{"id":"https://openalex.org/W2008571739","doi":"https://doi.org/10.1145/968280.968354","title":"Implementation of elliptic curve cryptosystems over GF(2 n ) in optimal normal basis on a reconfigurable computer","display_name":"Implementation of elliptic curve cryptosystems over GF(2 n ) in optimal normal basis on a reconfigurable computer","publication_year":2004,"publication_date":"2004-02-22","ids":{"openalex":"https://openalex.org/W2008571739","doi":"https://doi.org/10.1145/968280.968354","mag":"2008571739"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/968280.968354","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075293951","display_name":"Sashisu Bajracharya","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sashisu Bajracharya","raw_affiliation_string":"#N#George Mason University#N#","raw_affiliation_strings":["#N#George Mason University#N#"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065301819","display_name":"Chang Shu","orcid":"https://orcid.org/0000-0002-3401-4684"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chang Shu","raw_affiliation_string":"#N#George Mason University#N#","raw_affiliation_strings":["#N#George Mason University#N#"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004924763","display_name":"Kris Gaj","orcid":"https://orcid.org/0000-0002-5050-8748"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kris Gaj","raw_affiliation_string":"#N#George Mason University#N#","raw_affiliation_strings":["#N#George Mason University#N#"]},{"author_position":"last","author":{"id":"https://openalex.org/A5001914825","display_name":"Tarek El\u2010Ghazawi","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tarek El-Ghazawi","raw_affiliation_string":"The George Washington University","raw_affiliation_strings":["The George Washington University"]}],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":false,"cited_by_count":10,"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.9843,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9736,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"elliptic curve cryptosystems","score":0.7005},{"keyword":"optimal normal basis","score":0.3792},{"keyword":"implementation","score":0.29}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7273344},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.5344524},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.5293428},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.50908726},{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.5053261},{"id":"https://openalex.org/C96324660","wikidata":"https://www.wikidata.org/wiki/Q205446","display_name":"Dataflow","level":2,"score":0.46356994},{"id":"https://openalex.org/C2780728072","wikidata":"https://www.wikidata.org/wiki/Q5297","display_name":"Microprocessor","level":2,"score":0.44689494},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.38619405},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3753491},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15479541},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/968280.968354","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W1509224204","https://openalex.org/W1522228241","https://openalex.org/W1950989567","https://openalex.org/W2142367315"],"related_works":["https://openalex.org/W4298209657","https://openalex.org/W2408633203","https://openalex.org/W3030775256","https://openalex.org/W2951901236","https://openalex.org/W2066709282","https://openalex.org/W2067628956","https://openalex.org/W148359017","https://openalex.org/W1537065876","https://openalex.org/W120075083","https://openalex.org/W2801341723"],"ngrams_url":"https://api.openalex.org/works/W2008571739/ngrams","abstract_inverted_index":{"During":[0],"the":[1,12,22,81,87,93,105,108,117,127,133,141,148],"last":[2],"few":[3],"years,":[4],"a":[5],"considerable":[6],"effort":[7],"has":[8,103],"been":[9,40],"devoted":[10],"to":[11,47,137,140],"development":[13],"of":[14,25,36,65,80,99,107,116],"reconfigurable":[15,83,101],"computers,":[16],"machines":[17,35],"that":[18],"are":[19,144],"based":[20],"on":[21,86,147],"close":[23],"interoperation":[24],"traditional":[26],"microprocessors":[27],"and":[28,42,96,121],"Field":[29],"Programmable":[30],"Gate":[31],"Arrays.":[32],"Several":[33],"prototype":[34],"this":[37,58,100],"type":[38],"have":[39],"designed,":[41],"demonstrated":[43,145],"significant":[44],"speed-ups":[45,131],"compared":[46,139],"conventional":[48],"workstations":[49],"for":[50],"computationally":[51],"intensive":[52],"problems,":[53],"such":[54],"as":[55],"codebreaking.":[56],"In":[57],"paper,":[59],"we":[60],"demonstrate":[61],"an":[62],"efficient":[63],"implementation":[64,143],"Elliptic":[66],"Curve":[67],"scalar":[68],"multiplication":[69],"over":[70],"GF(2":[71],"n":[72],")":[73],"in":[74,126,132],"Optimal":[75],"Normal":[76],"Basis,":[77],"using":[78],"one":[79],"leading":[82],"computers":[84],"available":[85],"market,":[88],"SRC-6E.":[89],"We":[90],"show":[91],"how":[92],"hardware":[94],"architecture":[95],"programming":[97],"model":[98],"computer":[102],"influenced":[104],"choice":[106],"optimum":[109],"program":[110],"partitioning":[111,150],"scheme.":[112,151],"The":[113,129],"detailed":[114],"analysis":[115],"control,":[118],"data":[119],"transfer,":[120],"reconfiguration":[122],"overheads":[123],"is":[124],"given":[125],"paper.":[128],"end-to-end":[130],"range":[134],"from":[135],"895":[136],"1300":[138],"microprocessor":[142],"depending":[146],"chosen":[149]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2008571739","counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2024-03-26T19:00:47.112818","created_date":"2016-06-24"}