{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T12:37:53Z","timestamp":1769258273208,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100019355","name":"KIOXIA Holdings Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019355","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1109\/tvlsi.2025.3632677","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:45:14Z","timestamp":1763664314000},"page":"579-592","source":"Crossref","is-referenced-by-count":0,"title":["Design Space Exploration of a Unified FPGA Accelerator for Elliptic-Curve-Based Functions in Attribute-Based Encryption"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0547-4020","authenticated-orcid":false,"given":"Anawin","family":"Opasatian","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Systems, Graduate School of Engineering, The University of Tokyo, Tokyo, Japan"}]},{"given":"Momoko","family":"Fukuda","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Systems, Graduate School of Engineering, The University of Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6644-4224","authenticated-orcid":false,"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Systems, Graduate School of Engineering, The University of Tokyo, Tokyo, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3154039"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2523941"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54669-8_10"},{"issue":"4","key":"ref9","doi-asserted-by":"crossref","first-page":"154","DOI":"10.46586\/tches.v2019.i4.154-179","article-title":"Fast and simple constant-time hashing to the BLS12-381 elliptic curve","volume":"2019","author":"Wahby","year":"2019","journal-title":"IACR Trans. Cryptograph. Hardw. Embedded Syst."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2034881"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973256"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3479930"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDV61346.2024.10616881"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COOLCHIPS54332.2022.9772706"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/transele.2022LHS0001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ASICON58565.2023.10396122"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2023VLP0009"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS57524.2023.10405921"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.jpdc.2024.104946","article-title":"GMC-crypto: Low latency implementation of ECC point multiplication for generic Montgomery curves over GF(p)","volume":"193","author":"Javeed","year":"2024","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2019.2914247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2024.3402164"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.46586\/tches.v2022.i2.192-239","article-title":"ABE squared: Accurately benchmarking efficiency of attribute-based encryption","author":"De La Piedra","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_24"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.17487\/RFC9380","volume-title":"Hashing to Elliptic Curves","author":"Faz-Hernandez","year":"2023"},{"key":"ref25","article-title":"On the computation of the optimal ate pairing at the 192-bit security level","author":"Ghammam","year":"2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2795611"},{"key":"ref27","article-title":"High-assurance field inversion for curve-based cryptography","author":"Hvass","year":"2021"},{"key":"ref28","volume-title":"Bounds on Divsteps Iterations in Safegcd","author":"Wuille","year":"2025"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2024.3505920"},{"issue":"3","key":"ref30","doi-asserted-by":"crossref","first-page":"340","DOI":"10.46586\/tches.v2019.i3.340-398","article-title":"Fast constant-time gcd computation and modular inversion","volume":"2019","author":"Bernstein","year":"2019","journal-title":"IACR Trans. Cryptograph. Hardw. Embedded Syst."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271521"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48059-5_25"},{"key":"ref33","volume-title":"Pyschedule: Resource-Constrained Scheduling in Python","author":"Nonner","year":"2025"},{"key":"ref34","volume-title":"Ultrascale Architecture Configurable Logic Block User Guide (ug574) Version 1.6","year":"2025"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2024.3399071"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3472900"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2905899"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/cds2.12110"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3194019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/en14154676"},{"key":"ref41","article-title":"RFC 7748: Elliptic curves for security","author":"Langley","year":"2016"},{"key":"ref42","volume-title":"RELIC is an Efficient Library for Cryptography","author":"Aranha","year":"2025"},{"key":"ref43","volume-title":"Blockchain Acceleration Using FPGAS\u2014Elliptic Curves, Zk-Snarks, and VDFs","author":"Devlin","year":"2019"},{"key":"ref44","first-page":"1","article-title":"Low-latency hardware implementation of BLS12-381 pairing","volume-title":"Proc. Symp. Cryptography Inf. Secur.","author":"Anzai"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/92\/11361320\/11261691.pdf?arnumber=11261691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:02:18Z","timestamp":1769202138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11261691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":44,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2025.3632677","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]}}}