{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:15:22Z","timestamp":1730265322121,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iisr.2018.8535680","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T02:18:10Z","timestamp":1542334690000},"page":"184-191","source":"Crossref","is-referenced-by-count":2,"title":["A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)"],"prefix":"10.1109","author":[{"given":"JianWei","family":"Liu","sequence":"first","affiliation":[]},{"given":"DongXu","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"ZhenYu","family":"Guan","sequence":"additional","affiliation":[]},{"given":"ZiYu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2016.07.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTICT.2016.7514561"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref13","first-page":"47","article-title":"Efficient FPGA Implementation of Modular Multiplication based on Montgomery Algorithm[J]\/\/","author":"yang","year":"2016","journal-title":"Microprocessors & Microsystems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.375"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.863"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2012.6271521"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2013.6466286"},{"key":"ref18","first-page":"409","article-title":"Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture Using Parallel Jacobian Coordinate System[J]","volume":"4","author":"arabia","year":"2010","journal-title":"International Journal of Computer Science & Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866676"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57p1"},{"key":"ref27","first-page":"394","article-title":"A Highly Efficient Cipher Processor for Dual-Field Elliptic Curve Cryptography[J]","volume":"56","author":"lai","year":"2009","journal-title":"IEEE IEEE Trans Circuits Syst II Exp Briefs"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref6","first-page":"523","article-title":"Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance[C]","author":"zhang","year":"2015","journal-title":"IEEE International Conference on Electron Devices and Solid-State Circuits IEEE"},{"journal-title":"An overview of Elliptic Curve Cryptography","year":"2000","author":"lopez","key":"ref5"},{"first-page":"1","article-title":"A high speed redundant-signed-digit based montgomery modular multiplier[C]","year":"0","author":"shah","key":"ref8"},{"first-page":"910","article-title":"Full custom design of adaptable montgomery modular multiplier for asymmetric RSA cryptosystem[C]","year":"0","author":"adiono","key":"ref7"},{"key":"ref2","first-page":"417","article-title":"Use of Elliptic Curves in Cryptography[C]\/\/","author":"miller","year":"1985","journal-title":"Advances in Cryptology"},{"first-page":"1101","article-title":"Design and implementation of different architectures of montgomery modular multiplication[C]","year":"0","author":"kavyashree","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/357980.358017","article-title":"A Method for Obtaining Digital Signatures and Public-Key Cryptosystems[J]","volume":"26","author":"rivest","year":"1983","journal-title":"Communications of the ACM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.47"},{"journal-title":"Standard specifications for public key cryptography","first-page":"1","year":"2000","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2003.12.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2011.5937665"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306223194"},{"key":"ref26","first-page":"412","article-title":"A High-Performance Elliptic Curve Cryptographic Processor for General Curves Over GF (p) Based on a Systolic Arithmetic Unit[J]","volume":"54","author":"chen","year":"2007","journal-title":"IEEE IEEE Trans Circuits Syst II Exp Briefs"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190586"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","start":{"date-parts":[[2018,8,24]]},"location":"Shenyang","end":{"date-parts":[[2018,8,27]]}},"container-title":["2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8517202\/8535604\/08535680.pdf?arnumber=8535680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:44:12Z","timestamp":1643229852000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8535680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iisr.2018.8535680","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}