{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:45:19Z","timestamp":1773143119048,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":40,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540494751","type":"print"},{"value":"9783540494768","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935230_8","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T20:01:38Z","timestamp":1163620898000},"page":"114-129","source":"Crossref","is-referenced-by-count":20,"title":["The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography"],"prefix":"10.1007","author":[{"given":"P.","family":"Gaudry","sequence":"first","affiliation":[]},{"given":"T.","family":"Houtmann","sequence":"additional","affiliation":[]},{"given":"D.","family":"Kohel","sequence":"additional","affiliation":[]},{"given":"C.","family":"Ritzenthaler","sequence":"additional","affiliation":[]},{"given":"A.","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"225","key":"8_CR1","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1090\/S0025-5718-99-00995-3","volume":"68","author":"S. Arno","year":"1999","unstructured":"Arno, S., Bailey, D.H., Ferguson, H.R.P.: Analysis of PSLQ, an integer relation finding algorithm. Math. Comp.\u00a068(225), 351\u2013369 (1999)","journal-title":"Math. Comp."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Avanzi, R.: Aspects of hyperelliptic curves over large prime fields in software implementations (preprint, 2003), Available at: http:\/\/eprint.iacr.org\/2003\/253","DOI":"10.1007\/978-3-540-28632-5_11"},{"key":"8_CR3","series-title":"Lecture Notes in Math.","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0091550","volume-title":"Seminar on complex multiplication","author":"A. Borel","year":"1966","unstructured":"Borel, A., Chowla, S., Herz, C.S., Iwasawa, K., Serre, J.-P.: Seminar on complex multiplication. Lecture Notes in Math., vol.\u00a021. Springer, Heidelberg (1966)"},{"key":"8_CR4","series-title":"Pure and Applied Mathematics","volume-title":"Number theory","author":"Z.I. Borevitch","year":"1966","unstructured":"Borevitch, Z.I., Shafarevich, I.R.: Number theory. Pure and Applied Mathematics, vol.\u00a020. Academic Press Inc., New York (1966)"},{"key":"8_CR5","first-page":"36","volume":"38","author":"J.-B. Bost","year":"1988","unstructured":"Bost, J.-B., Mestre, J.-F.: Moyenne arithm\u00e9tico-g\u00e9om\u00e9trique et p\u00e9riodes de courbes de genre 1 et 2. Gaz. Math. Soc.\u00a038, 36\u201364 (1988)","journal-title":"Gaz. Math. Soc."},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-540-24847-7_8","volume-title":"Algorithmic Number Theory","author":"R. Br\u00f6ker","year":"2004","unstructured":"Br\u00f6ker, R., Stevenhagen, P.: Elliptic curves with a given number of points. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol.\u00a03076, pp. 117\u2013131. Springer, Heidelberg (2004)"},{"key":"8_CR7","unstructured":"Br\u00f6ker, R.M.: Constructing elliptic curves of prescribed order. Ph.D thesis, Thomas Stieltjes Institute for Mathematics (2006)"},{"key":"8_CR8","unstructured":"Carls, R.: A generalized arithmetic geometric mean. Ph.D thesis, Rijksuniversiteit Groningen (2004)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/3-540-44448-3_20","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"J. Chao","year":"2000","unstructured":"Chao, J., Matsuo, K., Kawashiro, H., Tsujii, S.: Construction of hyperelliptic curves with CM and its application to cryptosystems. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 259\u2013273. Springer, Heidelberg (2000)"},{"key":"8_CR10","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","volume-title":"A course in algorithmic algebraic number theory","author":"H. Cohen","year":"1993","unstructured":"Cohen, H.: A course in algorithmic algebraic number theory. Graduate Texts in Mathematics, vol.