{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:28:02Z","timestamp":1743031682043,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540416586"},{"type":"electronic","value":"9783540445869"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44586-2_26","type":"book-chapter","created":{"date-parts":[[2007,10,7]],"date-time":"2007-10-07T02:53:49Z","timestamp":1191725629000},"page":"353-364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Marc","family":"Joye","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,5]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffe","year":"1976","unstructured":"W. Diffe and M. E. Hellman, \u201cNew directions in cryptography,\u201d IEEE Trans. on Information Theory, vol. 22, pp. 644\u2013654, 1976.","journal-title":"IEEE Trans. on Information Theory"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. El Gamal","year":"1985","unstructured":"T. El Gamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. on Information Theory, vol. 31, pp. 469\u2013472, 1985.","journal-title":"IEEE Trans. on Information Theory"},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. M. Gordon","year":"1998","unstructured":"D. M. Gordon, \u201cA surveyof fast exponentiation methods,\u201d J. Algorithms, vol. 27, pp. 129\u2013146, 1998.","journal-title":"J. Algorithms"},{"key":"26_CR4","unstructured":"4. IEEE Std P1363-2000, IEEE Standard Specifications for Public-Key Cryptography, IEEE Computer Society, August 20, 2000."},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"M. Joye","year":"2000","unstructured":"M. Joye and S.-M. Yen, \u201cOptimal left-to-right binary signed-digit recoding,\u201d IEEE Trans. Computers, vol. 49, pp. 740\u2013748, 2000.","journal-title":"IEEE Trans. Computers"},{"key":"26_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology-CRYPTO\u201991","author":"N. Koblitz","year":"1992","unstructured":"N. Koblitz, \u201cCM-curves with good cryptographic properties,\u201d Advances in Cryptology-CRYPTO\u201991, LNCS 576, pp. 279\u2013287, Springer-Verlag, 1992."},{"key":"26_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-48071-4_24","volume-title":"Advances in Cryptology-CRYPTO\u201992","author":"W. Meier","year":"1993","unstructured":"W. Meier and O. Staffelbach, \u201cEfficient multiplication on certain non-supersingular elliptic curves,\u201d Advances in Cryptology-CRYPTO\u201992, LNCS 740, pp. 333\u2013344, Springer-Verlag, 1993."},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain and J. Olivos, \u201cSpeeding up the computations on an elliptic curve using addition-subtraction chains,\u201d Theoretical Informatics and Applications, vol. 24, pp. 531\u2013543, 1990.","journal-title":"Theoretical Informatics and Applications"},{"key":"26_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48405-1_3","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"P. Nguyen","year":"1999","unstructured":"P. Nguyen and J. Stern, \u201cThe hardness of the hidden subset sum problem and its cryptographic implications,\u201d Advances in Cryptology-CRYPTO\u201999, LNCS 1666, pp. 31\u201346, Springer-Verlag, 1999."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"A. Pinkus and S. Zafrany, Fourier Series and Integral Transforms, Cambridge UniversityPress, 1997.","DOI":"10.1017\/CBO9781139173117"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0065-2458(08)60610-5","volume":"1","author":"G. W. Reitwiesner","year":"1960","unstructured":"G. W. Reitwiesner, \u201cBinaryarithmetic,\u201d Advances in Computers, vol. 1, pp. 231\u2013308, 1960.","journal-title":"Advances in Computers"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"J. H. Silverman, The Arithmetic of Elliptic Curves, GTM 106, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"26_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology-CRYPTO\u201997","author":"J. A. Solinas","year":"1997","unstructured":"J. A. Solinas, \u201cAn improved algorithm for arithmetic on a familyof elliptic curves,\u201d Advances in Cryptology-CRYPTO\u201997, LNCS 1294, pp. 357\u2013371, Springer-Verlag, 1997."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"J. H. van Lint, Introduction to Coding Theory, GTM 86, Springer-Verlag, 3rd edition, 1999.","DOI":"10.1007\/978-3-642-58575-3"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44586-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T16:06:01Z","timestamp":1596902761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44586-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540416586","9783540445869"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-44586-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"5 June 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}