{"id":"https://openalex.org/W2943126371","doi":"https://doi.org/10.1109/tvlsi.2019.2905899","title":"High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves","display_name":"High-Speed Implementation of ECC Scalar Multiplication in GF(p) for Generic Montgomery Curves","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2943126371","doi":"https://doi.org/10.1109/tvlsi.2019.2905899","mag":"2943126371"},"language":"en","primary_location":{"id":"doi:10.1109/tvlsi.2019.2905899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2019.2905899","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102710760","display_name":"Debapriya Basu Roy","orcid":"https://orcid.org/0000-0003-4664-5237"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Debapriya Basu Roy","raw_affiliation_strings":["Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078971402","display_name":"Debdeep Mukhopadhyay","orcid":"https://orcid.org/0000-0002-6499-8346"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debdeep Mukhopadhyay","raw_affiliation_strings":["Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, IIT Kharagpur, Kharagpur, India","institution_ids":["https://openalex.org/I145894827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102710760"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":8.4788,"has_fulltext":false,"cited_by_count":60,"citation_normalized_percentile":{"value":0.97615813,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"27","issue":"7","first_page":"1587","last_page":"1600"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9351000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9312000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.9466844201087952},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7749816179275513},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6715233325958252},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.6162752509117126},{"id":"https://openalex.org/keywords/elliptic-curve-point-multiplication","display_name":"Elliptic curve point multiplication","score":0.6151515245437622},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.5473924875259399},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.5110853910446167},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5034472346305847},{"id":"https://openalex.org/keywords/edwards-curve","display_name":"Edwards curve","score":0.47304767370224},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4553960859775543},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4366990029811859},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4276539385318756},{"id":"https://openalex.org/keywords/hessian-form-of-an-elliptic-curve","display_name":"Hessian form of an elliptic curve","score":0.41407838463783264},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.34543341398239136},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2348296344280243},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.17488273978233337},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10466670989990234},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10349082946777344},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.07375678420066833}],"concepts":[{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.9466844201087952},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7749816179275513},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6715233325958252},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.6162752509117126},{"id":"https://openalex.org/C117121985","wikidata":"https://www.wikidata.org/wiki/Q78380999","display_name":"Elliptic curve point multiplication","level":3,"score":0.6151515245437622},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5473924875259399},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.5110853910446167},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5034472346305847},{"id":"https://openalex.org/C92727272","wikidata":"https://www.wikidata.org/wiki/Q3001190","display_name":"Edwards curve","level":5,"score":0.47304767370224},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4553960859775543},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4366990029811859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4276539385318756},{"id":"https://openalex.org/C104993295","wikidata":"https://www.wikidata.org/wiki/Q17023345","display_name":"Hessian form of an elliptic curve","level":5,"score":0.41407838463783264},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.34543341398239136},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2348296344280243},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.17488273978233337},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10466670989990234},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10349082946777344},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.07375678420066833}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvlsi.2019.2905899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvlsi.2019.2905899","pdf_url":null,"source":{"id":"https://openalex.org/S37538908","display_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","issn_l":"1063-8210","issn":["1063-8210","1557-9999"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321024","display_name":"Defence Research and Development Organisation","ror":"https://ror.org/05k37v296"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W79711112","https://openalex.org/W179459262","https://openalex.org/W381144302","https://openalex.org/W1498685334","https://openalex.org/W1531476167","https://openalex.org/W1923580562","https://openalex.org/W1990220158","https://openalex.org/W2004814164","https://openalex.org/W2021211179","https://openalex.org/W2033770849","https://openalex.org/W2038977209","https://openalex.org/W2054466230","https://openalex.org/W2078731783","https://openalex.org/W2080546540","https://openalex.org/W2111010659","https://openalex.org/W2111793257","https://openalex.org/W2143108881","https://openalex.org/W2170342361","https://openalex.org/W2199175040","https://openalex.org/W2495331295","https://openalex.org/W2544689054","https://openalex.org/W2556839132","https://openalex.org/W2572306028","https://openalex.org/W2594174595","https://openalex.org/W2731579764","https://openalex.org/W2763130919","https://openalex.org/W2808727944","https://openalex.org/W2810693120","https://openalex.org/W2900771846","https://openalex.org/W2905462114","https://openalex.org/W4237773356","https://openalex.org/W6629789561","https://openalex.org/W6640182360","https://openalex.org/W6729852372","https://openalex.org/W6732416118"],"related_works":["https://openalex.org/W1970936073","https://openalex.org/W1763830924","https://openalex.org/W2390491088","https://openalex.org/W2385005755","https://openalex.org/W1521649858","https://openalex.org/W797510896","https://openalex.org/W2522560446","https://openalex.org/W2347341077","https://openalex.org/W2185182631","https://openalex.org/W2161958080"],"abstract_inverted_index":{"Elliptic":[0],"curve-based":[1],"cryptography":[2,12],"(ECC)":[3],"has":[4,36],"become":[5],"the":[6,41,114,125],"automatic":[7],"choice":[8],"for":[9,53,101],"public":[10],"key":[11],"due":[13],"to":[14,18,92,153],"its":[15,33],"lightweightness":[16],"compared":[17],"Rivest-Shamir-Adleman":[19],"(RSA).":[20],"The":[21,147],"most":[22],"important":[23],"operation":[24],"in":[25,40,60,79,106,109,137,158],"ECC":[26,47,76,98,127,155],"is":[27,50,131],"elliptic":[28],"curve":[29,105],"scalar":[30,48,77,99,128,135,156],"multiplication,":[31],"and":[32,66,161],"efficient":[34],"implementation":[35,45,96],"gathered":[37],"significant":[38],"attention":[39],"research":[42],"community.":[43],"Fast":[44],"of":[46,97,116],"multiplication":[49,78,100,129,136,157],"often":[51],"desired":[52],"speed-critical":[54],"applications":[55],"such":[56],"as":[57,132,134],"runtime":[58],"authentication":[59],"automated":[61],"cars,":[62],"web":[63],"server":[64],"certification,":[65],"so":[67],"on.":[68],"Such":[69],"fast":[70,95,133],"architectures":[71],"are":[72],"achieved":[73],"by":[74],"implementing":[75],"fields":[80],"with":[81,143],"pseudo-Mersenne":[82],"prime":[83],"or":[84],"Solinas":[85],"prime.":[86],"In":[87],"this":[88],"paper,":[89],"we":[90],"aim":[91],"implement":[93],"a":[94],"any":[102,118],"generic":[103],"Montgomery":[104,160],"Galois":[107],"Field":[108],"p":[110],"[GF(p)]":[111],"without":[112],"having":[113],"constraint":[115],"using":[117],"specialized":[119],"modulus.":[120],"We":[121],"will":[122],"show":[123],"that":[124],"proposed":[126,148],"architecture":[130,149],"special":[138],"curves":[139],"like":[140],"Curve25519,":[141],"albeit":[142],"little":[144],"area":[145],"overhead.":[146],"can":[150],"be":[151],"modified":[152],"support":[154],"both":[159],"short":[162],"Weierstrass":[163],"curves.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
