{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T08:00:04Z","timestamp":1776844804457,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540306849","type":"print"},{"value":"9783540322672","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593447_2","type":"book-chapter","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T06:37:16Z","timestamp":1132036636000},"page":"21-40","source":"Crossref","is-referenced-by-count":26,"title":["Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?"],"prefix":"10.1007","author":[{"given":"David","family":"Jao","sequence":"first","affiliation":[]},{"given":"Stephen D.","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Ramarathnam","family":"Venkatesan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"2_CR1","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1002\/rsa.3240050203","volume":"5","author":"N. Alon","year":"1994","unstructured":"Alon, N., Roichman, Y.: Random Cayley graphs and expanders. Random Structures Algorithms\u00a05(2), 271\u2013284 (1994)","journal-title":"Random Structures Algorithms"},{"issue":"216","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1090\/S0025-5718-96-00763-6","volume":"65","author":"E. Bach","year":"1996","unstructured":"Bach, E., Sorenson, J.: Explicit bounds for primes in residue classes. Math. Comp.\u00a065(216), 1717\u20131735 (1996)","journal-title":"Math. Comp."},{"key":"2_CR3","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic curves in cryptography. London Mathematical Society. Lecture Note Series, vol.\u00a0265. Cambridge University Press, Cambridge (2000)"},{"key":"2_CR4","unstructured":"Cox, D.A.: Primes of the form x2 + ny2. A Wiley-Interscience Publication. John Wiley & Sons Inc. (1989)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Davidoff, G., Sarnak, P., Valette, A.: Elementary number theory, group theory, and Ramanujan graphs. London Mathematical Society Student Texts, vol.\u00a055. Cambridge University Press, Cambridge (2003)","DOI":"10.1017\/CBO9780511615825"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Deligne, P., conjecture de weil I, L.: Inst. Hautes \u00c9tudes Sci. Publ. Math.\u00a043, 273\u2013307 (1974) (French)","DOI":"10.1007\/BF02684373"},{"issue":"4","key":"2_CR7","doi-asserted-by":"crossref","first-page":"507","DOI":"10.24033\/asens.1277","volume":"7","author":"P. Deligne","year":"1974","unstructured":"Deligne, P., Serre, J.-P.: Formes modulaires de poids 1. Ann. Sci. \u00c9cole Norm. Sup.\u00a07(4), 507\u2013530 (1974); (1975) (French)","journal-title":"Ann. Sci. \u00c9cole Norm. Sup."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Deuring, M., Typen der, D.: Multiplikatorenringe elliptischer Funktionenk\u00f6rper. Abh. Math. Sem. Hansischen Univ.\u00a014, 197\u2013272 (1941) (German)","DOI":"10.1007\/BF02940746"},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/BF01898377","volume":"5","author":"M. Eichler","year":"1954","unstructured":"Eichler, M.: Quatern\u00e4re quadratische Formen und die Riemannsche Vermutung f\u00fcr die Kongruenzzetafunktion. Arch. Math.\u00a05, 355\u2013366 (1954) (German)","journal-title":"Arch. Math."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Fouquet, M., Morain, F.: Isogeny volcanoes and the SEA algorithm. Algorithmic number theory, 276\u2013291 (Sydney, 2002)","DOI":"10.1007\/3-540-45455-1_23"},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1112\/S1461157000000097","volume":"2","author":"S.D. Galbraith","year":"1999","unstructured":"Galbraith, S.D.: Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math.\u00a02, 118\u2013138 (1999)(electronic)","journal-title":"LMS J. Comput. Math."},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-46035-7_3","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"S.D. Galbraith","year":"2002","unstructured":"Galbraith, S.D., Hess, F., Smart, N.P.: Extending the GHS weil descent attack. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 29\u201344. Springer, Heidelberg (2002)"},{"issue":"1","key":"2_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-001-0011-x","volume":"15","author":"P. Gaudry","year":"2002","unstructured":"Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptology\u00a015(1), 19\u201346 (2002)","journal-title":"J. Cryptology"},{"issue":"1","key":"2_CR14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1090\/S0273-0979-03-00995-9","volume":"41","author":"S.S. Gelbart","year":"2004","unstructured":"Gelbart, S.S., Miller, S.D.: Riemann\u2019s zeta function and beyond. Bull. Amer. Math. Soc (N.S.)