{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T09:34:01Z","timestamp":1773221641892,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540308058","type":"print"},{"value":"9783540322788","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596219_32","type":"book-chapter","created":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T13:34:33Z","timestamp":1131716073000},"page":"403-416","source":"Crossref","is-referenced-by-count":4,"title":["SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2"],"prefix":"10.1007","author":[{"given":"Tanja","family":"Lange","sequence":"first","affiliation":[]},{"given":"Pradeep Kumar","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","volume-title":"The Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"R. Avanzi","year":"2005","unstructured":"Avanzi, R., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: The Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-45238-6_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R.M. Avanzi","year":"2003","unstructured":"Avanzi, R.M.: Countermeasures Against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 366\u2013381. Springer, Heidelberg (2003)"},{"key":"32_CR3","unstructured":"Bertoni, G., Breveglieri, L., Wollinger, T., Paar, C.: Hyperelliptic Curve Cryptosystem: What is the Best Parallel Hardware Architecture. In: Embedded Cryptographic Hardware: Design and Security. Nova Science Publishers (2004)"},{"key":"32_CR4","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic curves in cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic curves in cryptography. London Mathematical Society Lecture Note Series, vol.\u00a0265. Cambridge University Press, Cambridge (1999)"},{"key":"32_CR5","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570","volume-title":"Advances in Elliptic Curve Cryptography","author":"I.F. Blake","year":"2005","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Advances in Elliptic Curve Cryptography. London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge (2005)"},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobian of a hyperelliptic curve. Math. Comp.\u00a048, 95\u2013101 (1987)","journal-title":"Math. Comp."},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B. Chevallier-Mames","year":"2003","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Trans. on Computers\u00a053, 760\u2013768 (2003); Cryptology ePrint Archive, Report 2003\/237","journal-title":"IEEE Trans. on Computers"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 302\u2013392. Springer, Heidelberg (1999)"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24847-7_11","volume-title":"Algorithmic Number Theory","author":"S. Duquesne","year":"2004","unstructured":"Duquesne, S.: Montgomery scalar multiplication for genus 2 curves. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol.\u00a03076, pp. 153\u2013168. Springer, Heidelberg (2004)"},{"key":"32_CR10","unstructured":"Gaudry, P.: Fast genus 2 arithmetic based on Theta functions. Cryptology ePrint Archive, Report 2005\/314"},{"key":"32_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/10722028_18","volume-title":"Algorithmic Number Theory","author":"P. Gaudry","year":"2000","unstructured":"Gaudry, P., Harley, R.: Counting points on hyperelliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 313\u2013332. Springer, Heidelberg (2000)"},{"key":"32_CR12","unstructured":"Harley, R.: Fast arithmetic on genus 2 curves (2000), available at \n                    \n                      http:\/\/cristal.inria.fr\/~harley\/hyper"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/3-540-36231-2_24","volume-title":"Progress in Cryptology - INDOCRYPT 2002","author":"T. Izu","year":"2002","unstructured":"Izu, T., M\u00f6ller, B., Takagi, T.: Improved Elliptic Curve Multiplication Methods Resistant Against Side Channel Attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol.\u00a02551, pp. 296\u2013313. Springer, Heidelberg (2002)"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Jacobson, M., Menezes, A., Stein, A.: Hyperelliptic Curves in Cryptography. In: High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Fields Institute Communications, vol.\u00a041, pp. 255\u2013282. AMS (2004)","DOI":"10.1090\/fic\/041\/21"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptology\u00a01, 139\u2013150 (1989)","journal-title":"J. Cryptology"},{"key":"32_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-24847-7_23","volume-title":"Algorithmic Number Theory","author":"T. Lange","year":"2004","unstructured":"Lange, T.: Montgomery Addition for Genus Two Curves. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol.\u00a03076, pp. 309\u2013317. Springer, Heidelberg (2004)"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00200-004-0154-8","volume":"15","author":"T. Lange","year":"2005","unstructured":"Lange, T.: Formulae for arithmetic on genus 2 hyperelliptic curves. J. AAECC\u00a015, 295\u2013328 (2005)","journal-title":"J. AAECC"},{"key":"32_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-30564-4_12","volume-title":"Selected Areas in Cryptography","author":"T. Lange","year":"2004","unstructured":"Lange, T., Stevens, M.: Efficient doubling for genus two curves over binary fields. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 189\u2013202. Springer, Heidelberg (2004)"},{"key":"32_CR19","first-page":"155","volume-title":"Algebraic Aspects of Cryptography","author":"A.J. Menezes","year":"1998","unstructured":"Menezes, A.J., Wu, Y.-H., Zuccherato, R.: An Elementary Introduction to Hyperelliptic Curves. In: Koblitz, N. (ed.) Algebraic Aspects of Cryptography, pp. 155\u2013178. Springer, Heidelberg (1998)"},{"key":"32_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-40061-5_6","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"P.K. Mishra","year":"2003","unstructured":"Mishra, P.K., Sakar, P.: Parallelizing Explicit Formula in the Jacobian of Hyperelliptic Curves. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 93\u2013110. Springer, Heidelberg (2003); full version at Cryptology ePrint Archive, Report 2003\/180"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45439-X_22","volume-title":"Information Security","author":"B. M\u00f6ller","year":"2001","unstructured":"M\u00f6ller, B.: Securing elliptic curve point multiplication against side-channel attacks. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol.\u00a02200, pp. 324\u2013334. Springer, Heidelberg (2001)"},{"key":"32_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-24676-3_16","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Naccache","year":"2004","unstructured":"Naccache, D., Stern, J., Smart, N.P.: Projective Coordinates Leak. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 257\u2013267. Springer, Heidelberg (2004)"},{"key":"32_CR23","unstructured":"Spallek, A.M.: Kurven vom Geschlecht 2 und ihre Anwendung in Public-Key-Kryptosystemen. PhD thesis, University Essen (1994)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596219_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:54:28Z","timestamp":1619506468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596219_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308058","9783540322788"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11596219_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}