{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:31Z","timestamp":1750306471881,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,29]]},"DOI":"10.1145\/2835043.2835046","type":"proceedings-article","created":{"date-parts":[[2015,12,30]],"date-time":"2015-12-30T13:13:44Z","timestamp":1451481224000},"page":"89-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Computing Modular Exponentiation for Fixed-Exponent"],"prefix":"10.1145","author":[{"given":"Shri Prakash","family":"Dwivedi","sequence":"first","affiliation":[{"name":"Department of Information Technology, G. B. Pant University of Agri. &amp; Tech., Pantnagar, India"}]}],"member":"320","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Algorithmic number theory: Efficient algorithms","author":"Bach E.","year":"1997","unstructured":"E. Bach and J. Shallit . Algorithmic number theory: Efficient algorithms . MIT Press , Reading, Massachusetts , 1997 . E. Bach and J. Shallit. Algorithmic number theory: Efficient algorithms. MIT Press, Reading, Massachusetts, 1997."},{"key":"e_1_3_2_1_2_1","volume-title":"Pippenger's exponentiation algorithm","author":"Bernstein D. J.","year":"2002","unstructured":"D. J. Bernstein . Pippenger's exponentiation algorithm , 2002 . D. J. Bernstein. Pippenger's exponentiation algorithm, 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380160704"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754948.1754974"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2059831"},{"key":"e_1_3_2_1_6_1","volume-title":"A course in computational algebraic number theory","author":"Cohen H.","year":"1996","unstructured":"H. Cohen . A course in computational algebraic number theory . Springer-Verlag , Berlin , 1996 . H. Cohen. A course in computational algebraic number theory. Springer-Verlag, Berlin, 1996."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125080"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02384-2_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.863044"},{"key":"e_1_3_2_1_11_1","volume-title":"Seminumerical Algorithms","author":"Knuth D. E.","year":"1998","unstructured":"D. E. Knuth . The Art of Computer Programming , Seminumerical Algorithms . Addison-Wesley , 1998 . D. E. Knuth. The Art of Computer Programming, Seminumerical Algorithms. Addison-Wesley, 1998."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.705548"},{"key":"e_1_3_2_1_13_1","volume-title":"Handbook of applied cryptography","author":"Menezes A. J.","year":"1998","unstructured":"A. J. Menezes , P. C. Oorschot , and S. A. Vanstone . Handbook of applied cryptography . CRC Press , 1998 . A. J. Menezes, P. C. Oorschot, and S. A. Vanstone. Handbook of applied cryptography. CRC Press, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1051\/ita\/1990240605311"},{"key":"e_1_3_2_1_15_1","first-page":"123","volume-title":"Advances in Cryptology - CRYPTO'","author":"Okeya K.","year":"2004","unstructured":"K. Okeya , K. Schmidt-Samoa , C. Spahn , and T. Takagi . Signed binary representations revisited . In Advances in Cryptology - CRYPTO' 2004 , pages 123 -- 139 . Lecture Notes in Computer Science, 3152, Springer-Verlag , Berlin, August 2004. K. Okeya, K. Schmidt-Samoa, C. Spahn, and T. Takagi. Signed binary representations revisited. In Advances in Cryptology - CRYPTO' 2004, pages 123--139. Lecture Notes in Computer Science, 3152, Springer-Verlag, Berlin, August 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/BFb0053453","volume-title":"Advances in Cryptology - EUROCRYPT' 94","author":"Rooij P.","year":"1995","unstructured":"P. Rooij . Efficient exponentiation using precomputation and vector addition chain . In Advances in Cryptology - EUROCRYPT' 94 , pages 389 -- 399 . Lecture Notes in Computer Science, 950, Springer-Verlag , Berlin, May 1995 . P. Rooij. Efficient exponentiation using precomputation and vector addition chain. In Advances in Cryptology - EUROCRYPT' 94, pages 389--399. Lecture Notes in Computer Science, 950, Springer-Verlag, Berlin, May 1995."},{"key":"e_1_3_2_1_17_1","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"Shoup V.","year":"2009","unstructured":"V. Shoup . A Computational Introduction to Number Theory and Algebra . Cambridge University Press , 2009 . V. Shoup. A Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2103567"}],"event":{"name":"Compute '15: 8th Annual ACM India Conference","sponsor":["ACM India ACM India"],"location":"Ghaziabad India","acronym":"Compute '15"},"container-title":["Proceedings of the 8th Annual ACM India Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835043.2835046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:09Z","timestamp":1750225689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835043.2835046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":18,"alternative-id":["10.1145\/2835043.2835046","10.1145\/2835043"],"URL":"https:\/\/doi.org\/10.1145\/2835043.2835046","relation":{},"subject":[],"published":{"date-parts":[[2015,10,29]]},"assertion":[{"value":"2015-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}