{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T07:16:55Z","timestamp":1776842215458,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_24","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"318-332","source":"Crossref","is-referenced-by-count":24,"title":["Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions"],"prefix":"10.1007","author":[{"given":"Martijn","family":"Stam","sequence":"first","affiliation":[]},{"given":"Arjen K.","family":"Lenstra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"24_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/3-540-45961-8_22","volume-title":"Advances in Cryptography-Eurocrypt\u201988","author":"G. Agnew","year":"1988","unstructured":"G. Agnew, R. Mullin, and S. Vanstone. Fast exponentiation in GF(2n). In C. G. G\u00fcnther, editor, Advances in Cryptography-Eurocrypt\u201988, volume 330 of Lecture Notes in Computer Science, pages 251\u2013255. Springer-Verlag, 1988."},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"D. Bailey and C. Paar. Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology, 2000.","DOI":"10.1007\/s001450010012"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"S. A. Brands. Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy. PhD thesis, Technische Universiteit Eindhoven, 1999.","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"24_CR4","unstructured":"H. Cohen. Analysis of the fiexible window powering algorithm. Submitted for publication, available from http:\/\/www.math.u-bordeaux.fr\/~cohen , 2001."},{"issue":"177","key":"24_CR5","doi-asserted-by":"publisher","first-page":"S1","DOI":"10.2307\/2007908","volume":"48","author":"H. Cohen","year":"1987","unstructured":"H. Cohen and A. K. Lenstra. Supplement to implementation of a new primality test. Mathematics of Computation, 48(177): S1\u2013S4, 1987.","journal-title":"Mathematics of Computation"},{"key":"24_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptography-Crypto\u201998","author":"R. Cramer","year":"1998","unstructured":"R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptography-Crypto\u201998, volume 1462 of Lecture Notes in Computer Science, pages 13\u201325. Springer-Verlag, 1998."},{"issue":"4","key":"24_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469\u2013472, 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptography-Crypto\u201901","author":"R. Gallant","year":"2001","unstructured":"R. Gallant, R. Lambert, and S. Vanstone. Faster point multiplication on elliptic curves with efficient endomorphisms. In J. Kilian, editor, Advances in Cryptography-Crypto\u201901, volume 2139 of Lecture Notes in Computer Science, pages 190\u2013200. Springer-Verlag, 2001."},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. M. Gordon","year":"1993","unstructured":"D. M. Gordon. Discrete logarithms in GF(p) using the number field sieve. SIAM J. Discrete Math., 6(1):124\u2013138, 1993.","journal-title":"SIAM J. Discrete Math."},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/0304-3975(83)90108-1","volume":"22","author":"A. Lempel","year":"1983","unstructured":"A. Lempel, G. Seroussi, and S. Winograd. On the complexity of multiplication in finite fields. Theoretical Computer Science, 22:285\u2013296, 1983.","journal-title":"Theoretical Computer Science"},{"key":"24_CR11","series-title":"Lect Notes Comput Sci","first-page":"127","volume-title":"ACISP\u201997","author":"A. K. Lenstra","year":"1997","unstructured":"A. K. Lenstra. Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fields. In V. Varadharajan, J. Pieprzyk, and Y. Mu, editors, ACISP\u201997, volume 1270 of Lecture Notes in Computer Science, pages 127\u2013138. Springer-Verlag, 1997."},{"key":"24_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/3-540-44448-3_17","volume-title":"Advances in Cryptography-Asiacrypt\u201900","author":"A. K. Lenstra","year":"2000","unstructured":"A. K. Lenstra and E. R. Verheul. Key improvements to XTR. In T. Okamoto, editor, Advances in Cryptography-Asiacrypt\u201900, volume 1976 of Lecture Notes in Computer Science, pages 220\u2013233. Springer-Verlag, 2000."},{"key":"24_CR13","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Advances in Cryptography-Crypto\u201900","author":"A. K. Lenstra","year":"2000","unstructured":"A. K. Lenstra and E. R. Verheul. The XTR public key system. In M. Bellare, editor, Advances in Cryptography-Crypto\u201900, volume 1880 of Lecture Notes in Computer Science, pages 1\u201319. Springer-Verlag, 2000."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"R. Lidl and H. Niederreiter. Introduction to finite fields and their applications. Cambridge University Press, 1994.","DOI":"10.1017\/CBO9781139172769"},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. C. Pohlig","year":"1978","unstructured":"S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24:106\u2013110, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"143","key":"24_CR16","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J. Pollard","year":"1978","unstructured":"J. Pollard. Monte carlo methods for index computation (mod p). Mathematics of Computation, 32(143):918\u2013924, 1978.","journal-title":"Mathematics of Computation"},{"key":"24_CR17","unstructured":"O. Schirokauer, Mar. 2000. Personal communication."},{"key":"24_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/3-540-61581-4_66","volume-title":"ANTS II","author":"O. Schirokauer","year":"1996","unstructured":"O. Schirokauer, D. Weber, and T. F. Denny. Discrete logarithms: the effectiveness of the index calculus method. In H. Cohen, editor, ANTS II, volume 1122 of Lecture Notes in Computer Science, pages 337\u2013361. Springer-Verlag, 1996."},{"key":"24_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/3-540-48405-1_10","volume-title":"Advances in Cryptography-Crypto\u201999","author":"B. Schoenmakers","year":"1999","unstructured":"B. Schoenmakers. A simple publicly variable secret sharing scheme and its application to electronic voting. In M. Wiener, editor, Advances in Cryptography-Crypto\u201999, volume 1666 of Lecture Notes in Computer Science, pages 148\u2013164. Springer-Verlag, 1999."},{"key":"24_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0000447","volume-title":"Advances in Cryptography-Asiacrypt\u201994","author":"P. Smith","year":"1995","unstructured":"P. Smith and C. Skinner. A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptography-Asiacrypt\u201994, volume 917 of Lecture Notes in Computer Science, pages 357\u2013364. Springer-Verlag, 1995."},{"key":"24_CR21","unstructured":"J. A. Solinas. Low-weight binary representations for pairs of integers. Technical report, CACR (University of Waterloo) preprint series, 2001."},{"key":"24_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-45682-1_8","volume-title":"Advances in Cryptography-Asiacrypt\u201901","author":"M. Stam","year":"2001","unstructured":"M. Stam and A. K. Lenstra. Speeding up XTR. In C. Boyd, editor, Advances in Cryptography-Asiacrypt\u201901, volume 2248 of Lecture Notes in Computer Science, pages 125\u2013143. Springer-Verlag, 2001."},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1090\/S0025-5718-00-01213-8","volume":"70","author":"E. Teske","year":"2001","unstructured":"E. Teske. On random walks for Pollard\u2019s rho method. Mathematics of Computation, 70:809\u2013825, 2001.","journal-title":"Mathematics of Computation"},{"key":"24_CR24","series-title":"Lect Notes Comput Sci","first-page":"88","volume-title":"AAECC-12","author":"J. Gathen von zur","year":"1997","unstructured":"J. von zur Gathen and M. N\u00f6cker. Exponentiation in finite fields: theory and practice. In T. Mora and H. Mattson, editors, AAECC-12, volume 1255 of Lecture Notes in Computer Science, pages 88\u2013133. Springer-Verlag, 1997."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T19:39:50Z","timestamp":1556825990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}