\u00a0138. Springer, Heidelberg (1993); Second corrected printing (1995)"},{"key":"8_CR11","series-title":"Lecture Notes in Math.","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/BFb0099440","volume-title":"Number theory, Noordwijkerhout 1983","author":"H. Cohen","year":"1984","unstructured":"Cohen, H., Lenstra Jr., H.W.: Heuristics on class groups of number fields. In: Number theory, Noordwijkerhout 1983. Lecture Notes in Math., vol.\u00a01068, pp. 33\u201362. Springer, Berlin (1984)"},{"key":"8_CR12","unstructured":"The University of\u00a0Sydney Computational\u00a0Algebra Group. Magma online handbook (2006), http:\/\/magma.maths.usyd.edu.au\/magma\/htmlhelp\/MAGMA.htm"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-45455-1_19","volume-title":"Algorithmic Number Theory","author":"J.-M. Couveignes","year":"2002","unstructured":"Couveignes, J.-M., Henocq, T.: Action of modular correspondences around CM points. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 234\u2013243. Springer, Heidelberg (2002)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M. Deuring","year":"1941","unstructured":"Deuring, M.: Die Typen der Multiplikatoringe elliptischer Funktionenk\u00f6rper. Abh. Math. Sem. Hansischen\u00a014, 197\u2013272 (1941)","journal-title":"Abh. Math. Sem. Hansischen"},{"key":"8_CR15","unstructured":"Dupont, R.: Moyenne arithm\u00e9tico-g\u00e9om\u00e9trique, suites de Borchardt et applications. Ph.D thesis, \u00c9cole polytechnique (2006)"},{"key":"8_CR16","unstructured":"Eisentrager, K., Lauter, K.: Computing Igusa class polynomials via Chinese Remainder Theorem 2004 (preprint, 2004), Available at: http:\/\/arxiv.org\/abs\/math.NT\/0405305"},{"key":"8_CR17","unstructured":"Gaudry, P.: Fast genus 2 arithmetic based on Theta functions (preprint, 2005), available at: http:\/\/eprint.iacr.org\/2005\/314"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-24676-3_15","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"P. Gaudry","year":"2004","unstructured":"Gaudry, P., Schost, \u00c9.: Construction of secure random curves of genus 2 over prime fields. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 239\u2013256. Springer, Heidelberg (2004)"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/BF02677837","volume":"94","author":"E.Z. Goren","year":"1997","unstructured":"Goren, E.Z.: On certain reduction problems concerning abelian surfaces. Manuscripta math.\u00a094, 33\u201343 (1997)","journal-title":"Manuscripta math."},{"key":"8_CR20","unstructured":"Goren, E.Z., Lauter, K.: Class invariants for quartic CM fields (preprint, 2004), available at: http:\/\/arxiv.org\/abs\/math.NT\/0404378"},{"key":"8_CR21","series-title":"Graduate Texts in Mathematics","volume-title":"p-adic Numbers, p-adic Analysis and Zeta-Functions","author":"N. Koblitz","year":"1984","unstructured":"Koblitz, N.: p-adic Numbers, p-adic Analysis and Zeta-Functions. Graduate Texts in Mathematics, vol.\u00a058. Springer, Heidelberg (1984)"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-540-30564-4_12","volume-title":"Selected Areas in Cryptography","author":"T. Lange","year":"2004","unstructured":"Lange, T., Stevens, M.: Efficient doubling on genus two curves over binary fields. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 170\u2013181. Springer, Heidelberg (2004)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Lercier, R., Lubicz, D.: A quasi quadratic time algorithm for hyperelliptic curve point counting. J. Ramanujan Math. Soc. (to appear)","DOI":"10.1007\/s11139-006-0151-6"},{"key":"8_CR24","unstructured":"Lercier, R., Riboulet-Deyris, E.: Elliptic curves with complex multiplication. Posting to the Number Theory List (2004), Avaliable at: http:\/\/listserv.nodak.edu\/cgi-bin\/wa.exe?A2=ind0401&L=nmbrthry&P=R305"},{"key":"8_CR25","unstructured":"Lubin, J., Serre, J.-P., Tate, J.: Elliptic curves and formal groups. Lecture notes prepared in connection with the seminars held at the Summer Institute on Algebraic Geometry, Whitney Estate, Woods Hole, Massachusetts, July 6-July 31(1964), Scanned copies available at: http:\/\/www.ma.utexas.edu\/users\/voloch\/lst.html"},{"key":"8_CR26","unstructured":"Mestre, J.