{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:26:07Z","timestamp":1773231967427,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540006220","type":"print"},{"value":"9783540364924","type":"electronic"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36492-7_3","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:36:10Z","timestamp":1193182570000},"page":"21-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Sica","sequence":"first","affiliation":[]},{"given":"Mathieu","family":"Ciet","sequence":"additional","affiliation":[]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, and N. Smart. Elliptic Curves in Cryptography, volume 265 of London Mathematical Society. Cambridge University Press, 2000.","DOI":"10.1017\/CBO9781107360211"},{"key":"3_CR2","unstructured":"H. Cohen. A Course in Computational Algebraic Number Theory, volume 138 of Graduate Texts in Mathematics. Springer, 1996."},{"key":"3_CR3","unstructured":"H. Daud\u00e9, P. Flajolet, and B. Vall\u00e9e. An Average-case Analysis of the Gaussian Algorithm for Lattice Reduction. Technical Report 2798, INRIA, February 1996."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"H. Davenport. Multiplicative Number Theory, volume 74 of Graduate Texts in Mathematics. Springer Verlag, 1980.","DOI":"10.1007\/978-1-4757-5927-3"},{"key":"3_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms","author":"R. P. Gallant","year":"2001","unstructured":"R. P. Gallant, J. L. Lambert, and S. A. Vanstone. Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In J. Kilian, editor, Advances in Cryptology-Proceedings of CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 190\u2013200. Springer, 2001."},{"issue":"1","key":"3_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"D. M. Gordon. A Survey of Fast Exponentiation Methods. Journal of Algorithms, 27(1):129\u2013146, 1998.","journal-title":"Journal of Algorithms"},{"key":"3_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45861-1","volume-title":"Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves","author":"D. Kim","year":"2002","unstructured":"D. Kim and S. Lim. Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. In Howard Heys and Kaisa Nyberg, editors, Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, Lecture Notes in Computer Science. Springer, 2002. (this volume)."},{"issue":"177","key":"3_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"K. Koblitz","year":"1987","unstructured":"K. Koblitz. Elliptic Curve Cryptosystems. Mathematics of Computation, 48(177):203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"3_CR9","unstructured":"D. Kohel. Endomorphism Rings of Elliptic Curves over Finite Fields. PhD thesis, UC Berkeley, 1996."},{"key":"3_CR10","unstructured":"T. Lange. Efficient Arithmetic on Hyperelliptic Koblitz Curves. PhD thesis, University of Essen, 2001."},{"key":"3_CR11","first-page":"513","volume":"261","author":"A. K. Lenstra","year":"1982","unstructured":"A. K. Lenstra, H. W. Lenstra Jr., and L. Lov\u00e1sz. Factoring polynomials with rational coefficients. Mathematische Ann., 261:513\u2013534, 1982.","journal-title":"Mathematische Ann"},{"key":"3_CR12","unstructured":"A.J. Menezes. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1995."},{"key":"3_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Use of Elliptic Curves in Cryptography","author":"V. Miller","year":"1986","unstructured":"V. Miller. Use of Elliptic Curves in Cryptography. In A. M. Odlyzko, editor, Advances in Cryptology-Proceedings of CRYPTO 1986, volume 263 of Lecture Notes in Computer Science, pages 417\u2013426. Springer, 1986."},{"key":"3_CR14","first-page":"197","volume-title":"Public-Key Cryptography and Computational Number Theory","author":"V. M\u00fcller","year":"2000","unstructured":"V. M\u00fcller. Efficient Point Multiplication for Elliptic Curves over Special Optimal Extension Fields. In Walter de Gruyter, editor, Public-Key Cryptography and Computational Number Theory, pages 197\u2013207, Warschau, Poland, September 11\u201315, 2000 (2001)."},{"key":"3_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/3-540-45664-3_23","volume-title":"An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves","author":"Y.-H. Park","year":"2002","unstructured":"Y-H. Park, S. Jeong, C. Kim, and J. Lim. An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. In D. Naccache and P. Paillier, editors, Advances in Cryptology-Proceedings of PKC 2002, volume 2274 of Lecture Notes in Computer Science, pages 323\u2013334. Springer, 2002."},{"key":"3_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/3-540-46035-7_13","volume-title":"Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-computable Endomorphisms","author":"Y.-H. Park","year":"2002","unstructured":"Y-H. Park, S. Jeong, and J. Lim. Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-computable Endomorphisms. In L. Knudsen, editor, Advances in Cryptology-Proceedings of EUROCRYPT 2002, volume 2332 of Lecture Notes in Computer Science, pages 197\u2013208. Springer, 2002."},{"key":"3_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"An Improved Algorithm for Arithmetic on a Family of Elliptic Curves","author":"J. A. Solinas","year":"1997","unstructured":"J. A. Solinas. An Improved Algorithm for Arithmetic on a Family of Elliptic Curves. In Burton S. Kaliski Jr., editor, Advances in Cryptology-Proceedings of CRYPTO 1997, volume 1294 of Lecture Notes in Computer Science, pages 357\u2013371. Springer, 1997."},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"521","DOI":"10.24033\/asens.1183","volume":"2","author":"E. Waterhouse","year":"1969","unstructured":"E. Waterhouse. Abelian varieties over finite fields. Ann. Sci. \u00c9cole Norm. Sup., 2:521\u2013560, 1969.","journal-title":"Ann. Sci. \u00c9cole Norm. Sup."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36492-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,16]],"date-time":"2020-01-16T08:03:09Z","timestamp":1579161789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36492-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006220","9783540364924"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-36492-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"17 February 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}