{"id":"https://openalex.org/W3184334856","doi":"https://doi.org/10.1109/tifs.2021.3098987","title":"DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power","display_name":"DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3184334856","doi":"https://doi.org/10.1109/tifs.2021.3098987","mag":"3184334856"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3098987","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1109/tifs.2021.3098987","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101926307","display_name":"Lili Gao","orcid":"https://orcid.org/0000-0003-3903-1480"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lili Gao","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082689200","display_name":"Fangyu Zheng","orcid":"https://orcid.org/0000-0003-0490-2485"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangyu Zheng","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101713373","display_name":"Rong Qiang Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Wei","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053551643","display_name":"Niall Emmart","orcid":null},"institutions":[{"id":"https://openalex.org/I177605424","display_name":"Amherst College","ror":"https://ror.org/028vqfs63","country_code":"US","type":"education","lineage":["https://openalex.org/I177605424"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Niall Emmart","raw_affiliation_strings":["College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I177605424","https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066513378","display_name":"Yuan Ma","orcid":"https://orcid.org/0000-0002-3828-6054"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Ma","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036002145","display_name":"Jingqiang Lin","orcid":"https://orcid.org/0000-0003-1508-4879"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingqiang Lin","raw_affiliation_strings":["School of Cyber Security, University of Science and Technology of China, Hefei, Anhui, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Science and Technology of China, Hefei, Anhui, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069608160","display_name":"Charles Weems","orcid":"https://orcid.org/0000-0002-8535-0258"},"institutions":[{"id":"https://openalex.org/I177605424","display_name":"Amherst College","ror":"https://ror.org/028vqfs63","country_code":"US","type":"education","lineage":["https://openalex.org/I177605424"]},{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles Weems","raw_affiliation_strings":["College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"College of Information and Computer Sciences, University of Massachusetts Amherst, Amherst, MA, USA","institution_ids":["https://openalex.org/I177605424","https://openalex.org/I24603500"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.367,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.835561,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":81},"biblio":{"volume":"16","issue":null,"first_page":"3988","last_page":"4002"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9539,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rounding","display_name":"Rounding","score":0.43288967}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8248212},{"id":"https://openalex.org/C84211073","wikidata":"https://www.wikidata.org/wiki/Q117879","display_name":"Floating point","level":2,"score":0.61048657},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.5198674},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4861905},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.48227245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47131118},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.45299196},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.44062582},{"id":"https://openalex.org/C136625980","wikidata":"https://www.wikidata.org/wiki/Q663208","display_name":"Rounding","level":2,"score":0.43288967},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35966697},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35912335},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3521163},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26394758},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15444112},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15388364},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.121836066},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3098987","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3098987","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation","award_id":"CCF-1525754"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61902392"},{"funder":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China","award_id":"2017YFB0802100"}],"datasets":[],"versions":[],"referenced_works_count":44,"referenced_works":["https://openalex.org/W1535283406","https://openalex.org/W1559075275","https://openalex