{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:19Z","timestamp":1725484339139},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_16","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T20:53:10Z","timestamp":1179607990000},"page":"190-202","source":"Crossref","is-referenced-by-count":9,"title":["Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $$ \\mathbb{F}_q $$"],"prefix":"10.1007","author":[{"given":"Y.","family":"Choie","sequence":"first","affiliation":[]},{"given":"D.","family":"Yun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"L. M. Adleman, A subexponential Algorithm for the discrete logarithm problem with applications to cryptography, Proc. 20th IEEE Found. Comp. Sci. Symp., 55\u201360, 1979.","DOI":"10.1109\/SFCS.1979.2"},{"key":"16_CR2","volume-title":"Grundlehren Math. Wiss. 267","author":"E. Arabello","year":"1985","unstructured":"E. Arabello, et al., Geometry of algebraic curves, Grundlehren Math. Wiss. 267, Springer-Verlag, New York, 1985."},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Information Theory, vol 22, 644\u2013654, 1976.","journal-title":"IEEE Trans. Information Theory"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Information Theory, vol 31, 469\u2013472, 1985.","journal-title":"IEEE Trans. Information Theory"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey and H.-G. R\u00fcck, A remark concerning m-divisibility and the discrete logarithm problem in the divisor class group of curves, Math. Comp., 62, 865\u2013874, 1994.","journal-title":"Math. Comp."},{"key":"16_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45539-6_2","volume-title":"Advances in Cryptology, EUROCRYPT 2000","author":"P. Gaudry","year":"2000","unstructured":"P. Gaudry, A variant of the Adleman-DeMarrais-Huang algorithm and its application to small genera, In Advances in Cryptology, EUROCRYPT 2000, Springer-Verlag LNCS 1807, 19\u201334, 2000."},{"key":"16_CR7","unstructured":"L. Hern\u00e1ndez Encinas, A. J. Menezes, and J. Mu\u00f1oz Masqu\u00e9, Isomorphism classes of genus-2 hyperelliptic curves over finite fields, to appear in Applicable Algebra in Engineering, Communication and Computing."},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic curve cryptosystems, Math. of Comp. vol 48, 203\u2013209, 1987.","journal-title":"Math. of Comp."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"N. Koblitz, Hyperelliptic cryptosystems, J. Crypto., 1, 139\u2013150, 203\u2013209, 1989.","journal-title":"J. Crypto."},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"729","DOI":"10.2307\/2154650","volume":"342","author":"P. Lockhart","year":"1994","unstructured":"P. Lockhart, On the discriminant of a hyperelliptic curve, Trans. Amer. Math. Soc. 342,2, 729\u2013752, 1994.","journal-title":"Trans. Amer. Math. Soc."},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"A. Menezes and N. Koblitz, Elliptic curve public key crypto systems, Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"16_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in cryptology-Crypto\u2019 85","author":"V. Miller","year":"1986","unstructured":"V. Miller, Uses of elliptic curves in cryptography, Advances in cryptology-Crypto\u2019 85, LNCS 218, 417\u2013426, 1986."},{"key":"16_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J. Silverman","year":"1986","unstructured":"J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, 1986."},{"key":"16_CR14","unstructured":"H. Stichtenoth, Algebraic Function Fields and Codes, Springer-Verlag, 1993."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T20:23:38Z","timestamp":1550348618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}