{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:52:04Z","timestamp":1725472324216},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540491125"},{"type":"electronic","value":"9783540491149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11927587_10","type":"book-chapter","created":{"date-parts":[[2006,11,8]],"date-time":"2006-11-08T05:12:43Z","timestamp":1162962763000},"page":"94-106","source":"Crossref","is-referenced-by-count":0,"title":["A High-Speed Square Root Algorithm in Extension Fields"],"prefix":"10.1007","author":[{"given":"Hidehiro","family":"Katou","sequence":"first","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[]},{"given":"Yoshitaka","family":"Morikawa","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)"},{"issue":"4","key":"10_CR2","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1080\/0161-118891862972","volume":"12","author":"K. Kurosawa","year":"1988","unstructured":"Kurosawa, K., Ito, T., Takeuchi, M.: Public key cryptosystem using a reciprocal number with the same intractability as factoring a large number. Cryptologia\u00a012(4), 225\u2013233 (1988)","journal-title":"Cryptologia"},{"key":"10_CR3","unstructured":"Tonelli, A.: Bemerkung \u00fcber die Aufl\u00f6sung quadratischer Congruenzen, G\u00f6ttinger Nachrichten, 344\u2013346 (1891)"},{"key":"10_CR4","first-page":"154","volume":"IX","author":"M. Cipolla","year":"1903","unstructured":"Cipolla, M.: Un metodo per la risolutione della congruenza di secondo grado. Rendiconto dell Accademia Scienze Fisiche e Matematiche Napoli, Ser. 3\u00a0IX, 154\u2013163 (1903)","journal-title":"Rendiconto dell Accademia Scienze Fisiche e Matematiche Napoli, Ser. 3"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Wang, F., Nogami, Y., Morikawa, Y.: An efficient square root computation in finite fields. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E88-A(10), 2792\u20132799 (2005)","DOI":"10.1093\/ietfec\/e88-a.10.2792"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-39927-8_1","volume-title":"Information and Communications Security","author":"F. Wang","year":"2003","unstructured":"Wang, F., Nogami, Y., Morikawa, Y.: A fast square root computation using the Frobenius mapping. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 1\u201310. Springer, Heidelberg (2003)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Bailey, D.V., Paar, C.: Optimal extension fields for fast arithmetic in public-key algorithms. In: Proc. Crypto. 1998, pp. 472\u2013485 (1998)","DOI":"10.1007\/BFb0055748"},{"key":"10_CR8","unstructured":"Nogami, Y., Saito, A., Morikawa, Y.: Finite extension field with modulus of all-one polynomial and representation of its elements for fast arithmetic operations. Trans. IEICE\u00a0 E86-A(9), 2376\u20132387 (2003)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Fan, J.L., Paar, C.: On efficient inversion in tower fields of characteristic two. In: Proc. ISIT 1997, p. 20 (1997)","DOI":"10.1109\/ISIT.1997.612935"},{"key":"10_CR10","unstructured":"Bailey, D.V.: Computation in optimal extension fields, A thesis submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Master of Science in Computer Science (2000)"},{"key":"10_CR11","unstructured":"Wang, F.: Efficient square root algorithms over extension fields GF(pm), A thesis submitted to the Graduate School of Natural Science and Technology of Okayama University for the Degree of Doctor in Engineer (2005)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11927587_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:46:44Z","timestamp":1619509604000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11927587_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540491125","9783540491149"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11927587_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}