"Crossref","is-referenced-by-count":32,"title":["Low-Latency ECDSA Signature Verification\u2014A Road Toward Safer Traffic"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8542-4966","authenticated-orcid":false,"given":"Miroslav","family":"Knezevic","sequence":"first","affiliation":[]},{"given":"Ventzislav","family":"Nikov","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Rombouts","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref11","year":"2016"},{"key":"ref12","first-page":"293","article-title":"Multiplication of many-digital numbers by automatic computers","volume":"145","author":"karatsuba","year":"1962","journal-title":"Doklady Akademii Nauk SSSR"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20040606"},{"key":"ref14","article-title":"Secure and efficient coprocessor design for cryptographic applications on FPGAs","author":"mentens","year":"2007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref16","year":"0","journal-title":"NanGate Inc The NanGate 45 nm Open Cell Library accessed on 2013"},{"key":"ref17","year":"2009","journal-title":"Fips 186-3 Digital Signature Standard"},{"key":"ref18","article-title":"Efficient elliptic curve processor architectures for field programmable logic","author":"orlando","year":"2002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660801"},{"key":"ref4","author":"bernstein","year":"2014","journal-title":"eBACS ECRYPT Benchmarking of Cryptographic Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICINIS.2009.20"},{"key":"ref6","year":"2011","journal-title":"Technical Specification Intelligent Transport Systems (ITS) Vehicular Communications Basic Set of Applications Part 2 Specification of Co-Operative Awareness Basic Service"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"196","author":"elgamal","year":"1986","journal-title":"Advances in Cryptology (Lecture Notes in Computer Science)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15031-9_4"},{"key":"ref7","year":"2013","journal-title":"Technical Specification Intelligent Transport Systems (ITS) Security Security Services and Architecture"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45353-9_19"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","article-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor","volume":"263","author":"barrett","year":"1987","journal-title":"Advances in Cryptology (Lecture Notes in Computer Science)"},{"key":"ref9","first-page":"62","article-title":"Ultra high performance ECC over NIST primes on commercial FPGAs","volume":"5154","author":"g\u00fcneysu","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.2008507"},{"key":"ref22","year":"0","journal-title":"Traffic Control Encyclopedia Britannica accessed on 2013"},{"key":"ref21","article-title":"Low-weight binary representations for pairs of integers","author":"solinas","year":"2001"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1049\/el:20020472","article-title":"fast gf(p) modular inversion algorithm suitable for vlsi implementation","volume":"38","author":"zhou","year":"2002","journal-title":"Electronics Letters"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/7605567\/07478674.pdf?arnumber=7478674","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:49Z","timestamp":1641987769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7478674\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":23,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2016.2557965","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11]]}}}