{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:07Z","timestamp":1747104187570},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540310334"},{"type":"electronic","value":"9783540326489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11605805_5","type":"book-chapter","created":{"date-parts":[[2005,12,22]],"date-time":"2005-12-22T11:08:03Z","timestamp":1135249683000},"page":"64-81","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Doubling on Genus 3 Curves over Binary Fields"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Wollinger","sequence":"additional","affiliation":[]},{"given":"Yumin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-28632-5_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"R.M. Avanzi","year":"2004","unstructured":"Avanzi, R.M.: Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 148\u2013162. Springer, Heidelberg (2004)"},{"key":"#cr-split#-5_CR2.1","doi-asserted-by":"crossref","unstructured":"Boston, N., Clancy, T., Liow, Y., Webster, J.: Genus Two Hyperelliptic Curve Coprocessor. In: Kaliski, B.S., Ko??, ??.K., Paar, C. (eds.) CHES 2002. LNCS, vol.??2523, pp. 529???539. Springer, Heidelberg (2003);","DOI":"10.1007\/3-540-36400-5_29"},{"key":"#cr-split#-5_CR2.2","unstructured":"Updated version available at http:\/\/www.cs.umd.edu\/~clancy\/docs\/hec-ches2002.pdf"},{"key":"5_CR3","unstructured":"Byramjee, B., Duqesne, S.: Classification of genus 2 curves over $F_2{^n}$ and optimazation of their arithmetic. Cryptology ePrint Archieve, Report 2004\/107 (2004), http:\/\/eprint.iacr.org\/"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing In The Jacobian Of A Hyperelliptic Curve. Math. Comp.\u00a048, 95\u2013101 (1987)","journal-title":"Math. Comp."},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman Hall\/CRC (2005)","DOI":"10.1201\/9781420034981"},{"key":"5_CR6","unstructured":"Clancy, T.: Analysis of FPGA-based Hyperelliptic Curve Cryptosystems. Master\u2019s thesis, University of Illinois Urbana-Champaign (December 2002)"},{"key":"5_CR7","unstructured":"Elias, G., Miri, A., Yeap, T.H.: High-Performance, FPGA-Based Hyperelliptic Curve Cryptosystems. In: The Proceeding of the 22nd Biennial Symposium on Communications, Queen\u2019s University, Kingston, Ontario, Canada (May 2004)"},{"key":"5_CR8","first-page":"642","volume-title":"International Conference on Information Technology: Coding and Computing - ITCC","author":"X. Fan","year":"2005","unstructured":"Fan, X., Wollinger, T., Wang, Y.: Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations. In: International Conference on Information Technology: Coding and Computing - ITCC, pp. 642\u2013647. IEEE Computer Society, Los Alamitos (2005)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"S.D. Galbraith","year":"2001","unstructured":"Galbraith, S.D.: Supersingular Curves in Cryptography. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 495\u2013513. Springer, Heidelberg (2001)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/10722028_18","volume-title":"Algorithmic Number Theory","author":"P. Gaudry","year":"2000","unstructured":"Gaudry, P., Harley, R.: Counting Points on Hyperelliptic Curves over Finite Fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 297\u2013312. Springer, Heidelberg (2000)"},{"issue":"2","key":"5_CR11","first-page":"119","volume":"19","author":"C. Guyot","year":"2004","unstructured":"Guyot, C., Kaveh, K., Patankar, V.M.: Explicit Algorithm for The Arithmetic on The Hyperelliptic Jacobians of Genus 3. Journal of Ramanujan Mathematical Society\u00a019(2), 119\u2013159 (2004)","journal-title":"Journal of Ramanujan Mathematical Society"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/3-540-44983-3_8","volume-title":"Selected Areas in Cryptography","author":"C. G\u00fcnther","year":"2001","unstructured":"G\u00fcnther, C., Lange, T., Stein, A.: Speeding up the Arithmetic on Koblitz Curves of Genus Two. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol.\u00a02012, pp. 106\u2013117. Springer, Heidelberg (2001)"},{"key":"5_CR13","unstructured":"Gonda, M., Matsuo, K., Aoki, K., Chao, J., Tsujii, S.: Improvements Of Addition Algorithm On Genus 3 Hyperelliptic Curves And Their Implementations. In: Proc. of SCIS 2004, Japan (2004)"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/0-387-34799-2_8","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"N. Koblitz","year":"1990","unstructured":"Koblitz, N.: A Family of Jacobians Suitable for Discrete Log Cryptosystems. