{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:45:53Z","timestamp":1764841553437},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_6","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"59-73","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance"],"prefix":"10.1007","author":[{"given":"Yasuyuki","family":"Sakai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Math.\u00a07, 385\u2013434 (1986)","journal-title":"Advances in Applied Math."},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027, 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/BFb0052247","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J. Guajardo","year":"1997","unstructured":"Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 342\u2013356. Springer, Heidelberg (1997)"},{"key":"6_CR5","unstructured":"Han, Y., Tan, P.C.: Direct Computation for Elliptic Curve Cryptosystems. In: Pre-proceedings of CHES 1999, pp. 328\u2013340. Springer, Heidelberg (1999)"},{"key":"6_CR6","unstructured":"IEEE P1363\/D11 (Draft Version 11) (1999), http:\/\/grouper.ieee.org\/groups\/1363\/"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-48059-5_7","volume-title":"Cryptographic Hardware and Embedded Systems","author":"K. Itoh","year":"1999","unstructured":"Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast Implementation of Public-key Cryptography on a DSP TMS320C6201. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 61\u201372. Springer, Heidelberg (1999)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-48071-4_25","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"K. Koyama","year":"1993","unstructured":"Koyama, K., Tsuruoka, Y.: Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 345\u2013357. Springer, Heidelberg (1993)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"227","DOI":"10.2307\/2302607","volume":"45","author":"D.H. Lehmer","year":"1938","unstructured":"Lehmer, D.H.: Euclid\u2019s Algorithm for Large Numbers. American Mathematical Monthly\u00a045, 227\u2013233 (1938)","journal-title":"American Mathematical Monthly"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Ono, T., Cohen, H.: Efficient Elliptic Curve Exponentiation (I). Technical Report of IEICE, ISEC97-16 (1997)","DOI":"10.1007\/BFb0028484"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/BFb0028484","volume-title":"Information and Communications Security","author":"A. Miyaji","year":"1997","unstructured":"Miyaji, A., Ono, T., Cohen, H.: Efficient Elliptic Curve Exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 282\u2013290. Springer, Heidelberg (1997)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"M\u00fcller, V.: Efficient Algorithms for Multiplication on Elliptic Curves, Proceedings of GI-Arbeitskonferenz Chipkarten 1998, TU M\u00fcnchen (1998)","DOI":"10.1007\/978-3-322-89203-4_13"},{"key":"6_CR15","unstructured":"Nist, Recommended Elliptic Curves for Federal Government Use (1999), http:\/\/csrc.nist.gov\/encryption\/"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J.A. Solinas","year":"1997","unstructured":"Solinas, J.A.: An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 357\u2013371. Springer, Heidelberg (1997)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0054867","volume-title":"Algorithmic Number Theory","author":"E. Win De","year":"1998","unstructured":"De Win, E., Mister, S., Preneel, B., Wiener, M.: On the Performance of Signature Schemes Based on Elliptic Curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 252\u2013266. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:42:05Z","timestamp":1556005325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/10718964_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}