{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:26:40Z","timestamp":1773232000163,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540360759","type":"print"},{"value":"9783540360766","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11792086_35","type":"book-chapter","created":{"date-parts":[[2006,10,4]],"date-time":"2006-10-04T13:48:35Z","timestamp":1159969715000},"page":"495-509","source":"Crossref","is-referenced-by-count":8,"title":["Efficiently Computable Endomorphisms for Hyperelliptic Curves"],"prefix":"10.1007","author":[{"given":"David R.","family":"Kohel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benjamin A.","family":"Smith","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D. Cantor","year":"1987","unstructured":"Cantor, D.: Computing in the Jacobian of a hyperelliptic curve. Math. Comp.\u00a048, 95\u2013101 (1987)","journal-title":"Math. Comp."},{"key":"35_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-39200-9_24","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Ciet","year":"2003","unstructured":"Ciet, M., Lange, T., Sica, F., Quisquater, J.-J.: Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 387\u2013400. Springer, Heidelberg (2003)"},{"key":"35_CR3","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-57189-3_6","volume-title":"Coding theory, cryptography and related areas (Guanajuato, 1998)","author":"I. Duursma","year":"2000","unstructured":"Duursma, I., Sakurai, K.: Efficient algorithms for the Jacobian variety of hyperelliptic curves y\n                           2\u2009=\u2009x\n                           \n                    p\n                  \u2009\u2212\u2009x\u2009+\u20091 over a finite field of odd characteristic p. In: Coding theory, cryptography and related areas (Guanajuato, 1998), pp. 73\u201389. Springer, Berlin (2000)"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1006\/aima.2001.1994","volume":"162","author":"J. Ellenberg","year":"2001","unstructured":"Ellenberg, J.: Endomorphism algebras of Jacobians. Advances in Mathematics\u00a0162, 243\u2013271 (2001)","journal-title":"Advances in Mathematics"},{"key":"35_CR5","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511526084","volume-title":"Prolegomena to a middlebrow arithmetic of curves of genus 2","author":"J.W.S. Cassels","year":"1996","unstructured":"Cassels, J.W.S., Flynn, E.V.: Prolegomena to a middlebrow arithmetic of curves of genus 2. London Mathematical Society Lecture Note Series, vol.\u00a0230. Cambridge University Press, Cambridge (1996)"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R. Gallant","year":"2001","unstructured":"Gallant, R., Lambert, R., Vanstone, S.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"issue":"4","key":"35_CR7","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1080\/10586458.2003.10504508","volume":"12","author":"P. Gaudry","year":"2003","unstructured":"Gaudry, P., G\u00fcrel, N.: Counting points in medium characteristic using Kedlaya\u2019s algorithm. Experiment. Math.\u00a012(4), 395\u2013402 (2003)","journal-title":"Experiment. Math."},{"issue":"4","key":"35_CR8","doi-asserted-by":"publisher","first-page":"475","DOI":"10.2748\/tmj\/1178207751","volume":"52","author":"K.-I. Hashimoto","year":"2000","unstructured":"Hashimoto, K.-I.: On Brumer\u2019s family of RM-curves of genus two. Tohoku Math. J. (2)\u00a052(4), 475\u2013488 (2000)","journal-title":"Tohoku Math. J. (2)"},{"issue":"4","key":"35_CR9","first-page":"323","volume":"16","author":"K. Kedlaya","year":"2001","unstructured":"Kedlaya, K.: Counting points on hyperelliptic curves using Monsky-Washnitzer cohomology. J.\u00a0Ramanujan Math.\u00a0Soc.\u00a016(4), 323\u2013338 (2001)","journal-title":"J.\u00a0Ramanujan Math.\u00a0Soc."},{"key":"35_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"N. Koblitz","year":"1992","unstructured":"Koblitz, N.: CM-curves with good cryptographic properties. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 279\u2013287. Springer, Heidelberg (1992)"},{"key":"35_CR11","unstructured":"Lange, T.: Efficient arithmetic on hyperelliptic Koblitz curves, Ph.D. Thesis (2001)"},{"key":"35_CR12","unstructured":"Lidl, R., Mullen, G.L., Turnwald, G.: Dickson polynomials, Pitman monographs and surveys in pure and applied mathematics 65, Longman Scientific & Technical (1993)"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/BFb0030345","volume-title":"Advances in Cryptology - AUSCRYPT \u201990","author":"A.J. Menezes","year":"1990","unstructured":"Menezes, A.J., Vanstone, S.A.: The implementation of elliptic curve cryptosystems. In: Seberry, J., Pieprzyk, J.P. (eds.) AUSCRYPT 1990. LNCS, vol.\u00a0453, pp. 2\u201313. Springer, Heidelberg (1990)"},{"key":"35_CR14","series-title":"Progress in Math.","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-1-4612-0457-2_9","volume-title":"Arithmetic algebraic geometry (Texel, 1989)","author":"J.-F. Mestre","year":"1991","unstructured":"Mestre, J.-F.: Familles de courbes hyperelliptiques \u00e0 multiplications r\u00e9elles. In: Arithmetic algebraic geometry (Texel, 1989). Progress in Math., vol.\u00a089, pp. 193\u2013208. Birkh\u00e4user, Boston (1991)"},{"key":"35_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/3-540-46035-7_13","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y.-H. Park","year":"2002","unstructured":"Park, Y.-H., Jeong, S., Lim, J.: Speeding up point multiplication on hyperelliptic curves with efficiently-computable endomorphisms. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 197\u2013208. Springer, Heidelberg (2002)"},{"key":"35_CR16","unstructured":"Smith, B.A.: Explicit endomorphisms and correspondences, Ph.D.\u00a0Thesis, The University of Sydney (2005)"},{"issue":"2-3","key":"35_CR17","first-page":"195","volume":"19","author":"J.A. Solinas","year":"2000","unstructured":"Solinas, J.A.: Efficient arithmetic on Koblitz curves. Des.\u00a0Codes\u00a0Cryptogr.\u00a019(2-3), 195\u2013249 (2000)","journal-title":"Des.\u00a0Codes\u00a0Cryptogr."},{"issue":"10","key":"35_CR18","first-page":"1341","volume":"321","author":"M. Stoll","year":"1995","unstructured":"Stoll, M.: Two simple 2-dimensional abelian varieties defined over Q with Mordell-Weil group of rank at least 19. C.\u00a0R.\u00a0Acad.\u00a0Sci.\u00a0Paris S\u00e9r.\u00a0I Math.\u00a0321(10), 1341\u20131345 (1995)","journal-title":"C.\u00a0R.\u00a0Acad.\u00a0Sci.\u00a0Paris S\u00e9r.\u00a0I Math."},{"issue":"1","key":"35_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1093\/ietfec\/e89-a.1.124","volume":"E89-A","author":"K. Takashima","year":"2006","unstructured":"Takashima, K.: A new type of fast endomorphisms on Jacobians of hyperelliptic curves and their cryptographic application. IEICE Trans. Fundamentals\u00a0E89-A(1), 124\u2013133 (2006)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"5","key":"35_CR20","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.4153\/CJM-1991-061-x","volume":"43","author":"W. Tautz","year":"1991","unstructured":"Tautz, W., Top, J., Verberkmoes, A.: Explicit hyperelliptic curves with real multiplication and permutation polynomials. Canad. J. Math.\u00a043(5), 1055\u20131064 (1991)","journal-title":"Canad. J. Math."},{"key":"35_CR21","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1073\/pnas.34.5.204","volume":"34","author":"A. Weil","year":"1948","unstructured":"Weil, A.: On some exponential sums. Proc. Nat. Acad. Sci.\u00a034, 204\u2013207 (1948)","journal-title":"Proc. Nat. Acad. Sci."}],"container-title":["Lecture Notes in Computer Science","Algorithmic Number Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11792086_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:23:42Z","timestamp":1619508222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11792086_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540360759","9783540360766"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11792086_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}