-F.: Algorithmes pour compter des points de courbes en petite caract\u00e9ristique et en petit genre. Talk given in Rennes in March 2002, Notes written by Lubicz, D.(2002)"},{"key":"8_CR27","unstructured":"Mestre, J.-F.: Utilisation de l\u2019AGM pour le calcul de $E(F_{2^n})$ . Lettre adress\u00e9e \u00e0 Gaudry et Harley (D\u00e9cember 2000)"},{"key":"8_CR28","series-title":"Progr. Math.","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-1-4612-0441-1_21","volume-title":"Effective methods in algebraic geometry","author":"J.-F. Mestre","year":"1991","unstructured":"Mestre, J.-F.: Construction de courbes de genre 2 \u00e0 partir de leurs modules. In: Mora, T., Traverso, C. (eds.) Effective methods in algebraic geometry. Progr. Math., vol.\u00a094, pp. 313\u2013334. Birkh\u00e4user, Basel (1991)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals\u00a0E84-A(5) (May 2001)","DOI":"10.1007\/3-540-45247-8_8"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/11426639_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"P.Q. Ngu\u00ean","year":"2005","unstructured":"Ngu\u00ean, P.Q., Stehl\u00e9, D.: Floating-Point LLL Revisited. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 215\u2013233. Springer, Heidelberg (2005)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves (preprint, 2003)","DOI":"10.1007\/978-3-540-45238-6_28"},{"issue":"4","key":"8_CR32","first-page":"247","volume":"15","author":"T. Satoh","year":"2000","unstructured":"Satoh, T.: The canonical lift of an ordinary elliptic curve over a finite field and its point counting. J. Ramanujan Math. Soc.\u00a015(4), 247\u2013270 (2000)","journal-title":"J. Ramanujan Math. Soc."},{"key":"8_CR33","doi-asserted-by":"crossref","DOI":"10.1515\/9781400883943","volume-title":"Abelian Varieties with complex multiplication and modular functions","author":"G. Shimura","year":"1998","unstructured":"Shimura, G.: Abelian Varieties with complex multiplication and modular functions, revised edition. Princeton University Press, Princeton (1998)","edition":"1"},{"key":"8_CR34","unstructured":"Shoup, V.: NTL: A library for doing number theory, http:\/\/www.shoup.net\/ntl\/"},{"key":"8_CR35","unstructured":"Spallek, A.-M.: Kurven vom Geschlecht 2 und ihre Anwendung in Public-Key-Kryptosystemen. Ph.D thesis, Universit\u00e4t Gesamthochschule Essen (July 1994)"},{"key":"8_CR36","unstructured":"Stehl\u00e9, D.: fplll-1.2 a lattice LLL-reduction program (2006), Available at: http:\/\/www.loria.fr\/~stehle"},{"key":"8_CR37","unstructured":"Thom\u00e9, E.: Multi-Precision for LOCal-fields library, still under development (2006), see http:\/\/www.loria.fr\/~thome"},{"issue":"225","key":"8_CR38","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1090\/S0025-5718-99-01020-0","volume":"68","author":"P. Wamelen van","year":"1999","unstructured":"van Wamelen, P.: Examples of genus two CM curves defined over the rationals. Math. Comp.\u00a068(225), 307\u2013320 (1999)","journal-title":"Math. Comp."},{"key":"8_CR39","doi-asserted-by":"crossref","unstructured":"Vercauteren, F.: Computing zeta functions of curves over finite fields. Ph.D thesis, Katholieke Universiteit Leuven (2003)","DOI":"10.1007\/3-540-45708-9_24"},{"key":"8_CR40","unstructured":"Weng, A.: Konstruktion kryptographisch geeigneter Kurven mit komplexer Multiplikation. Ph.D thesis, Universit\u00e4t GH Essen (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935230_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:16:04Z","timestamp":1736637364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935230_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494751","9783540494768"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/11935230_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}