{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:03Z","timestamp":1750308783704,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741967","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"263-267","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A new variant vision on ECDSA"],"prefix":"10.1145","author":[{"given":"M.","family":"Prabu","sequence":"first","affiliation":[{"name":"Anna University Coimbatore, Tamil Nadu, India"}]},{"given":"R.","family":"Shanmugalakshmi","sequence":"additional","affiliation":[{"name":"Government College of Technology, Tamil Nadu, India"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"unstructured":"Adrian Antipa Daniel Brown Robert Gallant Rob Lambert Struik and Scott Vanstone \"Accelerated Verification of ECDSA Signature\" Certicom Research Canada  Adrian Antipa Daniel Brown Robert Gallant Rob Lambert Struik and Scott Vanstone \"Accelerated Verification of ECDSA Signature\" Certicom Research Canada","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/BF00196725"},{"volume-title":"Technical Report CORR 99--34","author":"Johnson D.","unstructured":"D. Johnson and A. Menezes (August 1999)\" \" The Elliptic Curve Digital Signature Algorithm (ECDSA)\" , Technical Report CORR 99--34 , Centre for Applied Cryptographic Research (CACR) , University of Waterloo D. Johnson and A. Menezes (August 1999)\" \"The Elliptic Curve Digital Signature Algorithm (ECDSA)\", Technical Report CORR 99--34, Centre for Applied Cryptographic Research (CACR), University of Waterloo","key":"e_1_3_2_1_3_1"},{"unstructured":"Douglus R. Stinson \"Cryptography theory and practice\" Chapman hall Publichsers. 2002   Douglus R. Stinson \"Cryptography theory and practice\" Chapman hall Publichsers. 2002","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","volume-title":"Evaluating elliptic curve based KEMs in the light of pairings","author":"Galindo D.","year":"2004","unstructured":"D. Galindo , S. Martin and J. L. Villar ( 2004 ), \" Evaluating elliptic curve based KEMs in the light of pairings ,\" D. Galindo, S. Martin and J. L. Villar (2004), \"Evaluating elliptic curve based KEMs in the light of pairings,\""},{"unstructured":"Hung-Zih Liao and Yuan-Yuan Shen \"On the Elliptic Curve Digital Algorithm\" Tunghai Science Vol. 8:109--126  Hung-Zih Liao and Yuan-Yuan Shen \"On the Elliptic Curve Digital Algorithm\" Tunghai Science Vol. 8:109--126","key":"e_1_3_2_1_6_1"},{"volume-title":"Computer Engineering IJCSNS'2007","author":"Multi-Signature DSA","unstructured":"Hakim Khali, \"Ahcene Farah DSA and ECDSA-based Multi-Signature Schemes\", Faculty of Computer Science &amp; Computer Engineering IJCSNS'2007 . Hakim Khali, \"Ahcene Farah DSA and ECDSA-based Multi-Signature Schemes\", Faculty of Computer Science &amp; Computer Engineering IJCSNS'2007.","key":"e_1_3_2_1_7_1"},{"volume-title":"Department of Computer Science","unstructured":"John Malone-Lee and Nigel P . Smart \"Modifications of ECDSA\"University of Bristol , Department of Computer Science , Bristol, UK . John Malone-Lee and Nigel P. Smart \"Modifications of ECDSA\"University of Bristol, Department of Computer Science, Bristol, UK.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","volume-title":"MIT\/LCS\/TR-212, MIT Laboratory for Computer Science","author":"Rabin M.","year":"1979","unstructured":"M. Rabin ( 1979 ), \" Digitalized signatures and public-key functions as intractable as factorization \", MIT\/LCS\/TR-212, MIT Laboratory for Computer Science . http:\/\/eprint.iacr.org\/2004\/084.pdf. M. Rabin (1979), \"Digitalized signatures and public-key functions as intractable as factorization\", MIT\/LCS\/TR-212, MIT Laboratory for Computer Science. http:\/\/eprint.iacr.org\/2004\/084.pdf."},{"unstructured":"National Institute of Standards and Technology \"Digital Signature Standard\" FIPS Publication 186 1994.  National Institute of Standards and Technology \"Digital Signature Standard\" FIPS Publication 186 1994.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","volume-title":"FIPS Publication 196.","author":"National Institute of Standards and Technology","year":"1997","unstructured":"National Institute of Standards and Technology ( 1997 ), Entity Authentication using Public Key Cryptography , FIPS Publication 196. National Institute of Standards and Technology (1997), Entity Authentication using Public Key Cryptography, FIPS Publication 196."},{"key":"e_1_3_2_1_12_1","volume-title":"FIPS 186--2","author":"NIST","year":"2001","unstructured":"NIST ( 2001 ), \" Digital Signature Standard \", FIPS 186--2 , http:\/\/csrc.nist.gov\/publiscations2-change1.pdf. NIST (2001), \"Digital Signature Standard\", FIPS 186--2, http:\/\/csrc.nist.gov\/publiscations2-change1.pdf."},{"key":"e_1_3_2_1_13_1","volume-title":"FIPS","author":"NIST","year":"2002","unstructured":"NIST ( 2002 ), \" Secure Hash Standard \", FIPS , http:\/\/csrc.nist.gov\/2\/fips180-2withchangenotice.pdf. NIST (2002), \"Secure Hash Standard\", FIPS, http:\/\/csrc.nist.gov\/2\/fips180-2withchangenotice.pdf."},{"key":"e_1_3_2_1_14_1","volume-title":"DRAFT Special Publication 800-","author":"NIST","year":"2003","unstructured":"NIST ( 2003 ), \" Recommendation on Key Management \", DRAFT Special Publication 800- NIST (2003), \"Recommendation on Key Management\", DRAFT Special Publication 800-"},{"doi-asserted-by":"crossref","unstructured":"Prabu Dr. Shanmugalakshmi \"A Comparative Analysis of Signature Schemes in A New Approach to Variant on ECDSA\". CiiT Internationl Journal August 2009  Prabu Dr. Shanmugalakshmi \"A Comparative Analysis of Signature Schemes in A New Approach to Variant on ECDSA\". CiiT Internationl Journal August 2009","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICIMT.2009.65"},{"volume-title":"William Stallings \"Cryptography and Network Security\"","unstructured":"William Stallings \"Cryptography and Network Security\" , 4 th Edition William Stallings \"Cryptography and Network Security\", 4th Edition","edition":"4","key":"e_1_3_2_1_16_1"}],"event":{"sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"acronym":"ICWET '10","name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","location":"Mumbai Maharashtra India"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":16,"alternative-id":["10.1145\/1741906.1741967","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741967","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}