{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:40:07Z","timestamp":1732678807133,"version":"3.28.2"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["SaTC-1801488"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tvlsi.2024.3419700","type":"journal-article","created":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T17:22:20Z","timestamp":1720200140000},"page":"2154-2158","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Error Detection Cryptographic Architectures Benchmarked on FPGAs for Montgomery Ladder"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0009-0006-5989-2244","authenticated-orcid":false,"given":"Kasra","family":"Ahmadi","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6742-0868","authenticated-orcid":false,"given":"Saeed","family":"Aghapour","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4513-3109","authenticated-orcid":false,"given":"Mehran","family":"Mozaffari Kermani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of South Florida, Tampa, FL, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6921-6868","authenticated-orcid":false,"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[{"name":"Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic University, Boca Raton, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-x_31"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.186-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2004.94612"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3403\/30318286"},{"volume-title":"Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)","year":"1999","key":"ref6"},{"article-title":"Ed448-Goldilocks, a new elliptic curve","year":"2015","author":"Hamburg","key":"ref7"},{"volume-title":"Post-Quantum Cryptography: NIST\u2019s Plan for the Future","year":"2016","author":"Moody","key":"ref8"},{"volume-title":"Safecurves: Introduction","year":"2024","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.508-543"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.15"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.62"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3341147"},{"key":"ref19","first-page":"1","article-title":"Error detection schemes for \u03c4-NAF conversion within Koblitz curves benchmarked on various ARM processors","author":"Ahmadi","year":"2023","journal-title":"Authorea Preprints"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NorCAS57515.2022.9934378"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2016.7841315"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2952262"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351693"},{"article-title":"Algorithm-level error detection for ECSM","year":"2009","author":"Dominguez-Oviedo","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"first-page":"414","article-title":"A countermeasure against one physical cryptanalysis may benefit another attack","volume-title":"Proc. 4th Int. Conf. Inf. Secur. Cryptol.","author":"Yen","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3288696"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3184786"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92518-5_14"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/92\/10736447\/10587011-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/92\/10736447\/10587011.pdf?arnumber=10587011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T02:52:30Z","timestamp":1732675950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10587011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":30,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2024.3419700","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"type":"print","value":"1063-8210"},{"type":"electronic","value":"1557-9999"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}