{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T05:21:30Z","timestamp":1736054490370,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540593393"},{"type":"electronic","value":"9783540492368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/bfb0000448","type":"book-chapter","created":{"date-parts":[[2005,10,7]],"date-time":"2005-10-07T15:27:29Z","timestamp":1128698849000},"page":"365-375","source":"Crossref","is-referenced-by-count":0,"title":["Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources"],"prefix":"10.1007","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]},{"given":"Hikaru","family":"Morita","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,9,8]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"J. Bos and M. Coster: \u201cAddition Chain Heuristics,\u201d Advances in Cryptology-CRYPTO '89, LNCS 435, Springer-Verlag, pp.400\u2013407, 1989","DOI":"10.1007\/0-387-34805-0_37"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"E.F. Brickell, D.M. Gordon, K.S. McCurley, and D.B. Wilson: \u201cFast Exponentiation with Precomputation (Extended Abstract),\u201d Advances in Cryptology-EUROCRYPT '92, LNCS 658, Springer-Verlag, pp.200\u2013207, 1992","DOI":"10.1007\/3-540-47555-9_18"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"A. Bosselaers, R. Govaerts, and J. Vandewalle: \u201cComparison of three modular reduction functions,\u201d Advances in Cryptology-CRYPTO'93, LNCS 773, Springer-Verlag, pp.175\u2013186, 1993","DOI":"10.1007\/3-540-48329-2_16"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"E. F. Brickell: \u201cA Survey of Hardware Implementations of RSA,\u201d Advances in Cryptology-CRYPTO'89, LNCS 435, Springer-Verlag, pp.368\u2013370, 1989","DOI":"10.1007\/0-387-34805-0_34"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"E.F. Brickell: \u201cA Fast Modular Multiplication Algorithm with Application to Two Key Cryptography,\u201d Advances in Cryptology-CRYPTO'82, pp.51\u201360,Plenum, 1982.","DOI":"10.1007\/978-1-4757-0602-4_5"},{"issue":"no.6","key":"29_CR6","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M.E. Hellman: \u201cNew Directions in Cryptography,\u201d IEEE Transaction of Information Theory, vol. IT-22, no.6,pp. 644\u2013654, Nov. 1976","journal-title":"IEEE Transaction of Information Theory"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"S.R. Dusse and B.S. Kaliski Jr.: \u201cA Cryptographic Library for the Motorola DSP56000,\u201d Advances in Cryptology-EUROCRYPT'90, LNCS473, pp.230\u2013244, Springer-Verlag, 1991","DOI":"10.1007\/3-540-46877-3_21"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"F. Hoornaert, M. Decroos,J. Vandewalle, and R. Govaerts: \u201cFast RSA-Hardware: Dream or Reality?\u201d Advances in Cryptology-EUROCRYPT '88, LNCS 330, Springer-Verlag, pp.257\u2013264, 1988","DOI":"10.1007\/3-540-45961-8_23"},{"key":"29_CR9","unstructured":"K.Hwang: Computer Arithmetic: Principles, Architecture and Design, John Wiley & Sons, 1979"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"K. Iwamura, T. Matumoto, and H.Imai: \u201cHigh-Speed Implementation Methods for RSA Scheme,\u201d Advances in Cryptology-EUROCRYPT'92, LNCS 658, Springer-Verlag, pp.221\u2013238","DOI":"10.1007\/3-540-47555-9_20"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"P. Ivey, S. Walker, J. Stern, and S. Davidson: \u201cAn Ultra-High Speed Public Key Encryption Processor,\u201d IEEE 1992 Custom Integrated Circuits Conference, 1992","DOI":"10.1109\/CICC.1992.591336"},{"key":"29_CR12","unstructured":"D. E. Knuth: The Art of Computer Programming \u2014 Seminumerical Algorithms, vol.2, Addison \u2014 Westley, second edition, 1981."},{"issue":"no.l","key":"29_CR13","first-page":"70","volume":"E76-A","author":"H. Morita","year":"1993","unstructured":"H.Morita, C.H.Yang: \u201cA Modular-Multiplication Algorithm Using Lookahead Determination,\u201d IEICE Transaction of fundamentals, vol. E76-A, no.l, pp. 70\u201377, Jan. 1993","journal-title":"IEICE Transaction of fundamentals"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Y.Nakamura, K.Oguri, A.Nagoya, and R.Nomura: \u201cA Hierarchical Behavioral Description Based CAD System,\u201d Proceedings of IFIP EURO ASIC '90, pp.282\u2013287, May. 1990","DOI":"10.1109\/EASIC.1990.207955"},{"issue":"no.2","key":"29_CR15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman: \u201cA Method of Obtaining Digital signatures and Public Key Cryptosystems,\u201d Comm. of ACM, vol. 21, no.2, pp. 120\u2013126, Feb. 1978.","journal-title":"Comm. of ACM"},{"key":"29_CR16","unstructured":"VLSI Technology, Inc. \u201cVSC470 Library,\u201d VSD13881, and \u201c0.8-Micron Datapath Library (VCC4DP3),\u201d VSD13940, 1992"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT'94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0000448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T21:06:01Z","timestamp":1736024761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0000448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540593393","9783540492368"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/bfb0000448","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1995]]}}}