{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T14:08:35Z","timestamp":1778335715914,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540424567","type":"print"},{"value":"9783540446477","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-44647-8_11","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T19:28:14Z","timestamp":1194982094000},"page":"190-200","source":"Crossref","is-referenced-by-count":211,"title":["Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms"],"prefix":"10.1007","author":[{"given":"Robert P.","family":"Gallant","sequence":"first","affiliation":[]},{"given":"Robert J.","family":"Lambert","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Vanstone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L. Babai","year":"1986","unstructured":"L. Babai, \u201cOn Lov\u00e1sz\u2019 Lattice Reduction and the Nearest Lattice Point Problem\u201d, Combinatorica 6 (1986), 1\u201313","journal-title":"Combinatorica"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"D. Bailey and C. Paar, \u201cOptimal extension fields for fast arithmetic in public-key algorithms\u201d, Advances in Cryptology-Crypto\u2019 98, 1998, 472\u2013485.","DOI":"10.1007\/BFb0055748"},{"key":"11_CR3","unstructured":"D. Bleichenbacher, \u201cOn the generation of DSA one-time keys\u201d, preprint, November 2000."},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D. Chudnovsky","year":"1987","unstructured":"D. Chudnovsky and G. Chudnovsky, \u201cSequences of numbers generated by addition in formal groups and new primality and factoring tests\u201d, Advances in Applied Mathematics, 7 (1987), 385\u2013434.","journal-title":"Advances in Applied Mathematics"},{"key":"11_CR5","unstructured":"H. Cohen, A Course in Computational Algebraic Number Theory, Springer-Verlag, 3rd printing, 1996."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"H. Cohen, A. Miyaji and T. Ono, \u201cEfficient elliptic curve exponentiation using mixed coordinates\u201d, Advances in Cryptology-Asiacrypt\u2019 98, 1998, 51\u201365.","DOI":"10.1007\/3-540-49649-1_6"},{"key":"11_CR7","unstructured":"D. Cox, Primes of the Form x\n                  2 + ny2. Fermat, Class Field Theory and Complex Multiplication, Wiley, 1989."},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey and H. R\u00fcck, \u201cA remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves\u201d, Mathematics of Computation, 62 (1994), 865\u2013874.","journal-title":"Mathematics of Computation"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1090\/S0025-5718-99-01119-9","volume":"69","author":"R. Gallant","year":"2000","unstructured":"R. Gallant, R. Lambert and S. Vanstone, \u201cImproving the parallelized Pollard lambda search on anomalous binary curves\u201d, Mathematics of Computation, 69 (2000), 1699\u20131705.","journal-title":"Mathematics of Computation"},{"key":"11_CR10","first-page":"135","volume":"7","author":"D. Gollmann","year":"1996","unstructured":"D. Gollmann, Y. Han and C. Mitchell, \u201cRedundant integer representations and fast exponentiation\u201d, Designs, Codes and Cryptography, 7 (1996), 135\u2013151.","journal-title":"Designs, Codes and Cryptography"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. Gordon","year":"1998","unstructured":"D. Gordon, \u201cA survey of fast exponentiation methods\u201d, Journal of Algorithms, 27 (1998), 129\u2013146.","journal-title":"Journal of Algorithms"},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Proceedings of CHES 2000","author":"D. Hankerson","year":"2000","unstructured":"D. Hankerson, J. Hernandez and A. Menezes, \u201cSoftware implementation of elliptic curve cryptography over binary fields\u201d, Proceedings of CHES 2000, LNCS 1965 (2000), 1\u201324."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"N. Koblitz, \u201cCM-curves with good cryptographic properties\u201d, Advances in Cryptology-Crypto\u2019 91, 1992, 279\u2013287.","DOI":"10.1007\/3-540-46766-1_22"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"N. Koblitz, \u201cAn elliptic curve implementation of the finite field digital signature algorithm\u201d, Advances in Cryptology-Crypto\u2019 98, 1998, 327\u2013337.","DOI":"10.1007\/BFb0055739"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"C. Lim and P. Lee, \u201cMore flexible exponentiation with precomputation\u201d, Advances in Cryptology-Crypto\u2019 94, 1994, 95\u2013107.","DOI":"10.1007\/3-540-48658-5_11"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"A. Menezes, T. Okamoto and S. Vanstone, \u201cReducing elliptic curve logarithms to logarithms in a finite field\u201d, IEEE Transactions on Information Theory, 39 (1993), 1639\u20131646.