{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:28Z","timestamp":1761648328458,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,20]],"date-time":"2016-01-20T00:00:00Z","timestamp":1453248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,20]]},"DOI":"10.1145\/2858930.2858938","type":"proceedings-article","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T15:05:10Z","timestamp":1454079910000},"page":"41-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A High Speed Scalar Multiplier for Binary Edwards Curves"],"prefix":"10.1145","author":[{"given":"Apostolos P.","family":"Fournaris","sequence":"first","affiliation":[{"name":"Industrial Systems Institute, R. C. ATHENA, Greece and Computer Informatics Engineering Dpt., TEI of Western Greece"}]},{"given":"Nicolas","family":"Sklavos","sequence":"additional","affiliation":[{"name":"Computer Engineering and Informatics Dpt., University of Patras, Greece"}]},{"given":"Christos","family":"Koulamas","sequence":"additional","affiliation":[{"name":"Industrial Systems Institute, R. C. ATHENA, Greece"}]}],"member":"320","published-online":{"date-parts":[[2016,1,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2013.055840"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784881.1784889"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2011.2158595"},{"issue":"6","key":"e_1_3_2_1_4_1","first-page":"1668","article-title":"Parallel and high-speed computations of elliptic curve cryptography using hybrid-double multipliers. Parallel and Distributed Systems","volume":"26","author":"Azarderakhsh R.","year":"2015","unstructured":"R. Azarderakhsh and A. Reyhani-Masoleh . Parallel and high-speed computations of elliptic curve cryptography using hybrid-double multipliers. Parallel and Distributed Systems , IEEE Trans. on , 26 ( 6 ): 1668 -- 1677 , 2015 . R. Azarderakhsh and A. Reyhani-Masoleh. Parallel and high-speed computations of elliptic curve cryptography using hybrid-double multipliers. Parallel and Distributed Systems, IEEE Trans. on, 26(6):1668--1677, 2015.","journal-title":"IEEE Trans. on"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_28"},{"key":"e_1_3_2_1_6_1","volume-title":"Binary Edwards Curves. e-print Archive: report 2008\/171","author":"Bernstein D. J.","year":"2008","unstructured":"D. J. Bernstein , T. Lange , and R. R. Farashahi . Binary Edwards Curves. e-print Archive: report 2008\/171 , 2008 . D. J. Bernstein, T. Lange, and R. R. Farashahi. Binary Edwards Curves. e-print Archive: report 2008\/171, 2008."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167413"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2011.11.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/648252.752381"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2014.10.008"},{"issue":"1","key":"e_1_3_2_1_11_1","first-page":"8","article-title":"Overlap-free karatsuba-ofman polynomial multiplication algorithms. Inf. Security","volume":"4","author":"Fan H.","year":"2010","unstructured":"H. Fan , J. Sun , M. Gu , and K.-Y. Lam . Overlap-free karatsuba-ofman polynomial multiplication algorithms. Inf. Security , IET , 4 ( 1 ): 8 -- 14 , 2010 . H. Fan, J. Sun, M. Gu, and K.-Y. Lam. Overlap-free karatsuba-ofman polynomial multiplication algorithms. Inf. Security, IET, 4(1):8 --14, 2010.","journal-title":"IET"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13039-2_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_22"},{"key":"e_1_3_2_1_14_1","volume-title":"Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures. 4th TRUDEVICE Workshop on Secure Hardware & Security Evaluation, Saint-Malo, France, 17th","author":"Fournaris A. P.","year":"2015","unstructured":"A. P. Fournaris and N. Sklavos . Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures. 4th TRUDEVICE Workshop on Secure Hardware & Security Evaluation, Saint-Malo, France, 17th September 2015 . A. P. Fournaris and N. Sklavos. Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures. 4th TRUDEVICE Workshop on Secure Hardware & Security Evaluation, Saint-Malo, France, 17th September 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.07.009"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_6"},{"key":"e_1_3_2_1_17_1","first-page":"291","volume-title":"Yen. The Montgomery Powering Ladder. In CHES 2003","author":"Joye M.","year":"2003","unstructured":"M. Joye and S.- M. Yen. The Montgomery Powering Ladder. In CHES 2003 , pages 291 -- 302 , UK, 2003 . Springer-Verlag. M. Joye and S.-M. Yen. The Montgomery Powering Ladder. In CHES 2003, pages 291--302, UK, 2003. Springer-Verlag."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_29"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_11"}],"event":{"name":"CS2 '16: Third Workshop on Cryptography and Security in Computing Systems","sponsor":["Politecnico di Milano Politecnico di Milano","HiPEAC HiPEAC Network of Excellence"],"location":"Prague Czech Republic","acronym":"CS2 '16"},"container-title":["Proceedings of the Third Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858930.2858938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858930.2858938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:03Z","timestamp":1750227123000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858930.2858938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,20]]},"references-count":20,"alternative-id":["10.1145\/2858930.2858938","10.1145\/2858930"],"URL":"https:\/\/doi.org\/10.1145\/2858930.2858938","relation":{},"subject":[],"published":{"date-parts":[[2016,1,20]]},"assertion":[{"value":"2016-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}