{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:42:56Z","timestamp":1776231776351,"version":"3.50.1"},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"21","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Electron. Express"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1587\/elex.12.20150769","type":"journal-article","created":{"date-parts":[[2015,10,21]],"date-time":"2015-10-21T18:03:13Z","timestamp":1445450593000},"page":"20150769-20150769","source":"Crossref","is-referenced-by-count":23,"title":["A semi-systolic Montgomery multiplier over &lt;i&gt;GF&lt;\/i&gt;(2&lt;i&gt;&lt;sup&gt;m&lt;\/sup&gt;&lt;\/i&gt;)"],"prefix":"10.1587","volume":"12","author":[{"given":"Kee-Won","family":"Kim","sequence":"first","affiliation":[{"name":"College of Convergence Technology, Dankook University"}]},{"given":"Jun-Cheol","family":"Jeon","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kumoh National Institute of Technology"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] R. E. Blahut: <i>Theory and Practice of Error Control Codes<\/i> (Addison-Wesley, Reading, MA, 1983)."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone: <i>Handbook of Applied Cryptography<\/i> (CRC Press, Boca Raton, FL, 1996).","DOI":"10.1201\/9781439821916"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] P. Montgomery: Math. Comput. <b>44<\/b> (1985) 519. DOI:10.1090\/S0025-5718-1985-0777282-X","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] C. Koc and T. Acar: Des. Codes Cryptogr. <b>14<\/b> (1998) 57. DOI:10.1023\/A:1008208521515","DOI":"10.1023\/A:1008208521515"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] Z. Wang and S. Fan: IEEE Trans. Comput. <b>61<\/b> (2012) 415. DOI:10.1109\/TC.2010.272","DOI":"10.1109\/TC.2010.272"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] A. Hariri and A. Reyhani-Masoleh: IEEE Trans. Comput. <b>60<\/b> (2011) 1341. DOI:10.1109\/TC.2010.258","DOI":"10.1109\/TC.2010.258"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] W.-T. Huang, C. H. Chang, C. W. Chiou and F. H. Chou: IET Inf. Secur. <b>4<\/b> (2010) 111. DOI:10.1049\/iet-ifs.2009.0160","DOI":"10.1049\/iet-ifs.2009.0160"},{"key":"8","unstructured":"[8] K. W. Kim and J. C. Jeon: Int. J. Cyber-Security Digital Forensics <b>1<\/b> [2] (2012) 122."},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] K. W. Kim and S. H. Kim: IEICE Electron. Express <b>10<\/b> (2013) 20130354. DOI:10.1587\/elex.10.20130354","DOI":"10.1587\/elex.10.20130354"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] S. H. Choi and K. J. Lee: IEICE Electron. Express <b>11<\/b> (2014) 20140713. DOI:10.1587\/elex.11.20140713","DOI":"10.1587\/elex.11.20140713"},{"key":"11","unstructured":"[11] N. Weste and K. Eshraghian: <i>Principles of CMOS VLSI Design: A System Perspective<\/i> (Addison-Wesley, Reading, MA, 1985)."},{"key":"12","unstructured":"[12] STMicroelectronics: STMicroelectronics datasheet (2013) http:\/\/www.st.com."}],"container-title":["IEICE Electronics Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/12\/21\/12_12.20150769\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T17:45:22Z","timestamp":1498239922000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/elex\/12\/21\/12_12.20150769\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":12,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2015]]}},"URL":"https:\/\/doi.org\/10.1587\/elex.12.20150769","relation":{},"ISSN":["1349-2543"],"issn-type":[{"value":"1349-2543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}