{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:44:42Z","timestamp":1725471882135},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540465591"},{"type":"electronic","value":"9783540465614"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11894063_12","type":"book-chapter","created":{"date-parts":[[2006,10,16]],"date-time":"2006-10-16T21:49:01Z","timestamp":1161035341000},"page":"148-159","source":"Crossref","is-referenced-by-count":0,"title":["SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form"],"prefix":"10.1007","author":[{"given":"Toru","family":"Akishita","sequence":"first","affiliation":[]},{"given":"Masanobu","family":"Katagi","sequence":"additional","affiliation":[]},{"given":"Izuru","family":"Kitamura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"177","key":"12_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobian of a Hyperelliptic Curve. Mathematics of Computation\u00a048(177), 95\u2013101 (1987)","journal-title":"Mathematics of Computation"},{"key":"12_CR2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420034981","volume-title":"Handbook of Elliptic Curve and Hyperelliptic Curve Cryptography","author":"H. Cohen","year":"2005","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic Curve and Hyperelliptic Curve Cryptography. Chapman & Hall, Boca Raton (2005)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-24847-7_11","volume-title":"Algorithmic Number Theory","author":"S. Duquesne","year":"2004","unstructured":"Duquesne, S.: Montgomery Scalar Multiplication for Genus 2 Curves. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol.\u00a03076, pp. 153\u2013168. Springer, Heidelberg (2004)"},{"key":"12_CR5","unstructured":"Fong, K., Hankerson, D., L\u00f3pez, J., Menezes, A.: Field inversion and point halving revised. Technical Report CORR 2003-81 (2003), \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2003\/corr2003-18.pdf"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R.P. Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"key":"12_CR7","unstructured":"Harley, R.: Adding.txt, Doubling.c (2000), \n                    \n                      http:\/\/cristal.inria.fr\/~harley\/hyper\/"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1093\/ietfec\/e89-a.1.151","volume":"E89-A","author":"M. Katagi","year":"2006","unstructured":"Katagi, M., Akishita, T., Kitamura, I., Takagi, T.: Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors. IEICE Trans. Fundamentals\u00a0E89-A(1), 151\u2013160 (2006)","journal-title":"IEICE Trans. Fundamentals"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-31815-6_28","volume-title":"Information Security Applications","author":"M. Katagi","year":"2005","unstructured":"Katagi, M., Kitamura, I., Akishita, T., Takagi, T.: Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 345\u2013359. Springer, Heidelberg (2005)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/11506157_13","volume-title":"Information Security and Privacy","author":"I. Kitamura","year":"2005","unstructured":"Kitamura, I., Katagi, M., Takagi, T.: A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 146\u2013157. Springer, Heidelberg (2005)"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology\u00a01, 139\u2013150 (1989)","journal-title":"Journal of Cryptology"},{"key":"12_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8534-7","volume-title":"Abelian Varieties","author":"S. Lang","year":"1983","unstructured":"Lang, S.: Abelian Varieties. Springer, Heidelberg (1983)"},{"key":"12_CR13","first-page":"295","volume-title":"Applicable Algebra in Engineering, Communication and Computing","author":"T. Lange","year":"2005","unstructured":"Lange, T.: Formulae for Arithmetic on Genus 2 Hyperelliptic Curves. In: Applicable Algebra in Engineering, Communication and Computing, vol.\u00a015, pp. 295\u2013328. Springer, Heidelberg (2005)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C.H. Lim","year":"1994","unstructured":"Lim, C.H., Lee, P.J.: More Flexible Exponentiation with Precomputation. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 95\u2013107. Springer, Heidelberg (1994)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-540-28632-5_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"H. Mamiya","year":"2004","unstructured":"Mamiya, H., Miyaji, A., Morimoto, H.: Efficient Countermeasure against RPA, DPA, and SPA. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 343\u2013356. Springer, Heidelberg (2004)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Mumford, D.: Tata Lectures on Theta II, Progress in Mathematics 43, Birkh\u00e4user (1984)","DOI":"10.1007\/978-1-4899-2843-6"},{"key":"12_CR17","unstructured":"Solinas, J.A.: Low-Weight Binary Representations for Pairs of Integers., Technical Report CORR 2001-41 (2001), \n                    \n                      http:\/\/www.cacr.math.uwaterloo.ca\/techreports\/2001\/corr2001-41.ps"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2006"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11894063_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:00:08Z","timestamp":1558288808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11894063_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540465591","9783540465614"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11894063_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}