{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T20:32:41Z","timestamp":1649190761742},"reference-count":7,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"19","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2014]]},"DOI":"10.1587\/elex.11.20140356","type":"journal-article","created":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T23:17:36Z","timestamp":1410304656000},"page":"20140356-20140356","source":"Crossref","is-referenced-by-count":2,"title":["An efficient and scalable postcomputation-based generic-point parallel scalar multiplication method"],"prefix":"10.1587","volume":"11","author":[{"given":"Turki F.","family":"Al-Somani","sequence":"first","affiliation":[{"name":"Umm Al-Qura University, Computer Engineering Department"}]},{"given":"Ayman G.","family":"Fayoumi","sequence":"additional","affiliation":[{"name":"King Abdulaziz University, Department of Information Systems"}]},{"given":"Mohammed K.","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Umm Al-Qura University, Computer Engineering Department"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] N. Koblitz: Math. Comput. <b>48<\/b> (1987) 203. DOI:10.1090\/S0025-5718-1987-0866109-5","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] I. Blake, G. Seroussi and N. Smart: <i>Elliptic Curves in Cryptography<\/i> (Cambridge University Press, New York, 1999).","DOI":"10.1017\/CBO9781107360211"},{"key":"4","unstructured":"[4] D. Hankerson, A. J. Menezes and S. Vanstone: <i>Guide to Elliptic Curve Cryptography<\/i> (Springer-Verlag, 2004)."},{"key":"5","unstructured":"[5] E. Brickell, D. Gordon, K. McCurley and D. Wilson: <i>Advances in Cryptology \u2014 Eurocrypt\u201992<\/i>, LNCS 658 (Springer-Verlag, 1993) 200."},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.1732"},{"key":"7","unstructured":"[7] T. F. Al-Somani: Global J. Comput. Sci. Technol. <b>10<\/b> [11] (2010) 32."}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/11\/19\/11_11.20140356\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T19:18:28Z","timestamp":1619205508000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/11\/19\/11_11.20140356\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":7,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2014]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.11.20140356","relation":{},"ISSN":["1349-2543"],"issn-type":[{"value":"1349-2543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}