{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:44Z","timestamp":1725559304059},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262268"},{"type":"electronic","value":"9783540320838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11496618_19","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:27:32Z","timestamp":1279052852000},"page":"249-260","source":"Crossref","is-referenced-by-count":0,"title":["A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method"],"prefix":"10.1007","author":[{"given":"Yasuyuki","family":"Nogami","sequence":"first","affiliation":[]},{"given":"Yoshitaka","family":"Morikawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"19_CR1","first-page":"81","volume":"47","author":"T. Sato","year":"1998","unstructured":"Sato, T., Araki, K.: Fermat Quotients and the Polynomial Time Discrete Lot Algorithm for Anomalous Elliptic Curve. Commentarii Math. Univ. Sancti. Pauli\u00a047(1), 81\u201392 (1998)","journal-title":"Commentarii Math. Univ. Sancti. Pauli"},{"key":"19_CR2","first-page":"865","volume":"62","author":"G. Frey","year":"1994","unstructured":"Frey, G., R\u00fcck, H.: A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves. Math. Comp.\u00a062, 865\u2013874 (1994)","journal-title":"Math. Comp."},{"key":"19_CR3","unstructured":"Gaudry, P., Hess, F., Smart, N.: Constructive and destructive facets of Weil descent on elliptic curves. Hewlett Packard Tech. Report HPL-2000-10 (2000)"},{"key":"19_CR4","unstructured":"Horiuchi, K., et al.: Construction of Elliptic Curves with Prime Order and Estimation of Its Complexity. IEICE Trans. J82-A(8), 1269-1277 (1999)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-24582-7_23","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"E. Konstantinou","year":"2003","unstructured":"Konstantinou, E., Stamatiou, Y.C., Zaroliagis, C.D.: On the construction of prime order elliptic curves. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 309\u2013322. Springer, Heidelberg (2003)"},{"key":"19_CR6","unstructured":"Nogami, Y., Morikawa, Y.: Fast Generation of Elliptic Curves with Prime Order over \n                    \n                      \n                    \n                    $F_{p^{2^c}}$\n                  . In: Proc. of Workshop on Coding and Cryptography, pp. 347\u2013356 (2003)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/3-540-44709-1_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"E. Savas","year":"2001","unstructured":"Savas, E., Schmidt, T., Koc, C.: Generating Elliptic Curves of Prime Order. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 142\u2013158. Springer, Heidelberg (2001)"},{"key":"19_CR8","series-title":"LNS","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I. Blake","year":"1999","unstructured":"Blake, I., Seroussi, G., Smart, N.: Elliptic Curves in Cryptography. LNS, vol.\u00a0265. Cambridge University Press, Cambridge (1999)"},{"key":"19_CR9","unstructured":"Class polynomials of CM-fields, \n                    \n                      http:\/\/www.exp-math.uni-essen.de\/zahlentheorie\/classpol\/class.html"},{"key":"19_CR10","unstructured":"Hiramoto, T., Nogami, Y., Morikawa, Y.: A Fast Algorithm to Test Irreducibility of Cubic Polynomial over GF(P). IEICE Trans.\u00a0J84-A(5) (2000)"},{"key":"19_CR11","unstructured":"A Library for doing Number Theory, \n                    \n                      http:\/\/www.shoup.net\/ntl\/"},{"key":"19_CR12","volume-title":"Encyclopedia of Mathematics and Its Applications","author":"R. Lidl","year":"1984","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (1984)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11496618_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:40:05Z","timestamp":1619505605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11496618_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262268","9783540320838"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11496618_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}