{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:22:42Z","timestamp":1742386962908},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540430667"},{"type":"electronic","value":"9783540455370"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45537-x_12","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:29:27Z","timestamp":1180906167000},"page":"151-164","source":"Crossref","is-referenced-by-count":12,"title":["Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Jean-S\u00e9bastien","family":"Coron","sequence":"first","affiliation":[]},{"given":"David","family":"M\u2019Ra\u00efhi","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Tymen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,20]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"V. Boyko, M. Peinado, and R. Venkatesan. Speeding up discrete log and factoring based schemes via precomputations. In Advances in Cryptology\u2014Eurocrypt\u2019 98, pages 221\u2013235. Springer Verlag, 1998.","DOI":"10.1007\/BFb0054129"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"D.M. Gordon. A survey of fast exponentiation methods. Journal of Algorithms, 27:129\u2013146, 1998.","journal-title":"Journal of Algorithms"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"B.S. Kaliski Jr. and T.L. Yin. Storage-efficient finite field basis conversion. In Selected areas in Cryptography\u2014SAC\u201998, volume 1556, 1998.","DOI":"10.1007\/3-540-48892-8_7"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203\u2013209, 1987.","journal-title":"Mathematics of Computation"},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","first-page":"279","volume-title":"Advances in Cryptology\u2014Crypto\u2019 91","author":"N. Koblitz","year":"1991","unstructured":"N. Koblitz. CM-curves with good cryptographic properties. In Joan Feigenbaum, editor, Advances in Cryptology\u2014Crypto\u2019 91, pages 279\u2013287, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 576."},{"key":"12_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-48071-4_24","volume-title":"Advances in Cryptology\u2014Crypto\u2019 92","author":"W. Meier","year":"1993","unstructured":"W. Meier and O. Staffelbach. Efficient multiplication on certain non-supersingular elliptic curves. In Advances in Cryptology\u2014Crypto\u2019 92, volume LNCS 740, pages 333\u2013344. Springer Verlag, 1993."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"A.J. Menezes. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, 1993.","DOI":"10.1007\/978-1-4615-3198-2"},{"key":"12_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Proceedings of Crypto 85","author":"V.S. Miller","year":"1986","unstructured":"V.S. Miller. Use of elliptic curves in cryptography. In Springer Verlag, editor, Proceedings of Crypto 85, volume LNCS 218, pages 417\u2013426. Springer Verlag, 1986."},{"key":"12_CR9","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain and J. Olivos. Speeding up the computation of an elliptic curve using addition-subtraction chains. Inform. Theory Appl., 24:531\u2013543, 1990.","journal-title":"Inform. Theory Appl."},{"key":"12_CR10","unstructured":"P. Nguyen. La g\u00e9om\u00e9trie des nombres en cryptologie. PhD thesis, Universit\u00e9 de Paris 7, 1999."},{"key":"12_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-48405-1_3","volume-title":"Advances in Cryptology\u2014Crypto\u201999","author":"P. Nguyen","year":"1999","unstructured":"P. Nguyen and J. Stern. The hardness of the hidden subset sum problem and its cryptographic implications. In Michael Wiener, editor, Advances in Cryptology\u2014Crypto\u201999, pages 31\u201346, Berlin, 1999. Springer-Verlag. Lecture Notes in Computer Science."},{"key":"12_CR12","unstructured":"Phong Nguyen, Igor Shparlinsky, and Jacques Stern. Distribution of Modular Subset Sums and the Security of the Server Aided Exponentiation. In Workshop on Cryptography and Computational Number Theory, 1999."},{"key":"12_CR13","unstructured":"IEEE P1363. Standard Specifications for Public Key Cryptography. August 1998."},{"key":"12_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/3-540-46416-6_6","volume-title":"Advances in Cryptology\u2014EuroCrypt\u2019 91","author":"P. Rooij de","year":"1991","unstructured":"P. de Rooij. On the security of the Schnorr scheme using preprocessing. In Donald W. Davies, editor, Advances in Cryptology\u2014EuroCrypt\u2019 91, pages 71\u201380, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science Volume 547."},{"key":"12_CR15","series-title":"Lect Notes Comput Sci","first-page":"435","volume-title":"Advances in Cryptology\u2014EuroCrypt\u2019 93","author":"P. Rooij de","year":"1993","unstructured":"P. de Rooij. On Schnorr\u2019s preprocessing for digital signature schemes. In Tor Helleseth, editor, Advances in Cryptology\u2014EuroCrypt\u2019 93, pages 435\u2013439, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 765."},{"key":"12_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/BFb0053453","volume-title":"Advances in Cryptology\u2014EuroCrypt\u2019 94","author":"P. Rooij de","year":"1995","unstructured":"P. de Rooij. Efficient exponentiation using precomputation and vector addition chains. In Alfredo De Santis, editor, Advances in Cryptology\u2014EuroCrypt\u2019 94, pages 389\u2013399, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950."},{"key":"12_CR17","series-title":"Lect Notes Comput Sci","first-page":"688","volume-title":"Advances in Cryptology\u2014Euro-Crypt\u201989","author":"C. P. Schnorr","year":"1989","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. In Jean-Jacques Quisquater and Joos Vandewalle, editors, Advances in Cryptology\u2014Euro-Crypt\u201989, pages 688\u2013689, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 434."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C. P. Schnorr","year":"1991","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. Journal of Cryptology, 4:161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"12_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology\u2014Crypto\u2019 97","author":"J.A. Solinas","year":"1997","unstructured":"J.A. Solinas. An improved algorithm for arithmetic on a family of elliptic curves. In BurtKaliski, editor, Advances in Cryptology\u2014Crypto\u2019 97, pages 357\u2013371, Berlin, 1997. Springer-Verlag. Lecture Notes in Computer Science Volume 1294."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45537-X_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T04:43:31Z","timestamp":1683866611000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45537-X_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430667","9783540455370"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45537-x_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}