.org/W1910751411","https://openalex.org/W1958679485","https://openalex.org/W1971605365","https://openalex.org/W1979309802","https://openalex.org/W1997359804","https://openalex.org/W2003736153","https://openalex.org/W2012407419","https://openalex.org/W2036378739","https://openalex.org/W2100264217","https://openalex.org/W2116055158","https://openalex.org/W2122087485","https://openalex.org/W2131132330","https://openalex.org/W2138849660","https://openalex.org/W2138878395","https://openalex.org/W2154290215","https://openalex.org/W2169004268","https://openalex.org/W2171599245","https://openalex.org/W2270465466","https://openalex.org/W2286649377","https://openalex.org/W2309997581","https://openalex.org/W2407740922","https://openalex.org/W2507130841","https://openalex.org/W2509355615","https://openalex.org/W2544955103","https://openalex.org/W2552202672","https://openalex.org/W2755396449","https://openalex.org/W2784690792","https://openalex.org/W2808195806","https://openalex.org/W2885448650","https://openalex.org/W2886574739","https://openalex.org/W2887162436","https://openalex.org/W2890842343","https://openalex.org/W2915352631","https://openalex.org/W2950492851","https://openalex.org/W2951858194","https://openalex.org/W3042402785","https://openalex.org/W3087919705","https://openalex.org/W3195420462","https://openalex.org/W321672375","https://openalex.org/W4236580217","https://openalex.org/W43667552","https://openalex.org/W99555641"],"related_works":["https://openalex.org/W4388911419","https://openalex.org/W4322008031","https://openalex.org/W3039927303","https://openalex.org/W2950918715","https://openalex.org/W2544512391","https://openalex.org/W2535419677","https://openalex.org/W2476214559","https://openalex.org/W2134876043","https://openalex.org/W2118569990","https://openalex.org/W187939582"],"abstract_inverted_index":{"Used":[0],"ubiquitously":[1],"in":[2,170,192,200,245],"a":[3,41,74,204,236],"huge":[4],"amount":[5],"of":[6,17,57,65,102,119,179,247],"security":[7],"protocols":[8],"or":[9],"applications,":[10],"elliptic":[11],"curve":[12],"cryptography":[13],"(ECC)":[14],"is":[15,48,157],"one":[16],"the":[18,50,54,58,66,103,108,120,123,132,154,160,166,171,175,186,209,223],"most":[19,246],"important":[20],"cryptographic":[21,44],"primitives,":[22],"featuring":[23],"efficiency":[24],"and":[25,37,68,106,126,148,184,239],"short":[26],"key":[27],"size":[28],"compared":[29],"with":[30,214],"other":[31],"public-key":[32,43],"cryptosystems":[33],"such":[34],"as":[35,40],"DSA":[36],"RSA.":[38],"However,":[39],"computation-intensive":[42],"primitive,":[45],"ECC":[46,79,162,188,243],"arithmetic":[47],"still":[49],"bottleneck":[51],"that":[52,86,207],"restrains":[53],"overall":[55],"performance":[56,206],"end":[59],"applications.":[60],"In":[61],"this":[62],"paper,":[63],"instead":[64],"conventional":[67],"straightforward":[69],"integer-based":[70],"methods,":[71],"we":[72,181],"present":[73],"general":[75],"framework":[76,97,156,169,233],"to":[77,151,159,216],"accelerate":[78],"schemes":[80,189],"over":[81],"prime":[82],"field,":[83],"called":[84],"DPF-ECC,":[85],"deeply":[87],"exploits":[88],"double":[89],"precision":[90],"floating-point":[91,176],"(DPF)":[92],"computing":[93,177],"power.":[94],"The":[95,197],"DPF-ECC":[96,155,168,232],"finely":[98],"manages":[99],"each":[100],"bit":[101],"DPF":[104,121],"numbers":[105],"minimizes":[107],"overhead":[109],"brought":[110],"by":[111,116,131],"additional":[112],"data":[113],"format":[114],"conversion,":[115],"making":[117],"use":[118],"representation,":[122],"rounding":[124],"operations,":[125],"fused":[127],"multiply-add":[128],"instruction":[129],"supported":[130,226],"IEEE":[133,227],"754":[134,228],"floating":[135,229],"point":[136,230],"standard.":[137],"We":[138],"also":[139],"conduct":[140],"two":[141],"comprehensive":[142],"case":[143],"studies":[144],"on":[145,222],"Crandall":[146],"primes":[147,150],"Solinas":[149],"demonstrate":[152],"how":[153],"applied":[158],"prevailing":[161],"schemes.":[163],"To":[164],"evaluate":[165],"proposed":[167],"real":[172],"world,":[173],"leveraging":[174],"power":[178],"GPUs,":[180],"implement":[182],"Curve25519/448":[183],"Edwards25519/448,":[185],"popular":[187],"widely":[190],"used":[191],"TLS":[193],"1.3,":[194],"SSH,":[195],"etc.":[196],"experimental":[198],"result":[199],"Tesla":[201],"P100":[202],"achieves":[203],"record-setting":[205],"outperforms":[208],"existing":[210],"fastest":[211],"integer":[212],"work":[213],"2x":[215],"3x":[217],"throughput.":[218],"With":[219],"dependency":[220],"only":[221],"very":[224,237],"commonly":[225],"standard,":[231],"can":[234],"be":[235],"competent":[238],"promising":[240],"candidate":[241],"for":[242],"implementation":[244],"general-purpose":[248],"platforms.":[249]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3184334856","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-01-20T09:05:46.173683","created_date":"2021-08-02"}