{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:38Z","timestamp":1764996818965},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540003243"},{"type":"electronic","value":"9783540362883"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36288-6_16","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T16:45:01Z","timestamp":1180889101000},"page":"211-223","source":"Crossref","is-referenced-by-count":41,"title":["Validation of Elliptic Curve Public Keys"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Antipa","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Alfred","family":"Menezes","sequence":"additional","affiliation":[]},{"given":"Ren\u00e9","family":"Struik","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Vanstone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"16_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-45353-9_12","volume-title":"Topics in Cryptology\u2014CT-RSA 2001","author":"M. Abdalla","year":"2001","unstructured":"M. Abdalla, M. Bellare and P. Rogaway, \u201cThe oracle Diffie-Hellman assumptions and an analysis of DHIES\u201d, Topics in Cryptology\u2014CT-RSA 2001, Lecture Notes in Computer Science, vol. 2020 (2001), 143\u2013158. 213, 218"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"C. Adams and S. Farrell, Internet X.509 Public Key Infrastructure: Certificate Management Protocols, RFC 2510, March 1999. Available from http:\/\/www.ietf.org . 218","DOI":"10.17487\/rfc2510"},{"key":"16_CR3","unstructured":"ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute, 1999. 214"},{"key":"16_CR4","unstructured":"ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport using Elliptic Curve Cryptography, American National Standards Institute, 2001. 213, 214"},{"key":"16_CR5","unstructured":"D. Bailey, A. Singer and W. Whyte, \u201cIEEE P802-15 TG3 NTRU full security text proposal\u201d, submission to the IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs), April 22, 2002. Available from http:\/\/grouper.ieee.org\/groups\/802\/15\/pub\/2002\/May02\/02210r0P802-15 TG3-NTRU-Full-Security-Text-Proposal.pdf . 221"},{"key":"16_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0028457","volume-title":"Information and Communications Security","author":"M. Bellare","year":"1997","unstructured":"M. Bellare and P. Rogaway, \u201cMinimizing the use of random oracles in authenticated encryption schemes\u201d, Information and Communications Security, Lecture Notes in Computer Science, vol. 1334 (1997), 1\u201316. 213"},{"key":"16_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology\u2014CRYPTO 2000","author":"I. Biehl","year":"2000","unstructured":"I. Biehl, B. Meyer and V. M\u00fcller, \u201cDifferential fault analysis on elliptic curve cryptosystems\u201d, Advances in Cryptology\u2014CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880 (2000), 131\u2013146. 215, 216"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson, D. Brown and P. Lambert, Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), RFC 3278, April 2002. Available from http:\/\/www.ietf.org . 213","DOI":"10.17487\/rfc3278"},{"key":"16_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology\u2014EUROCRYPT\u2019 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R. DeMillo and R. Lipton, \u201cOn the importance of checking cryptographic protocols for faults\u201d, Advances in Cryptology\u2014EUROCRYPT\u2019 97, Lecture Notes in Computer Science, vol. 1233 (1997), 37\u201351. 215"},{"key":"16_CR10","unstructured":"FIPS 186-2, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-2, National Institute of Standards and Technology, 2000. 212, 214, 215, 219"},{"key":"16_CR11","unstructured":"V. Gupta, S. Blake-Wilson, B. Moeller and C. Hawk, ECC Cipher Suites for TLS, IETF Internet-Draft, August 2002. Available from http:\/\/www.ietf.org . 213"},{"key":"16_CR12","unstructured":"IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography, 2000. 213, 214, 216"},{"key":"16_CR13","unstructured":"IEEE P1363a, Draft Standard Specifications for Public-Key Cryptography \u2014 Amendment 1: Additional Techniques, working draft 10.5, April 26 2002. Available from http:\/\/grouper.ieee.org\/groups\/1363\/tradPK\/P1363a\/draft.html . 213"},{"key":"16_CR14","unstructured":"ISO\/IEC 15946-2, Information Technology \u2014 Security Techniques \u2014 Cryptographic Techniques Based on Elliptic Curves \u2014 Part 2: Digital Signatures, draft, February 2001. 214"},{"key":"16_CR15","unstructured":"ISO\/IEC 15946-3, Information Technology \u2014 Security Techniques \u2014 Cryptographic Techniques Based on Elliptic Curves \u2014 Part 3: Key Establishment, draft, February 2001. 213, 214"},{"key":"16_CR16","unstructured":"D. Johnson, Contribution to ANSI X9F1 working group, 1997. 211"},{"key":"16_CR17","unstructured":"D. Johnson, \u201cKey validation\u201d, Contribution to IEEE P1363 working group, 1997. 211"},{"key":"16_CR18","unstructured":"L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, \u201cAn efficient protocol for authenticated key agreement\u201d, Designs, Codes and Cryptography, to appear. 214"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H. Lenstra","year":"1987","unstructured":"H. Lenstra, \u201cFactoring integers with elliptic curves\u201d, Annals of Mathematics, 126 (1987), 649\u2013673. 219","journal-title":"Annals of Mathematics"},{"key":"16_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 97","author":"C. Lim","year":"1997","unstructured":"C. Lim and P. Lee, \u201cA key recovery attack on discrete log-based schemes using a prime order subgroup\u201d, Advances in Cryptology\u2014CRYPTO\u2019 97, Lecture Notes in Computer Science, vol. 1294 (1997), 249\u2013263. 211, 215"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993. 220","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"M. Myers, C. Adams, D. Solo and D. Kemp, Internet X.509 Certificate Request Message Format, RFC 2511, March 1999. Available from http:\/\/www.ietf.org . 218","DOI":"10.17487\/rfc2511"},{"key":"16_CR23","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J. Solinas","year":"2000","unstructured":"J. Solinas, \u201cEfficient arithmetic on Koblitz curves\u201d, Designs, Codes and Cryptography, 19 (2000), 195\u2013249. 222","journal-title":"Designs, Codes and Cryptography"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography \u2014 PKC 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36288-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:56:20Z","timestamp":1556456180000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36288-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12,18]]},"ISBN":["9783540003243","9783540362883"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-36288-6_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002,12,18]]}}}