\u00a041(1), 59\u2013112 (2004) (electronic)","journal-title":"Bull. Amer. Math. Soc (N.S.)"},{"key":"2_CR15","unstructured":"Gross, B.H.: Heights and the special values of L-series. Number theory (Montreal, Que., 1985), 115\u2013187 (1987)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet key exchange (IKE), Technical Report IETF RFC 2409 (November 1998), http:\/\/www.ietf.org\/rfc\/rfc2409.txt","DOI":"10.17487\/rfc2409"},{"key":"2_CR17","first-page":"453","volume":"81","author":"J.-i. Igusa","year":"1959","unstructured":"Igusa, J.-i.: Fibre systems of Jacobian varieties. III. Fibre systems of elliptic curves, Amer. J. Math.\u00a081, 453\u2013476 (1959)","journal-title":"Fibre systems of elliptic curves, Amer. J. Math."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Ihara, Y.: Discrete subgroups of PL(2; k), Algebraic Groups and Discontinuous Subgroups. In: Proc. Sympos. Pure Math., Boulder, Colo., 1965, pp. 272\u2013278 (1966)","DOI":"10.1090\/pspum\/009\/0205952"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Iwaniec, H.: Topics in classical automorphic forms, Graduate Studies in Mathematics. American Mathematical Society, Providence, RI, \u00a017 (1997)","DOI":"10.1090\/gsm\/017"},{"key":"2_CR20","volume-title":"Analytic number theory","author":"H. Iwaniec","year":"2004","unstructured":"Iwaniec, H., Kowalski, E.: Analytic number theory, vol.\u00a053. American Mathematical Society Colloquium Publications, Providence (2004)"},{"key":"2_CR21","first-page":"235","volume":"37","author":"M. Jerrum","year":"1988","unstructured":"Jerrum, M., Sinclair, A.: Conductance and the rapid mixing property for Markov chains: the approximation of permanent resolved. ACM Symposium on Theory of Computing\u00a037, 235\u2013243 (May 1988)","journal-title":"ACM Symposium on Theory of Computing"},{"issue":"177","key":"2_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comp.\u00a048(177), 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"2_CR23","unstructured":"Kohel, D.: Endomorphism rings of elliptic curves over finite fields, University of California, Berkeley, Ph.D thesis (1996)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Lang, S.: Elliptic functions. In: Graduate Texts in Mathematics, 2nd edn., vol.\u00a0112, Springer, New York (1987), With an appendix by J. Tate","DOI":"10.1007\/978-1-4612-4752-4"},{"issue":"3","key":"2_CR25","doi-asserted-by":"crossref","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H.W. Lenstra","year":"1987","unstructured":"Lenstra Jr., H.W.: Factoring integers with elliptic curves. Ann. of Math (2),\u00a0126(3), 649\u2013673 (1987)","journal-title":"Ann. of Math (2)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Lercier, R.: Computing isogenies in F2n. Algorithmic number theory (Talence, 1996), 197\u2013212 (1996)","DOI":"10.1007\/3-540-61581-4_55"},{"key":"2_CR27","unstructured":"Lercier, R., Morain, F.: Algorithms for computing isogenies between elliptic curves. In: Computational perspectives on number theory, Chicago, IL, 1995, pp. 77\u201396 (1998)"},{"key":"2_CR28","volume-title":"Progress in Mathematics","author":"A. Lubotzky","year":"1994","unstructured":"Lubotzky, A.: Discrete groups, expanding graphs and invariant measures. In: Progress in Mathematics, vol.\u00a0125, Birkh\u00e4user Verlag, Basel (1994)"},{"issue":"3","key":"2_CR29","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/BF02126799","volume":"8","author":"A. Lubotzky","year":"1988","unstructured":"Lubotzky, A., Phillips, R., Sarnak, P.: Ramanujan graphs. Combinatorica\u00a08(3), 261\u2013277 (1988)","journal-title":"Combinatorica"},{"issue":"5","key":"2_CR30","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory\u00a039(5), 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"#cr-split#-2_CR31.1","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press Series on Discrete Mathematics and its Applications. CRC Press, Boca Raton (1997);"},{"key":"#cr-split#-2_CR31.2","unstructured":"With a foreword by Ronald L. Rivest"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-24660-2_28","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"A. Menezes","year":"2004","unstructured":"Menezes, A., Teske, E., Weng, A.: Weak fields for ECC. