{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:24Z","timestamp":1750308024181,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,3]],"date-time":"2007-09-03T00:00:00Z","timestamp":1188777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,3]]},"DOI":"10.1145\/1284480.1284525","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"147-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA"],"prefix":"10.1145","author":[{"given":"Sudhakar","family":"Maddi","sequence":"first","affiliation":[{"name":"International Institute of Information Technology (IIIT), Hyderabad, India"}]},{"given":"M. B.","family":"Srinivas","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology (IIIT), Hyderabad, India"}]}],"member":"320","published-online":{"date-parts":[[2007,9,3]]},"reference":[{"volume-title":"Network and Internetwork Security Principles and Practice","year":"1995","key":"e_1_3_2_1_1_1","unstructured":"Stallings. W , Network and Internetwork Security Principles and Practice ( Prentice Hall , New York, USA , 1995 ) Stallings. W, Network and Internetwork Security Principles and Practice (Prentice Hall, New York, USA, 1995)"},{"volume-title":"Handbook of Applied Cryptography","year":"1997","key":"e_1_3_2_1_2_1","unstructured":"Menezes. A, Oorschot. P, and Vanstone. S , Handbook of Applied Cryptography ' ( CRC Press , Florida, USA , 1997 ) Menezes. A, Oorschot. P, and Vanstone. S, Handbook of Applied Cryptography' (CRC Press, Florida, USA, 1997)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_5_1","volume-title":"FIPS PUB","author":"National Institute for Standards and Technology","year":"2000","unstructured":"National Institute for Standards and Technology , Digital Signature Standard (DSS) , FIPS PUB 186-2, January 2000 . National Institute for Standards and Technology, Digital Signature Standard (DSS), FIPS PUB 186-2, January 2000."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"Menezes A.J.","year":"1993","unstructured":"A.J. Menezes , Elliptic Curve Public Key Cryptosystems , Kluwer Academic Publishers , Boston, MA , 1993 . A.J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, Boston, MA, 1993."},{"key":"e_1_3_2_1_7_1","first-page":"70","volume-title":"Proceedings of 14th Symposium on Computer Arithmetic","author":"Reconfigurable Hardware Montgomery Modular","year":"1999","unstructured":"Blum. T, and Paar, C, Montgomery Modular Exponentiation on Reconfigurable Hardware , Proceedings of 14th Symposium on Computer Arithmetic , 1999 , pp. 70 -- 77 . Blum. T, and Paar, C, Montgomery Modular Exponentiation on Reconfigurable Hardware, Proceedings of 14th Symposium on Computer Arithmetic, 1999, pp. 70--77."},{"key":"e_1_3_2_1_8_1","unstructured":"Kim. Y.S Kang. W.S Choi. J.R Implementation of 1024-bit modular processor for RSA cryptosystem http:\/\/www.ap-asic.org\/2000\/proceedings\/10-4.pdf  Kim. Y.S Kang. W.S Choi. J.R Implementation of 1024-bit modular processor for RSA cryptosystem http:\/\/www.ap-asic.org\/2000\/proceedings\/10-4.pdf"},{"key":"e_1_3_2_1_9_1","volume-title":"Workshop on Complexity Effective Designs (WECD02)","author":"Complexity-Effective B, A","year":"2002","unstructured":"Bunimov. V, Schimmler. M, Tolg. B, A Complexity-Effective Version of Montgomery's Algorithm , presented at the Workshop on Complexity Effective Designs (WECD02) , May 2002 . Bunimov. V, Schimmler. M, Tolg. B, A Complexity-Effective Version of Montgomery's Algorithm, presented at the Workshop on Complexity Effective Designs (WECD02), May 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20040791"},{"key":"e_1_3_2_1_11_1","first-page":"750","volume-title":"Proceedings. IEEE\/ACM International Conference on VLSI Design","author":"Sudhakar M.","year":"2007","unstructured":"M. Sudhakar , R.V. Kamala , M.B. Srinivas , An Efficient , Reconfigurable and Unified Montgomery Multiplier Architecture , Proceedings. IEEE\/ACM International Conference on VLSI Design , Bangalore, India , January 6-10, 2007 , pp. 750 -- 755 . M. Sudhakar, R.V. Kamala, M.B. Srinivas, An Efficient, Reconfigurable and Unified Montgomery Multiplier Architecture, Proceedings. IEEE\/ACM International Conference on VLSI Design, Bangalore, India, January 6-10, 2007, pp. 750--755."},{"volume-title":"The Basics of ECC 2006 {Online}. Available: http:\/\/www.certicom.com\/index.php? action=res,ecc_faq","author":"Certicom Corporation","key":"e_1_3_2_1_12_1","unstructured":"Certicom Corporation , The Basics of ECC 2006 {Online}. Available: http:\/\/www.certicom.com\/index.php? action=res,ecc_faq Certicom Corporation, The Basics of ECC 2006 {Online}. Available: http:\/\/www.certicom.com\/index.php? action=res,ecc_faq"},{"key":"e_1_3_2_1_13_1","unstructured":"NIST DSS Standard Basicrypt-Elliptic Curve Cryptography (ECC) Benchmark Suite: http:\/\/csrc.nist.gov\/publications\/fips\/ fips186-2\/fips186-2-change1.pdf  NIST DSS Standard Basicrypt-Elliptic Curve Cryptography (ECC) Benchmark Suite: http:\/\/csrc.nist.gov\/publications\/fips\/ fips186-2\/fips186-2-change1.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"e_1_3_2_1_15_1","first-page":"202","volume-title":"Proc. CHES 2001","author":"Gro\u03b2sch\u00e4dl Johann","year":"2001","unstructured":"Johann Gro\u03b2sch\u00e4dl , A bit-serial unified multiplier architecture for finite fields GF(p) and GF(2m) , Proc. CHES 2001 , August 2001 , pp. 202 -- 218 . Johann Gro\u03b2sch\u00e4dl, A bit-serial unified multiplier architecture for finite fields GF(p) and GF(2m), Proc. CHES 2001, August 2001, pp. 202--218."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1228516"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2005.9"},{"key":"e_1_3_2_1_18_1","unstructured":"Virtex-II Pro and Virtex-II Pro X Platform FPGAs: Complete Data Sheet www.xilinx.xom\/bvdocs\/publications\/ds083.pdf  Virtex-II Pro and Virtex-II Pro X Platform FPGAs: Complete Data Sheet www.xilinx.xom\/bvdocs\/publications\/ds083.pdf"}],"event":{"name":"SBCCI07: 20th Symposium on Integrated Circuits and System Design","sponsor":["ACM Association for Computing Machinery","SIGDA ACM Special Interest Group on Design Automation"],"location":"Copacabana Rio de Janeiro","acronym":"SBCCI07"},"container-title":["Proceedings of the 20th annual conference on Integrated circuits and systems design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1284480.1284525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1284480.1284525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:13:55Z","timestamp":1750259635000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1284480.1284525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,3]]},"references-count":18,"alternative-id":["10.1145\/1284480.1284525","10.1145\/1284480"],"URL":"https:\/\/doi.org\/10.1145\/1284480.1284525","relation":{},"subject":[],"published":{"date-parts":[[2007,9,3]]},"assertion":[{"value":"2007-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}