{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:30:26Z","timestamp":1770283826469,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_11","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"156-167","source":"Crossref","is-referenced-by-count":26,"title":["Constructing Elliptic Curve Cryptosystems in Characteristic 2"],"prefix":"10.1007","author":[{"given":"Neal","family":"Koblitz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adleman L. M. and Huang M. A., \u201cRecognizing primes in random polynomial time,\u201d Proc. 19th Annual ACM Symp. on Theory of Computing, 1987, 462\u2013469.","DOI":"10.1145\/28395.28445"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bender A. and Guy Castagloni, \u201cOn the implementation of elliptic curve cryptosystems,\u201d Advances in Cryptology \u2014 Crypto\u2019 89, Springer-Verlag, 1990, 186\u2013192.","DOI":"10.1007\/0-387-34805-0_18"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M. Deuring","year":"1941","unstructured":"Deuring M., \u201cDie Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper,\u201d Abh. Math. Sem. Hansischen Univ. 14 (1941), 197\u2013272.","journal-title":"Abh. Math. Sem. Hansischen Univ."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Goldwasser S. and Kilian J., \u201cAlmost all primes can be quickly certified,\u201d Proc. 18th Annual ACM Symp. on Theory of Computing, 1986, 316\u2013329.","DOI":"10.1145\/12130.12162"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Koblitz N., Introduction to Elliptic Curves and Modular Forms, Springer-Verlag, 1984.","DOI":"10.1007\/978-1-4684-0255-1"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Koblitz N., A Course in Number Theory and Cryptography, Springer-Verlag, 1987.","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz N., \u201cElliptic curve cryptosystems,\u201d Math. Comp. 48 (1987), 203\u2013209","journal-title":"Math. Comp."},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2140\/pjm.1988.131.157","volume":"131","author":"N. Koblitz","year":"1988","unstructured":"Koblitz N., \u201cPrimality of the number of points on an elliptic curve over a finite field,\u201d Pacific J. Math. 131 (1988), 157\u2013165.","journal-title":"Pacific J. Math."},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz N., \u201cHyperelliptic cryptosystems,\u201d J. Cryptology 1 (1989), 139\u2013150.","journal-title":"J. Cryptology"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Lang S., Elliptic Curves Diophantine Analysis, Springer-Verlag, 1978.","DOI":"10.1007\/978-3-662-07010-9"},{"key":"11_CR11","unstructured":"Lenstra A. K. and Lenstra H. W., Jr., \u201cAlgorithms in number theory,\u201d Technical Report 87-008, Univ. Chicago, 1987."},{"key":"11_CR12","unstructured":"Menezes A. and S. A. Vanstone, \u201cIsomorphism classes of elliptic curves over finite fields,\u201d ReJearch Report 90-01, University of Waterloo, 1990."},{"key":"11_CR13","unstructured":"Menezes A. and S. A. Vanstone, \u201cThe implementation of elliptic curve cryptosystems,\u201d preprint."},{"key":"11_CR14","unstructured":"Menezes A., T. Okamoto, and S. A. Vanstone, \u201cReducing elliptic curve logarithms to logarithms in a finite field,\u201d preprint."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Miller V., \u201cUse of elliptic curves in cryptography,\u201d Advances in Cryptology \u2014 Crypto\u2019 85, Springer-Verlag, 1986, 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"11_CR16","first-page":"483","volume":"44","author":"R. J. Schoof","year":"1985","unstructured":"Schoof R. J., \u201cElliptic curves over finite fields and the computation of square roots mod p,\u201d Math. Comp. 44 (1985), 483\u2013494.","journal-title":"Math. Comp."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0097-3165(87)90003-3","volume":"46","author":"R. J. Schoof","year":"1987","unstructured":"Schoof R. J., \u201cNonsingular plane cubic curves over finite fields,\u201d J. Cornbinatorial Theory 46 (1987), 183\u2013211.","journal-title":"J. Cornbinatorial Theory"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Silverman J., The Arithmetic of Elliptic Curves, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.24033\/asens.1183","volume":"2","author":"W. C. Waterhouse","year":"1969","unstructured":"Waterhouse W. C., \u201cAbelian varieties over finite fields,\u201d Ann. Sci. \u00c9cole Norm. Sup., 4e s\u00e9r. 2 (1969), 521\u2013560.","journal-title":"Ann. Sci. \u00c9cole Norm. Sup."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:05Z","timestamp":1619572805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_11","relation":{},"subject":[]}}