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.","DOI":"10.1201\/9781439821916"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"A. Miyaji, T. Ono and H. Cohen, \u201cEfficient elliptic curve exponentiation\u201d, Proceedings of ICICS\u2019 97, 1997, 282\u2013290.","DOI":"10.1007\/BFb0028484"},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain and J. Olivos, \u201cSpeeding up the computations on an elliptic curve using addition-subtraction chains\u201d, Informatique Th\u00e9orique et Applications, 24 (1990), 531\u2013544.","journal-title":"Informatique Th\u00e9orique et Applications"},{"key":"11_CR20","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s001459900045","volume":"1","author":"V. M\u00fcller","year":"1998","unstructured":"V. M\u00fcller, \u201cFast multiplication in elliptic curves over small fields of characteristic two\u201d, Journal of Cryptology, 1 (1998), 219\u2013234.","journal-title":"Journal of Cryptology"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"P. Oorschot van","year":"1999","unstructured":"P. van Oorschot and M. Wiener, \u201cParallel collision search with cryptanalytic applications\u201d, Journal of Cryptology, 12 (1999), 1\u201328.","journal-title":"Journal of Cryptology"},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig and M. Hellman, \u201cAn improved algorithm for computing logarithms over GF(p) and its cryptographic significance\u201d, IEEE Transactions on Information Theory, 24 (1978), 106\u2013110.","journal-title":"IEEE Transactions on Information Theory"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J. Pollard","year":"1978","unstructured":"J. Pollard, \u201cMonte Carlo methods for index computation mod p\u201d, Mathematics of Computation, 32 (1978), 918\u2013924.","journal-title":"Mathematics of Computation"},{"key":"11_CR24","unstructured":"J. Proos, personal communication, March 2000."},{"key":"11_CR25","first-page":"81","volume":"47","author":"T. Satoh","year":"1998","unstructured":"T. Satoh and K. Araki, \u201cFermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves\u201d, Commentarii Mathematici Universitatis Sancti Pauli, 47 (1998), 81\u201392.","journal-title":"Commentarii Mathematici Universitatis Sancti Pauli"},{"key":"11_CR26","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1090\/S0025-5718-98-00887-4","volume":"67","author":"I. Semaev","year":"1998","unstructured":"I. Semaev, \u201dEvaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p\u201c, Mathematics of Computation, 67 (1998), 353\u2013356.","journal-title":"Mathematics of Computation"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, 1986.","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"11_CR28","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s001459900052","volume":"12","author":"N. Smart","year":"1999","unstructured":"N. Smart, \u201cThe discrete logarithm problem on elliptic curves of trace one\u201d, Journal of Cryptology, 12 (1999), 193\u2013196.","journal-title":"Journal of Cryptology"},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/PL00003820","volume":"12","author":"N. Smart","year":"1999","unstructured":"N. Smart, \u201cElliptic curve cryptosystems over small fields of odd characteristic\u201d, Journal of Cryptology, 12 (1999), 141\u2013151.","journal-title":"Journal of Cryptology"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"J. Solinas, \u201cAn improved algorithm for arithmetic on a family of elliptic curves\u201d, Advances in Cryptology-Crypto\u2019 97, 1997, 357\u2013371.","DOI":"10.1007\/BFb0052248"},{"key":"11_CR31","unstructured":"J. Solinas, \u201cGeneralized Mersenne numbers\u201d, Technical Report CORR 99-39, Dept. of C&O, University of Waterloo, 1999."},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J. Solinas","year":"2000","unstructured":"J. Solinas, \u201cEfficient arithmetic on Koblitz curves\u201d, Designs, Codes and Cryptography, 19 (2000), 195\u2013249.","journal-title":"Designs, Codes and Cryptography"},{"key":"11_CR33","unstructured":"WAP WTLS, Wireless Application Protocol Wireless Transport Layer Security Specification, Wireless Application Protocol Forum, February 1999. Drafts available at \n                    http:\/\/www.wapforum.org"},{"key":"11_CR34","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-48892-8_15","volume-title":"Selected Areas in Cryptography","author":"M. Wiener","year":"1999","unstructured":"M. Wiener and R. Zuccherato, \u201cFaster attacks on elliptic curve cryptosystems\u201d, Selected Areas in Cryptography, LNCS 1556 (1999), 190\u2013200."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44647-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T06:52:52Z","timestamp":1551077572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44647-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540424567","9783540446477"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/3-540-44647-8_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}