{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:37Z","timestamp":1725475837380},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673804"},{"type":"electronic","value":"9783540455684"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_18","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T15:38:40Z","timestamp":1167493120000},"page":"221-235","source":"Crossref","is-referenced-by-count":0,"title":["A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Tetsuya","family":"Tamura","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]},{"given":"Tsutomu","family":"Matsumoto","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Agnew, G.B., Mullin, R.C., Vanstone, S.A.: An inplementation of Elliptic curve Cryptosystems Over F2 155. IEEE Jounal on selected areas in communications\u00a011(5) (1993)","DOI":"10.1109\/49.223883"},{"key":"18_CR2","unstructured":"IBM Corp., Booledozer User\u2019s Manual (1999)"},{"issue":"177","key":"18_CR3","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobians of Hyperelliptic curve. Math. Comp.\u00a048(177), 95\u2013101 (1987)","journal-title":"Math. Comp."},{"key":"18_CR4","unstructured":"IBM Corp., CMOS5SE Logic Product Data Book (1995)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-48000-6_10","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"I. Duursma","year":"1999","unstructured":"Duursma, I., Gaudry, P., Morain, F.: Speeding up the discrete log computation on curves with automorphisms. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 103\u2013121. Springer, Heidelberg (1999)"},{"key":"18_CR6","unstructured":"Enge, A.: The extended Euclidean algorithm on polynomials and the efficiency of hyperelliptic cryptosystems (1999) (preprint)"},{"issue":"206","key":"18_CR7","first-page":"865","volume":"62","author":"G. Frey","year":"1994","unstructured":"Frey, G., R\u00fcck, H.G.: A Remarkable Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves. Math. Comp\u00a062(206), 865\u2013874 (1994)","journal-title":"Math. Comp"},{"key":"18_CR8","unstructured":"Gaudry, P.: A Variant of the Adleman-DeMarris-Huang algorithm and its application to small genera. In: Conference on The Mathematics of Public Key Cryptography, Toronoto (1999)"},{"key":"18_CR9","unstructured":"Hasebe, T., Torii, T., Azuma, M., Akiyama, R.: Implementation of high speed modular exponentiation calculator, Spring National Convention Record IEICE, A-284 (1990)"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/12.368005","volume":"44","author":"K. Iwamura","year":"1995","unstructured":"Iwamura, K., Dohi, Y., Imai, H.: A design of Reed Solomon decoder with systolic array structure. IEEE Trans. Comput.\u00a044(1), 118\u2013122 (1995)","journal-title":"IEEE Trans. Comput."},{"key":"18_CR11","first-page":"31","volume":"44","author":"T. Itoh","year":"1989","unstructured":"Itoh, T., Teechai, O., Tsujii, S.: A fast algorithm for computing multiplicative inverse in GF(2t) using normal bases. J. Society for Electronic Communications(Japan)\u00a044, 31\u201336 (1989) (in Japanse)","journal-title":"J. Society for Electronic Communications(Japan)"},{"key":"18_CR12","unstructured":"Ryu, J.H., Lee, S.J.: Implementation of Euclidean calculation circuit with two way addressing method for Reed Solomon decoder. J. Inst. Electron. Eng. Korea C(South Korea)\u00a036-C(6), 37\u201343 (1999)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","first-page":"151","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"N. Koblitz","year":"1988","unstructured":"Koblitz, N.: A Family of Jacobians Suitable for Discrete Log Cryptosystems. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 151\u2013182. Springer, Heidelberg (1988)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. J. Cryptology\u00a01, 139\u2013150 (1989)","journal-title":"J. Cryptology"},{"key":"18_CR15","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, Encyclopedia of Mathematics and its application"},{"key":"18_CR16","unstructured":"Model Technology, ModelSim\/EE\/PLUS User\u2019z Manual (1997)"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0166-218X(88)90090-X","volume":"83","author":"R.C. Mullin","year":"1989","unstructured":"Mullin, R.C., Onyszhk, I.M., Vanstone, S.A.: Optimal Normal Bases in GF(pn)\u2018. Discrete Applied mathematics\u00a083(1), 149\u2013161 (1989)","journal-title":"Discrete Applied mathematics"},{"key":"18_CR18","unstructured":"IEEE\/P1363\/D11, Standard for Public-Key Cryptography, draft standard, July 29 (1999)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/BFb0030419","volume-title":"Information Security","author":"A. Satoh","year":"1997","unstructured":"Satoh, A., Kobayashi, Y., Niihima, H., Ohba, N., Munetoh, S., Sone, S.: A High-Speed Small RSA Encryption LSI with Low Power Dissipation. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol.\u00a01396, pp. 174\u2013187. Springer, Heidelberg (1997)"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0019-9958(75)90090-X","volume":"27","author":"Y. Sugiyamam","year":"1975","unstructured":"Sugiyamam, Y., Kasahara, M., Hirasawa, S., Namekawa, T.: A Method for Solving Key Equation for Deocoding Goppa Codes. Inform, And Control\u00a027, 87\u201399 (1975)","journal-title":"Inform, And Control"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-48910-X_12","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"N.P. Smart","year":"1999","unstructured":"Smart, N.P.: On the Performance of Hyperelliptic Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 165\u2013175. Springer, Heidelberg (1999)"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/BFb0054023","volume-title":"Public Key Cryptography","author":"Y. Sakai","year":"1998","unstructured":"Sakai, Y., Sakurai, K., Ishizuka, H.: Secure Hyperelliptic Cryptosysetems and Their Performance. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 164\u2013181. Springer, Heidelberg (1998)"},{"key":"18_CR23","first-page":"1307","volume":"8","author":"T. Tamura","year":"1999","unstructured":"Tamura, T., Matsumoto, T.: A Hardware\u2013Oriented Algorithm for Computing Jacobian on Hyperelliptic Curve. IEICE Trans.\u00a08, 1307\u20131311 (1999)","journal-title":"IEICE Trans."},{"key":"18_CR24","unstructured":"Torii, N., Okada, S., Hasebe, T.: A chip Implementation of elliptic curve cryptosystems. In: Proc. 1998, Engineering Science Conference, IEICE A-7-1"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:59:03Z","timestamp":1556006343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/10719994_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}