{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:35:04Z","timestamp":1725543304308},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_28","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T05:21:27Z","timestamp":1151990487000},"page":"405-420","source":"Crossref","is-referenced-by-count":0,"title":["A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography"],"prefix":"10.1007","author":[{"given":"Kishan Chand","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Pradeep Kumar","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Pinakpani","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-45238-6_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R.M. Avanzi","year":"2003","unstructured":"Avanzi, R.M.: Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 366\u2013381. Springer, Heidelberg (2003)"},{"key":"28_CR2","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"R. Avanzi","year":"2005","unstructured":"Avanzi, R., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: In: Frey, G., Cohen, H. (eds.) Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Bertoni, G., Breveglieri, L., Wollinger, T., Paar, C.: Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. Cryptology ePrint Archive, Report 2004\/29 (2004), http:\/\/eprint.iacr.org\/","DOI":"10.1109\/ITCC.2004.1286710"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobian of a Hyperelliptic curve. Mathematics of Computation\u00a048, 95\u2013101 (1987)","journal-title":"Mathematics of Computation"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B. Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity. IEEE Trans. on Computers\u00a053, 760\u2013768 (2004)","journal-title":"IEEE Trans. on Computers"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-24632-9_5","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"S. Flon","year":"2004","unstructured":"Flon, S., Oyono, R.: Fast Arithmetic on Jacobians of Picard Curves. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 55\u201368. Springer, Heidelberg (2004)"},{"issue":"237","key":"28_CR8","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0025-5718-00-01297-7","volume":"71","author":"S.D. Galbraith","year":"2002","unstructured":"Galbraith, S.D., Paulus, S.M., Smart, N.P.: Arithmatic on Superelliptic Curves. Mathematics of Computations\u00a071(237), 393\u2013405 (2002)","journal-title":"Mathematics of Computations"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/10722028_18","volume-title":"Algorithmic Number Theory","author":"P. Gaudry","year":"2000","unstructured":"Gaudry, P., Harley, R.: Counting Points on Hyperelliptic Curves over Finite Fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 297\u2013312. Springer, Heidelberg (2000)"},{"key":"28_CR10","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography, Springer-Verlag Professional Computing Series (2004) ISBN: 0-387-95273-X"},{"key":"28_CR11","unstructured":"Harley, R.: Fast Arithmetic on Genus 2 Curves, Available at: http:\/\/cristal.inria.fr\/~harley\/hyper\/adding.txt"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, C.: Protections against Differential Analysis for Elliptic Curve Cryptography. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 402\u2013410. Springer, Heidelberg (2001)"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computations\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computations"},{"issue":"3","key":"28_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology\u00a01(3), 139\u2013150 (1989)","journal-title":"Journal of Cryptology"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"N. Koblitz","year":"1992","unstructured":"Koblitz, N.: CM-Curves with Good Cryptographic Properties. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 279\u2013287. Springer, Heidelberg (1992)"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"28_CR18","unstructured":"Lange, T.: Efficient Arithmetic on Genus 2 Curves over Finite Fields via Explicit Formulae. Cryptology ePrint Archive, Report 2002\/121 (2002), http:\/\/eprint.iacr.org\/"},{"key":"28_CR19","unstructured":"Lange, T.: Inversion-free Arithmetic on Genus 2 Hyperelliptic Curves. Cryptology ePrint Archive, Report 2002\/147 (2002), http:\/\/eprint.iacr.org\/"},{"key":"28_CR20","unstructured":"Lange, T.: Weighted Co-ordinates on Genus 2 Hyperelliptic Curves. Cryptology ePrint Archive, Report 2002\/153 (2002), http:\/\/eprint.iacr.org\/"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Lange, T.: Formulae for Arithmetic on Genus 2 Hyperelliptic Curves. J. AAECC (to appear, 2004), http:\/\/www.itsc.ruhr-uni-bochum.de\/tanja\/preprints.html","DOI":"10.1007\/s00200-004-0154-8"},{"key":"28_CR22","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/BF00203817","volume":"6","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J., Vanstone, S.: Elliptic curve cryptosystems and their implementation. Journal of Cryptology\u00a06, 209\u2013224 (1993)","journal-title":"Journal of Cryptology"},{"key":"28_CR23","unstructured":"Menezes, A., Wu, Y., Zuccherato, R.: An Elementary Introduction to Hyperelliptic Curves. Technical Report, CORR 96-19, University of Waterloo, Canada (1996), Available at: http:\/\/www.cacr.math.uwaterloo.ca"},{"key":"28_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"28_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/978-3-540-28632-5_24","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"P.K. Mishra","year":"2004","unstructured":"Mishra, P.K.: Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 328\u2013342. Springer, Heidelberg (2004) (Full version to appear in IEEE Trans. on Computers)"},{"key":"28_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-40061-5_6","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"P.K. Mishra","year":"2003","unstructured":"Mishra, P.K., Sarkar, P.: Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 93\u2013110. Springer, Heidelberg (2003)"},{"key":"28_CR27","unstructured":"Schroeppel, R.: Elliptic curve point halving wins big. In: Second Midwest Arithmetical Geometry in Cryptography Workshop, Urbana, Illinois (November 2000)"},{"key":"28_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J.A. Solinas","year":"1997","unstructured":"Solinas, J.A.: An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 357\u2013371. Springer, Heidelberg (1997)"},{"key":"28_CR29","unstructured":"Spallek, A.M.: Kurven vom Geschletch 2 und irhe Anwendung in Public-Key-Kryptosystemen. PhD Thesis, Universit\u00e4t Gesamthochschule, Essen (1994)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T19:36:54Z","timestamp":1555702614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/11767480_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}