{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:35:44Z","timestamp":1725410144332},"reference-count":0,"publisher":"SCITEPRESS - Science and Technology Publications","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.5220\/0006831506250631","type":"proceedings-article","created":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T11:27:47Z","timestamp":1536924467000},"page":"625-631","source":"Crossref","is-referenced-by-count":0,"title":["Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT"],"prefix":"10.5220","author":[{"given":"Antoine","family":"Loiseau","sequence":"first","affiliation":[{"name":"CEA-Tech, Gardanne, France, Mines Saint Etienne, Gardanne and France, --- Select a Country ---"}]},{"given":"Jacques","family":"J. A. Fournier","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CEA Leti, DSYS\/LSOSP, F-38000 Grenoble and France, --- Select a Country ---"}]}],"member":"3171","event":{"name":"International Conference on Security and Cryptography","start":{"date-parts":[[2018,7,26]]},"location":"Porto, Portugal","end":{"date-parts":[[2018,7,28]]}},"container-title":["Proceedings of the 15th International Joint Conference on e-Business and Telecommunications"],"original-title":["Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT"],"deposited":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T11:28:04Z","timestamp":1536924484000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scitepress.org\/DigitalLibrary\/Link.aspx?doi=10.5220\/0006831506250631"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":0,"URL":"https:\/\/doi.org\/10.5220\/0006831506250631","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}