{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:57:02Z","timestamp":1752101822477},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/tc.2011.87","type":"journal-article","created":{"date-parts":[[2011,4,26]],"date-time":"2011-04-26T14:23:13Z","timestamp":1303827793000},"page":"732-737","source":"Crossref","is-referenced-by-count":17,"title":["A Fast Hardware Architecture for Integer to \\tauNAF Conversion for Koblitz Curves"],"prefix":"10.1109","volume":"61","author":[{"given":"Jithra","family":"Adikari","sequence":"first","affiliation":[]},{"given":"Vassil S.","family":"Dimitrov","sequence":"additional","affiliation":[]},{"given":"Kimmo U.","family":"Jarvinen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibttc201205073214","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2006.379768"},{"key":"bibttc201205073213","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2008.08.002"},{"key":"bibttc201205073216","first-page":"445","article-title":"FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers","author":"dimitrov","year":"2006","journal-title":"Proc Cryptographic Hardware and Embedded Systems?(CHES '06)"},{"key":"bibttc201205073215","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_9"},{"key":"bibttc201205073210","first-page":"25","article-title":"Implementation of Elliptic Curve Cryptographic Coprocessor Over on an FPGA","author":"okada","year":"2000","journal-title":"Proc Second Int'l Workshop Cryptographic Hardware and Embedded Systems?(CHES '00)"},{"key":"bibttc201205073212","first-page":"109","article-title":"High-Speed Elliptic Curve Cryptography Accelerator for Koblitz Curves","author":"j\ufffdrvinen","year":"2008","journal-title":"Proc Int'l Symp Field Programmable Custom Computing Machines (FCCM)"},{"key":"bibttc201205073211","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286701"},{"key":"bibttc201205073218","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.132"},{"key":"bibttc201205073217","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.65"},{"key":"bibttc201205073219","article-title":"FIPS 186-2, Digital Signature Standard","year":"2000","journal-title":"Fed Information Processing Standards Publication"},{"key":"bibttc20120507323","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1090\/S0025-5718-07-02048-0","article-title":"The Double-Base Number System and Its Application to Elliptic Curve Cryptography","volume":"77","author":"dimitrov","year":"2008","journal-title":"Math Computation"},{"key":"bibttc20120507322","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"bibttc20120507325","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2009.10"},{"key":"bibttc20120507324","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1007\/978-3-540-70500-0_32","article-title":"A Tree-Based Approach for Computing Double-Base Chains","author":"doche","year":"2008","journal-title":"Proc 13th Australasian Conf Information Security and Privacy (ACISP '08)"},{"key":"bibttc20120507327","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_22"},{"key":"bibttc20120507326","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.138"},{"key":"bibttc20120507329","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306223194"},{"key":"bibttc20120507328","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_24"},{"key":"bibttc20120507321","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"bibttc201205073222","doi-asserted-by":"crossref","DOI":"10.1201\/9781420034981","author":"cohen","year":"2005","journal-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography"},{"key":"bibttc201205073223","author":"washington","year":"2003","journal-title":"Elliptic Curves Number Theory and Cryptography"},{"key":"bibttc201205073220","article-title":"SEC 2: Recommended Elliptic Curve Domain Parameters","year":"2000","journal-title":"Standards for Efficient Cryptography"},{"key":"bibttc201205073221","author":"hankerson","year":"2004","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"bibttc201205073224","author":"knuth","year":"1969","journal-title":"The Art of Computer Programming Volume 2 Seminumerical Algorithms"},{"key":"bibttc201205073225","doi-asserted-by":"crossref","DOI":"10.1201\/9781439864180","author":"conway","year":"2003","journal-title":"On Quaternions and Octonions"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/12\/6173013\/05753886.pdf?arnumber=5753886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:39:31Z","timestamp":1638218371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5753886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":25,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tc.2011.87","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}