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 366\u2013386. Springer, Heidelberg (2004)"},{"key":"2_CR33","unstructured":"Mestre, J.-F.: La m\u00e9thode des graphes. Exemples et applications. In: Proceedings of the international conference on class numbers and fundamental units of algebraic number fields, Katata, pp. 217\u2013242 (1986) (French)"},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"#cr-split#-2_CR35.1","doi-asserted-by":"crossref","unstructured":"Ram Murty, M.: Problems in analytic number theory, Graduate Texts in Mathematics, vol.??206. Springer, New York (2001);","DOI":"10.1007\/978-1-4757-3441-6"},{"key":"#cr-split#-2_CR35.2","unstructured":"Readings in Mathematics"},{"key":"2_CR36","unstructured":"National Institute of Standards and Technology, Digital Signature Standard (DSS), Technical Report FIPS PUB 186\u20132 (January 2000), http:\/\/csrc.nist.gov\/publications\/fips\/"},{"issue":"1","key":"2_CR37","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1090\/S0273-0979-1990-15918-X","volume":"23","author":"A.K. Pizer","year":"1990","unstructured":"Pizer, A.K.: Ramanujan graphs and Hecke operators. Bull. Amer. Math. Soc (N.S.)\u00a023(1), 127\u2013137 (1990)","journal-title":"Bull. Amer. Math. Soc. (N.S.)"},{"key":"2_CR38","unstructured":"Pizer, A.K.: Ramanujan graphs. In: Computational perspectives on number theory, Chicago, IL, 1995, pp. 159\u2013178 (1998)"},{"issue":"2","key":"2_CR39","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1215\/S0012-7094-96-08115-6","volume":"81","author":"Z. Rudnick","year":"1996","unstructured":"Rudnick, Z., Sarnak, P.: Zeros of principal L-functions and random matrix theory. Duke Math. J.\u00a081(2), 269\u2013322 (1996); A celebration of John F. Nash, Jr.","journal-title":"Duke Math. J."},{"key":"2_CR40","series-title":"Cambridge Tracts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511895593","volume-title":"Some applications of modular forms","author":"P. Sarnak","year":"1990","unstructured":"Sarnak, P.: Some applications of modular forms. Cambridge Tracts in Mathematics, vol.\u00a099. Cambridge University Press, Cambridge (1990)"},{"key":"2_CR41","unstructured":"Serre, J.-P.: Abelian l-adic representations and elliptic curves. In: Kuyk, W., Labute, J. (eds.) McGill University lecture notes written with the collaboration, W. A. Benjamin, Inc., New York (1968)"},{"key":"2_CR42","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0851-8","volume-title":"The arithmetic of elliptic curves","author":"J.H. Silverman","year":"1994","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves. Graduate Texts in Mathematics, vol.\u00a0106. Springer, New York (1994)"},{"key":"2_CR43","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/BF01404549","volume":"2","author":"J. Tate","year":"1966","unstructured":"Tate, J.: Endomorphisms of abelian varieties over finite fields. Invent. Math.\u00a02, 134\u2013144 (1966)","journal-title":"Invent. Math."},{"key":"#cr-split#-2_CR44.1","unstructured":"Tenenbaum, G.: Introduction to analytic and probabilistic number theory. Cambridge Studies in Advanced Mathematics, vol.??46. Cambridge University Press, Cambridge (1995);"},{"key":"#cr-split#-2_CR44.2","unstructured":"Translated from the second French edition (1995) by C. B. Thomas"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Teske, E.: An elliptic curve trapdoor system (extended abstract). In: High primes and misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams, pp. 341\u2013352 (2004)","DOI":"10.1090\/fic\/041\/27"},{"key":"2_CR46","unstructured":"Washington, L.C.: Elliptic curves, Discrete Mathematics and its Applications. Chapman & Hall\/CRC (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - ASIACRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593447_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:45Z","timestamp":1619506305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593447_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540306849","9783540322672"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/11593447_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}