{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:15:38Z","timestamp":1725520538869},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1109\/dsd.2008.127","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T13:55:15Z","timestamp":1226411715000},"page":"575-583","source":"Crossref","is-referenced-by-count":2,"title":["VLSI Implementation of a Cryptography-Oriented Reconfigurable Array"],"prefix":"10.1109","author":[{"given":"Scott","family":"Miller","sequence":"first","affiliation":[]},{"given":"Ambrose","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Sima","sequence":"additional","affiliation":[]},{"given":"Michael","family":"McGuire","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","article-title":"x platform. fpgas: complete data sheet","author":"pro","year":"2007","journal-title":"Journal of Documentation"},{"year":"0","key":"17"},{"year":"0","key":"23"},{"year":"0","key":"18"},{"year":"0","key":"15"},{"year":"2005","author":"stinson","journal-title":"Cryptography Theory and Practice","key":"16"},{"year":"1999","author":"rosing","journal-title":"Implementing Elliptic Curve Cryptography","key":"13"},{"year":"0","key":"14"},{"year":"2000","author":"paibami","journal-title":"Computer Arithmetic Algorithms and Hardware Designs","key":"11"},{"year":"0","key":"12"},{"key":"21","article-title":"platform. fpgas : complete data sheet","author":"virtex-ii","year":"2007","journal-title":"Journal of Documentation"},{"year":"2003","author":"kirk","journal-title":"Demystifying FPGA to ASIC Conversion","key":"3"},{"year":"0","key":"20"},{"key":"2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-45760-7_4","article-title":"montgomery in practice: how to do it more efficiently in hardware","author":"batina","year":"2002","journal-title":"Proc the The Cryptographer's Track at the RSA Conf on Topics in Cryptology (CT-RSA 2002)"},{"year":"0","key":"1"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"year":"2000","author":"seal","journal-title":"ARM Architecture Reference Manual","key":"6"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/1366110.1366127"},{"year":"0","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"year":"1991","author":"kane","journal-title":"MIPS RISC Architecture","key":"8"}],"event":{"name":"2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools","start":{"date-parts":[[2008,9,3]]},"location":"Parma, Italy","end":{"date-parts":[[2008,9,5]]}},"container-title":["2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4669199\/4669200\/04669287.pdf?arnumber=4669287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:25:28Z","timestamp":1497777928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4669287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dsd.2008.127","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}