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 94\u201399. Springer, Berlin (1990)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. In: Brickell, E.F. (ed.) Journal of Cryptology, pp. 139\u2013150 (1989)","DOI":"10.1007\/BF02252872"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-31815-6_29","volume-title":"Information Security Applications","author":"H. Kim","year":"2005","unstructured":"Kim, H., Wollinger, T., Choi, Y., Chung, K., Paar, C.: Hyperelliptic Curve Coprocessors on a FPGA. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 360\u2013374. Springer, Heidelberg (2005)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Lange, T.: Formulae for Arithmetic on Genus 2 Hyperelliptic Curves. Jounal of AAECC (Septemper 2003)","DOI":"10.1007\/s00200-004-0154-8"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Lange, T.: Koblitz Curve Cryptosystems. Finite Fields and Their Applications (2004) (to appear)","DOI":"10.1016\/j.ffa.2004.07.001"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"729","DOI":"10.2307\/2154650","volume":"342","author":"P. Lockhart","year":"1994","unstructured":"Lockhart, P.: On the discriminant of a hyperelliptic curve. Tran. Amer. Math. Soc.\u00a0342(2), 729\u2013752 (1994)","journal-title":"Tran. Amer. Math. Soc."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-30564-4_12","volume-title":"Selected Areas in Cryptography","author":"T. Lange","year":"2004","unstructured":"Lange, T., Stevens, M.: Efficient Doubling on Genus Two Curves over Binary Fields. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 170\u2013181. Springer, Heidelberg (2004)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Berlin (1986)"},{"key":"5_CR23","unstructured":"Menezes, A., Wu, Y., Zuccherato, R.: An Elementary Introduction to Hyperelliptic Curve. Technical Report CORR 96-19, University of Waterloo (1996), Canada, Available at http:\/\/www.cacr.math.uwaterloo.ca"},{"key":"5_CR24","series-title":"Progress in Mathematics","volume-title":"Tata Lectures on Theta II","author":"D. Mumford","year":"1984","unstructured":"Mumford, D.: Tata Lectures on Theta II. Progress in Mathematics, vol.\u00a043. Birkh\u00e4user, Basel (1984)"},{"key":"5_CR25","unstructured":"Pelzl, J.: Hyperelliptic Cryptosystems on Embedded Microprocessor. Master\u2019s thesis, Department of Electronical Engineering and Information Sciences, Ruhr-Universitaet Bochum, Bochum, Germany (September 2002)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic Curve Cryptosystems: Closing The Performance Gap To elliptic Curve (Update), Cryptology ePrint Archieve, Report 2003\/026 (2003), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-45238-6_28"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24654-1_1","volume-title":"Selected Areas in Cryptography","author":"J. Pelzl","year":"2004","unstructured":"Pelzl, J., Wollinger, T., Paar, C.: Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 1\u201316. Springer, Heidelberg (2004)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45708-9_22","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"K. Rubin","year":"2002","unstructured":"Rubin, K., Silverberg, A.: Supersingular abelian varieties in cryptology. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 336\u2013353. Springer, Heidelberg (2002)"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-540-40061-5_5","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"N. Th\u00e9riault","year":"2003","unstructured":"Th\u00e9riault, N.: Index calculus attack for hyperelliptic curves of small genus. In: Goos, G., Hartmanis, J., van Leeuwen, J. (eds.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 79\u201392. Springer, Heidelberg (2003)"},{"key":"5_CR30","unstructured":"Wollinger, T.: Software and Hardware Implementation of Hyperelliptic Curve Cryptosystems. Europ\u00e4ischer Universit\u00e4tsverlag, 3-86515-025-X (2004)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Wollinger, T., Pelzl, J., Wittelsberger, V., Paar, C., Saldamli, G., Ko\u00e7, \u00c7.K.: Elliptic & hyperelliptic curves on embedded \u03bcp. ACM Transactions in Embedded Computing Systems, TECS (2003), Special Issue on Embedded Systems and Security","DOI":"10.1145\/1015047.1015051"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11605805_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:44Z","timestamp":1619507144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11605805_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310334","9783540326489"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/11605805_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}