{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:36Z","timestamp":1725559296733},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540262268"},{"type":"electronic","value":"9783540320838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11496618_22","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:27:32Z","timestamp":1279052852000},"page":"296-312","source":"Crossref","is-referenced-by-count":2,"title":["Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors"],"prefix":"10.1007","author":[{"given":"Masanobu","family":"Katagi","sequence":"first","affiliation":[]},{"given":"Toru","family":"Akishita","sequence":"additional","affiliation":[]},{"given":"Izuru","family":"Kitamura","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-45238-6_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R. Avanzi","year":"2003","unstructured":"Avanzi, R.: Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 366\u2013381. Springer, Heidelberg (2003)"},{"issue":"177","key":"22_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D. Cantor","year":"1987","unstructured":"Cantor, D.: Computing in the Jacobian of a Hyperelliptic Curve. Mathematics of Computation\u00a048(177), 95\u2013101 (1987)","journal-title":"Mathematics of Computation"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"22_CR4","unstructured":"GMP, GNU MP Library GMP, http:\/\/www.swox.com\/gmp"},{"key":"22_CR5","unstructured":"Harley, R.: Adding.text (2000), http:\/\/cristal.inria.fr\/~harley\/hyper\/"},{"key":"22_CR6","unstructured":"Harley, R.: Doubling.c (2000), http:\/\/cristal.inria.fr\/~harley\/hyper\/"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Katagi, M., Kitamura, I., Akishita, T., Takagi, T.: Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors. Cryptology ePrint Archive, 2003\/203, IACR (2004)","DOI":"10.1007\/978-3-540-31815-6_28"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology 1, 139\u2013150 (1989)","DOI":"10.1007\/BF02252872"},{"key":"22_CR9","unstructured":"Lange, T.: Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae. Cryptology ePrint Archive, 2002\/121, IACR (2002)"},{"key":"22_CR10","unstructured":"MAGMA: The Magma Computational Algebra System for Algebra, Number Theory and Geometry, http:\/\/magma.maths.usyd.edu.au\/magma\/"},{"key":"22_CR11","volume-title":"Tata Lectures on Theta II","author":"D. Mumford","year":"1984","unstructured":"Mumford, D.: Tata Lectures on Theta II. Progress in Mathematics vol. 43. Birkh\u00e4user, Basel (1984)"},{"key":"22_CR12","unstructured":"Matsuo, K., Chao, J., Tsuji, S.: Fast Genus Two Hyperelliptic Curve Cryptosystems. Technical Report ISEC2001-31, IEICE Japan, pp. 89\u201396 (2001)"},{"key":"22_CR13","unstructured":"Menezes, A., Wu, Y., Zuccherato, R.: An Elementary Introduction to Hyperelliptic Curves. Technical Report CORR 96-19 (1996), http:\/\/www.cacr.math.uwaterloo.ca\/"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/10722028_28","volume-title":"Algorithmic Number Theory","author":"N. Nagao","year":"2000","unstructured":"Nagao, N.: Improving Group Law Algorithms for Jacobians of Hyperelliptic Curves. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 439\u2013448. Springer, Heidelberg (2000)"},{"key":"22_CR15","unstructured":"NTL: A Library for Doing Number Theory, http:\/\/www.shoup.net\/ntl"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36563-X_23","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"K. Okeya","year":"2003","unstructured":"Okeya, K., Takagi, T.: The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 328\u2013343. Springer, Heidelberg (2003)"},{"key":"22_CR17","unstructured":"Pelzl, J.: Hyperelliptic Cryptosystems on Embedded Microprocessors. Diploma Thesis, R\u00fchr-Universit\u00e4t Bochum (2002)"},{"key":"22_CR18","unstructured":"Sugizaki, T., Matsuo, K., Chao, J., Tsujii, S.: An Extension of Harley Addition Algorithm for Hyperelliptic Curves over Finite Fields of Characteristic Two. Technical Report ISEC2002-9, IEICE, pp. 49\u201356 (2002)"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-45708-9_24","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"F. Vercauteren","year":"2002","unstructured":"Vercauteren, F.: Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 369\u2013384. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11496618_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:00:17Z","timestamp":1605643217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11496618_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540262268","9783540320838"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11496618_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}