{"id":"https://openalex.org/W1487765632","doi":"https://doi.org/10.1109/asap.2003.1212867","title":"A cryptographic processor for arbitrary elliptic curves over GF(2/sup m/)","display_name":"A cryptographic processor for arbitrary elliptic curves over GF(2/sup m/)","publication_year":2004,"publication_date":"2004-03-02","ids":{"openalex":"https://openalex.org/W1487765632","doi":"https://doi.org/10.1109/asap.2003.1212867","mag":"1487765632"},"language":"en","primary_location":{"id":"doi:10.1109/asap.2003.1212867","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2003.1212867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010448368","display_name":"Hans Eberle","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"H. Eberle","raw_affiliation_strings":["Sun MicroSystems Laboratories, Inc., USA","Sun Microsystems Labs, USA"],"affiliations":[{"raw_affiliation_string":"Sun MicroSystems Laboratories, Inc., USA","institution_ids":[]},{"raw_affiliation_string":"Sun Microsystems Labs, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064711571","display_name":"Nils Gura","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"N. Gura","raw_affiliation_strings":["Sun MicroSystems Laboratories, Inc., USA","Sun Microsystems Labs, USA"],"affiliations":[{"raw_affiliation_string":"Sun MicroSystems Laboratories, Inc., USA","institution_ids":[]},{"raw_affiliation_string":"Sun Microsystems Labs, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045315144","display_name":"S. Chang-Shantz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Chang-Shantz","raw_affiliation_strings":["Sun MicroSystems Laboratories, Inc., USA","Sun Microsystems Labs, USA"],"affiliations":[{"raw_affiliation_string":"Sun MicroSystems Laboratories, Inc., USA","institution_ids":[]},{"raw_affiliation_string":"Sun Microsystems Labs, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010448368"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.0472,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.97777315,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"444","last_page":"454"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.6938798427581787},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.6798982620239258},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5899890661239624},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5767042636871338},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5596652030944824},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5222973823547363},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.4453568756580353},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4226621985435486},{"id":"https://openalex.org/keywords/multiplier","display_name":"Multiplier (economics)","score":0.4103528559207916},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3816187381744385},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3483835458755493},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2861199975013733},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2167191207408905}],"concepts":[{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.6938798427581787},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.6798982620239258},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5899890661239624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5767042636871338},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5596652030944824},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5222973823547363},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.4453568756580353},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4226621985435486},{"id":"https://openalex.org/C124584101","wikidata":"https://www.wikidata.org/wiki/Q1053266","display_name":"Multiplier (economics)","level":2,"score":0.4103528559207916},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3816187381744385},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3483835458755493},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2861199975013733},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2167191207408905},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asap.2003.1212867","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2003.1212867","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1480030470","https://openalex.org/W1522228241","https://openalex.org/W1540945387","https://openalex.org/W1860992226","https://openalex.org/W1947125001","https://openalex.org/W1964845253","https://openalex.org/W1978098791","https://openalex.org/W1999560184","https://openalex.org/W2139192386","https://openalex.org/W2139813613","https://openalex.org/W2142957041","https://openalex.org/W2174877860","https://openalex.org/W6628732546","https://openalex.org/W6639397524","https://openalex.org/W6640958130"],"related_works":["https://openalex.org/W2140559439","https://openalex.org/W3209695433","https://openalex.org/W2073022907","https://openalex.org/W4226124392","https://openalex.org/W2046336796","https://openalex.org/W2253722317","https://openalex.org/W2161198480","https://openalex.org/W2556839132","https://openalex.org/W2125631000","https://openalex.org/W2188670157"],"abstract_inverted_index":{"We":[0,172],"describe":[1],"a":[2,61,95,123,174,181,224],"cryptographic":[3],"processor":[4,37,64,146],"for":[5,41,102,108,118,199,211,236,248],"elliptic":[6,42],"curve":[7,59],"cryptography":[8],"(ECC).":[9],"ECC":[10],"is":[11,65,105,197,209,230],"evolving":[12],"as":[13,22,82,86,88,162],"an":[14],"attractive":[15],"alternative":[16],"to":[17,52,94,115,184,190],"other":[18,53,90],"public-key":[19],"schemes":[20],"such":[21],"RSA":[23],"by":[24,84,122],"offering":[25],"the":[26,31,109,159,165,168,186,192,206],"smallest":[27],"key":[28],"size":[29],"and":[30,154,205,242],"highest":[32],"strength":[33],"per":[34,234,246],"bit.":[35],"The":[36,156,216],"performs":[38],"point":[39,169,232,244],"multiplication":[40,170,193],"curves":[43,70,81,92,104,133,204,238,250],"over":[44,239,251],"binary":[45],"polynomial":[46],"fields":[47],"GF(2/sup":[48,240,252],"m/).":[49],"In":[50],"contrast":[51],"designs":[54],"that":[55,113,179],"only":[56],"support":[57,101],"one":[58],"at":[60,142,223],"time,":[62],"our":[63,219],"capable":[66],"of":[67,98,125,167,202,213,218,227],"handling":[68],"arbitrary":[69,103],"without":[71],"requiring":[72],"reconfiguration.":[73],"More":[74],"specifically,":[75],"it":[76,163],"can":[77],"handle":[78,116],"both":[79],"named":[80,203,237],"standardized":[83],"NIST":[85],"well":[87],"any":[89],"generic":[91,214,249],"up":[93],"field":[96],"degree":[97],"255.":[99],"Efficient":[100],"particularly":[106],"important":[107],"targeted":[110],"server":[111],"applications":[112],"need":[114],"requests":[117,130],"secure":[119],"connections":[120],"generated":[121],"multitude":[124],"heterogeneous":[126],"client":[127],"devices.":[128],"Such":[129],"may":[131],"specify":[132],"which":[134],"are":[135],"infrequently":[136],"used":[137,198],"or":[138],"not":[139],"even":[140],"known":[141],"implementation":[143],"time.":[144],"Our":[145],"implements":[147],"256":[148],"bit":[149],"modular":[150,177],"multiplication,":[151],"division,":[152],"addition":[153],"squaring.":[155],"multiplier":[157,178,207],"constitutes":[158],"core":[160],"function":[161],"executes":[164],"bulk":[166],"algorithm.":[171],"present":[173],"novel":[175],"digit-serial":[176],"uses":[180],"hybrid":[182],"architecture":[183],"perform":[185],"reduction":[187,201,212],"operation":[188],"needed":[189],"reduce":[191],"result:":[194],"hardwired":[195],"logic":[196],"fast":[200],"circuit":[208],"reused":[210],"curves.":[215],"performance":[217],"FPGA-based":[220],"prototype,":[221],"running":[222],"clock":[225],"frequency":[226],"66.4":[228],"MHz,":[229],"6955":[231],"multiplications":[233,245],"second":[235,247],"163/)":[241],"3308":[243],"163/).":[253]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
