{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:57:32Z","timestamp":1725555452941},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128264"},{"type":"electronic","value":"9783642128271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12827-1_8","type":"book-chapter","created":{"date-parts":[[2010,5,5]],"date-time":"2010-05-05T19:15:11Z","timestamp":1273086911000},"page":"96-109","source":"Crossref","is-referenced-by-count":0,"title":["Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis"],"prefix":"10.1007","author":[{"given":"Zhen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaozhe","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuqin","family":"Fan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"8_CR2","unstructured":"Nat\u2019l Inst. of Standards and Technology, Digital Signature Standard(DSS), FIPS Publication 186-3 (2009)"},{"key":"8_CR3","unstructured":"IEEE Standard 1363-2000, IEEE Standard Specifications for Public-Key Cryptography (2000)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security \u2013 ESORICS 98","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side-channel Cryptanalysis of Product Ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 97\u2013110. Springer, Heidelberg (1998)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"I. Biehl","year":"2000","unstructured":"Biehl, I., Meyer, B., M\u00fcller, V.: Differential Fault Attacks on Elliptic Curve Cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 131\u2013146. Springer, Heidelberg (2000)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11889700_4","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"J. Bl\u00f6mer","year":"2006","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.P.: Sign Change Fault Attacks on Elliptic Curve Cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 36\u201352. Springer, Heidelberg (2006)"},{"key":"8_CR8","unstructured":"Massey, J.L., Omura, J.K.: Computational Method and Apparatus for Finite Field Arithmetic, US patent 4,587,627 (1986)"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/BF00196789","volume":"3","author":"G.B. Agnew","year":"1991","unstructured":"Agnew, G.B., Mullin, R.C., Onyszchuk, I.M., Vanstone, S.A.: An Implementation for a Fast Public-Key Cryptosystem. J. Cryptology\u00a03, 63\u201379 (1991)","journal-title":"J. Cryptology"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1109\/12.35833","volume":"38","author":"G.-L. Feng","year":"1989","unstructured":"Feng, G.-L.: A VLSI Architecture for Fast Inversion in GF(2\n m\n ). IEEE Trans. Computers\u00a038, 1383\u20131386 (1989)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR11","first-page":"97","volume-title":"13th IEEE International ASIC\/SOC Conference","author":"L. Gao","year":"2000","unstructured":"Gao, L., Sobelman, G.E.: Improved VLSI Designs for Multiplication and Inversion in GF(2\n m\n ) over Normal Bases. In: 13th IEEE International ASIC\/SOC Conference, pp. 97\u2013101. IEEE Press, New York (2000)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TC.2005.29","volume":"54","author":"A. Reyhani-Masoleh","year":"2005","unstructured":"Reyhani-Masoleh, A., Hasan, M.A.: Low Complexity Word-Level Sequential Normal Basis Multipliers. IEEE Trans. Computers\u00a054, 98\u2013110 (2005)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1109\/12.660172","volume":"47","author":"\u00c7.K. Ko\u00e7","year":"1998","unstructured":"Ko\u00e7, \u00c7.K., Sunar, B.: Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields. IEEE Trans. Computers\u00a047, 353\u2013356 (1998)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TC.2002.1004590","volume":"51","author":"A. Reyhani-Masoleh","year":"2002","unstructured":"Reyhani-Masoleh, A., Hasan, M.A.: A New Construction of Massey-Omura Parallel Multiplier over GF(2\n m\n ). IEEE Trans. Computers\u00a051, 511\u2013520 (2002)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR15","first-page":"196","volume-title":"16th IEEE Symposium on Computer Arithmetic","author":"S. Kwon","year":"2003","unstructured":"Kwon, S.: A Low Complexity and a Low Latency Bit Parallel Systolic Multiplier over GF(2\n m\n ) Using an Optimal Normal Basis of Type II. In: 16th IEEE Symposium on Computer Arithmetic, pp. 196\u2013202. IEEE Press, New York (2003)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"1553","DOI":"10.1109\/TC.2009.62","volume":"58","author":"S. Bayat-Sarmadi","year":"2009","unstructured":"Bayat-Sarmadi, S., Hasan, M.A.: Concurrent Error Detection in Finite-Filed Arithmetic Operations Using Pipelined and Systolic Architectures. IEEE Trans. Computers\u00a058, 1553\u20131567 (2009)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1109\/TC.2008.226","volume":"58","author":"C.W. Chiou","year":"2009","unstructured":"Chiou, C.W., Chang, C.C., Lee, C.Y., Hou, T.W., Lin, J.M.: Concurrent Error Detection and Correction in Gaussian Normal Basis Multiplier over GF(2\n m\n ). IEEE Trans. Computers\u00a058, 851\u2013857 (2009)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1023\/A:1008333132366","volume":"13","author":"S. Fenn","year":"1998","unstructured":"Fenn, S., Gossel, M., Benaissa, M., Taylor, D.: On-Line Error Detection for Bit-Serial Multipliers in GF(2\n m\n ). J. Electronic Testing: