{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:58:12Z","timestamp":1740167892380,"version":"3.37.3"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"\u201cICT Programme\u201d"},{"DOI":"10.13039\/501100004895","name":"European Union through the European Social Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union\u2019s Horizon 2020 Research and Innovation Programme","award":["952252 (SAFEST)"],"award-info":[{"award-number":["952252 (SAFEST)"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. II"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1109\/tcsii.2022.3191662","type":"journal-article","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:27:07Z","timestamp":1658176027000},"page":"4503-4507","source":"Crossref","is-referenced-by-count":3,"title":["Multiplierless Design of Very Large Constant Multiplications in Cryptography"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6129-9657","authenticated-orcid":false,"given":"Levent","family":"Aksoy","sequence":"first","affiliation":[{"name":"Department of Computer Systems, Centre for Hardware Security, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Debapriya Basu","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Chair for Security in Information Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1900-6387","authenticated-orcid":false,"given":"Malik","family":"Imran","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Centre for Hardware Security, Tallinn University of Technology, Tallinn, Estonia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9476-9651","authenticated-orcid":false,"given":"Patrick","family":"Karl","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Chair for Security in Information Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5294-0606","authenticated-orcid":false,"given":"Samuel","family":"Pagliarini","sequence":"additional","affiliation":[{"name":"Department of Computer Systems, Centre for Hardware Security, Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/92.863621"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2905899"},{"volume-title":"SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography.","year":"2022","author":"Bernstein","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415728"},{"volume-title":"Supersingular Isogeny Key Encapsulation.","year":"2022","author":"Jao","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1984.1164433"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt:20060059"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2246211"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LASCAS.2017.7948058"},{"key":"ref10","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"Karatsuba","year":"1963","journal-title":"Soviet Physics-Doklady"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2677426"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837424"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1240233.1240234"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2009.10.001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2018.2823780"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/82.539000"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1120725.1120953"},{"volume-title":"Digital Arithmetic","year":"2003","author":"Ercegovac","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2008.923242"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2008.4483924"},{"article-title":"Multiplication by an integer constant","year":"2001","author":"Lefevre","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/378239.378564"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/43.486662"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cds:19941191"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/82.466647"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2007.378201"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/iccad.2000.896450"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2010.32"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1404371.1404396"}],"container-title":["IEEE Transactions on Circuits and Systems II: Express Briefs"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8920\/9931138\/09832417.pdf?arnumber=9832417","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T06:17:44Z","timestamp":1706768264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9832417\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":30,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcsii.2022.3191662","relation":{},"ISSN":["1549-7747","1558-3791"],"issn-type":[{"type":"print","value":"1549-7747"},{"type":"electronic","value":"1558-3791"}],"subject":[],"published":{"date-parts":[[2022,11]]}}}