{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:13:08Z","timestamp":1742397188764},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438632"},{"type":"electronic","value":"9783540454557"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45455-1_24","type":"book-chapter","created":{"date-parts":[[2007,6,12]],"date-time":"2007-06-12T05:07:47Z","timestamp":1181624867000},"page":"292-307","source":"Crossref","is-referenced-by-count":8,"title":["Fast Elliptic Curve Point Counting Using Gaussian Normal Basis"],"prefix":"10.1007","author":[{"given":"Hae Young","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jung Youl","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]},{"given":"Je Hong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jae Heon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sang Geun","family":"Hahn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"24_CR1","unstructured":"A. O. L. Atkin, The number of points on an elliptic curve modulo a prime, Series of e-mails to the NUMBERTHRY mailing list, 1992."},{"key":"24_CR2","unstructured":"L. F. Blake, R. M. Roth, and G. Seroussi, Efficient Arithmetic in GF(2n) through Palindromic Representation, Tech. Rep. HPL-98-134, Hewlett Packard, 1998."},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, Cambridge Univ. Press, 2000.","DOI":"10.1017\/CBO9781107360211"},{"key":"24_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-61581-4_41","volume-title":"Algorithmic number theory-ANTS-II","author":"J. M. Couveignes","year":"1996","unstructured":"J. M. Couveignes, Computing l-isogenies using the p-Torsion, Algorithmic number theory-ANTS-II, LNCS 1122, pp. 59\u201366, Springer-Verlag, 1996."},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M. Deuring","year":"1941","unstructured":"M. Deuring, Die Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper. Abh. Math. Sem. Univ. Hamburg, 14, pp. 197\u2013272, 1941.","journal-title":"Abh. Math. Sem. Univ. Hamburg"},{"key":"24_CR6","series-title":"AMS\/IP Stud. Adv. Math.","first-page":"21","volume-title":"Computational perspective on number theory","author":"N. D. Elkies","year":"1998","unstructured":"N. D. Elkies, Elliptic and modular curves over finite fields and related computational issues, In D.A. Buell and eds. J.T. Teitelbaum, editors, Computational perspective on number theory, AMS\/IP Stud. Adv. Math., 7, pp. 21\u201378, Province, RI: AMS, 1998. Proceedings of a Conference in Honor of A.O.L. Atkin."},{"key":"24_CR7","first-page":"281","volume":"15","author":"M. Fouquet","year":"2000","unstructured":"M. Fouquet, P. Gaudry, and R. Harley, On Satoh\u2019s algorithm and its implementation, J. Ramanujan Math. Soc., 15, pp. 281\u2013318, 2000.","journal-title":"J. Ramanujan Math. Soc."},{"key":"24_CR8","unstructured":"R. Harley, Counting points with the arithmetic-geometric mean(joint work with J. F. Mestre and P. Gaudry), Eurocrypt 2001, Rump session, 2001."},{"key":"24_CR9","first-page":"209","volume":"225","author":"C. Hooley","year":"1967","unstructured":"C. Hooley, On Artin\u2019s conjecture, J. Reine Angew Math., 225, pp. 209\u2013220, 1967.","journal-title":"J. Reine Angew Math."},{"key":"24_CR10","unstructured":"K. Kedlaya, Counting points on hyperelliptic curves using Monsky-Wash-nitzer cohomology, available at http:\/\/arXiv.org\/abs\/math\/0105031 ."},{"issue":"177","key":"24_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1998","unstructured":"N. Koblitz, Elliptic curve cyptosystem, Math. Comp., 48(177), pp. 203\u2013209, 1998.","journal-title":"Math. Comp."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"S. Lang, Algebraic Number Theory, Springer-Verlag, 1994.","DOI":"10.1007\/978-1-4612-0853-2"},{"key":"24_CR13","unstructured":"J. Lubin, J. P. Serre, and J. Tate. Elliptic curves and formal group. Lecture notes in prepared in connection with the seminars held at the Summer institute on Algebraic Geometry, Whitney Estate, Woods Hole, Massachusetts, 1964."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"24_CR15","unstructured":"A. Menezes, Application of Finite Fields, Kluwer Academic Publisher, 1993."},{"key":"24_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/BFb0026949","volume-title":"Crypto\u201986","author":"V. Miller","year":"1987","unstructured":"V. Miller, Use of elliptic curves in cryptography. Crypto\u201986, LNCS 263, pp. 417\u2013426, 1987."},{"issue":"4","key":"24_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF03023749","volume":"10","author":"M. R. Murty","year":"1988","unstructured":"M. R. Murty, Artin\u2019s conjecture for primitive roots, Math. Intelligencer, 10(4), pp. 59\u201367, 1988.","journal-title":"Math. Intelligencer"},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1137\/0202007","volume":"2","author":"M. S. Parterson","year":"1973","unstructured":"M. S. Parterson and L. J. Stockmeyer, On the number of nonscalar multiplications necessary to evaluate polynomials. SIMA J. Comput., 2, pp. 60\u201367, 1973.","journal-title":"SIMA J. Comput."},{"key":"24_CR19","first-page":"247","volume":"15","author":"T. Satoh","year":"2000","unstructured":"T. Satoh, The canonical lift of an ordinary elliptic curve over a finite field and its point counting, J. Ramanujan Math. Soc., 15, pp. 247\u2013270, 2000.","journal-title":"J. Ramanujan Math. Soc."},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"483","DOI":"10.2307\/2007968","volume":"44","author":"R. Schoof","year":"1985","unstructured":"R. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Math. Comput., 44, pp. 483\u2013494, 1985.","journal-title":"Math. Comput."},{"key":"24_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/3-540-48059-5_12","volume-title":"Crytographic Hardware and Embedded Systems-CHES\u201999","author":"J. H. Silverman","year":"1999","unstructured":"J. H. Silverman, Fast Multiplication in Finite Fields GF(2N), Crytographic Hardware and Embedded Systems-CHES\u201999, LNCS 1717, pp. 122\u2013134, Springer-Verlag, 1999."},{"key":"24_CR22","unstructured":"B. Skjernaa, Satoh Point Counting in characteristic 2. To appear in Math. Comp."},{"key":"24_CR23","unstructured":"T. Satoh, B. Skjernaa, and Y. Taguchi, Fast Computation of Canonical Lifts of Elliptic curves and its Application to Point Counting, Preprint, 2001."},{"key":"24_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44987-6_1","volume-title":"Advances in Cryptology-Eurocrypt 2001","author":"F. Vercauteren","year":"2001","unstructured":"F. Vercauteren, B. Preneel, and J. Vandewalle, A Memory Efficient Version of Satoh\u2019s Algorithm. Advances in Cryptology-Eurocrypt 2001, LNCS 2045, pp. 1\u201313, Springer-Verlag, 2001."}],"container-title":["Lecture Notes in Computer Science","Algorithmic Number Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45455-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T01:29:08Z","timestamp":1556501348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45455-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438632","9783540454557"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45455-1_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}