Theory and Applications\u00a013, 29\u201340 (1998)","journal-title":"J. Electronic Testing: Theory and Applications"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TC.2006.147","volume":"55","author":"A. Reyhani-Masoleh","year":"2006","unstructured":"Reyhani-Masoleh, A., Hasan, M.A.: Fault Detection Architectures for Field Multiplication Using Polynomial Bases. IEEE Trans. Computers\u00a055, 1089\u20131103 (2006)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR20","unstructured":"Lee, C.Y., Meher, P.K., Patra, J.C.: Concurrent Error Detection in Bit-Serial Normal Basis Multiplication over GF(2\n m\n ) Using Multiple Parity Prediction Schemes. IEEE Trans. VLSI (2009) (in Press)"},{"key":"8_CR21","first-page":"1499","volume-title":"22nd IEEE International Conference on Advanced Information Networking and Applications","author":"C.Y. Lee","year":"2008","unstructured":"Lee, C.Y.: Concurrent Error Detection in Digital-Serial Normal Basis Multiplication over GF(2\n m\n ). In: 22nd IEEE International Conference on Advanced Information Networking and Applications, pp. 1499\u20131504. IEEE Press, New York (2008)"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.vlsi.2009.07.002","volume":"43","author":"C.Y. Lee","year":"2010","unstructured":"Lee, C.Y.: Concurrent Error Detection Architectures for Gaussian Normal Basis Multiplication over GF(2\n m\n ). J. VLSI: Integration\u00a043, 113\u2013123 (2010)","journal-title":"J. VLSI: Integration"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10836-006-7446-9","volume":"22","author":"C.Y. Lee","year":"2006","unstructured":"Lee, C.Y., Chiou, C.W., Lin, J.M.: Concurrent Error Detection in a Polynomial Basis Multiplier over GF(2\n m\n ). J. Electronic Testing\u00a022, 143\u2013150 (2006)","journal-title":"J. Electronic Testing"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s10836-005-1053-z","volume":"21","author":"C.Y. Lee","year":"2005","unstructured":"Lee, C.Y., Chiou, C.W., Lin, J.M.: Concurrent Error Detection in a Bit-Parallel Systolic Multiplier for Dual Basis of GF(2\n m\n ). J. Electronic Testing\u00a021, 539\u2013549 (2005)","journal-title":"J. Electronic Testing"},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TC.1982.1676055","volume":"31","author":"J.H. Patel","year":"1982","unstructured":"Patel, J.H., Fung, L.Y.: Concurrent Error Detection in ALU\u2019s by Recomputing with Shifted Operands. IEEE Trans. Computers\u00a031, 589\u2013595 (1982)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TC.1983.1676246","volume":"32","author":"J.H. Patel","year":"1983","unstructured":"Patel, J.H., Fung, L.Y.: Concurrent Error Detection in Multiply and Divide Arrays. IEEE Trans. Computers\u00a032, 417\u2013422 (1983)","journal-title":"IEEE Trans. Computers"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1090\/S0025-5718-99-00988-6","volume":"68","author":"S. Feisel","year":"1999","unstructured":"Feisel, S., von zur Gathen, J., Shokrollahi, M.A.: Normal Bases via General Gauss Periods. Math. Comput.\u00a068, 271\u2013290 (1999)","journal-title":"Math. Comput."},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0166-218X(89)90001-2","volume":"25","author":"D.W. Ash","year":"1989","unstructured":"Ash, D.W., Blake, I.F., Vanstone, S.A.: Low Complexity Normal Bases. Discrete Appl. Math.\u00a025, 191\u2013210 (1989)","journal-title":"Discrete Appl. Math."},{"key":"8_CR29","unstructured":"Blake, I.F., Roth, R.M., Seroussi, G.: Efficient Arithmetic in GF(2m) through Palindromic Representation. Technical Report, HPL-98-134 (1998)"},{"key":"8_CR30","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/2.56855","volume":"23","author":"E.J. McCluskey","year":"1990","unstructured":"McCluskey, E.J.: Design Techniques for Testable Embedded Error Checkers. IEEE Computer\u00a023, 84\u201388 (1990)","journal-title":"IEEE Computer"},{"key":"8_CR31","volume-title":"Principles of CMOS VLSI Design: A system Perspective","author":"N. Weste","year":"1985","unstructured":"Weste, N., Eshraghian, K.: Principles of CMOS VLSI Design: A system Perspective. Addison-Wesley, Reading (1985)"},{"key":"8_CR32","unstructured":"M74HC08, Quad 2-Input AND Gate, STMicroelectronics (2001), \n \n http:\/\/www.st.com\/stonline\/products\/literature\/ds\/1885\/m74hc08.pdf"},{"key":"8_CR33","unstructured":"M74HC86,Quad Exclusive OR Gate, STMicroelectronics (2001), \n \n http:\/\/www.st.com\/stonline\/products\/literature\/ds\/2006\/m74hc86.pdf"},{"key":"8_CR34","unstructured":"M74HC32, Quad 2-Input OR gate, STMicroelectronics (2001), \n \n http:\/\/www.st.com\/stonline\/products\/literature\/ds\/1944\/m74hc32.pdf"},{"key":"8_CR35","unstructured":"M74HC279, Quad S\u0304-R\u0304 Latch, STMicroelectronics (2001), \n \n http:\/\/www.st.com\/stonline\/products\/literature\/od\/1937\/m74hc279.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security, Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12827-1_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:47:30Z","timestamp":1619783250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12827-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128264","9783642128271"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12827-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}