{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T16:52:38Z","timestamp":1654015958303},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540430667","type":"print"},{"value":"9783540455370","type":"electronic"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45537-x_14","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:29:27Z","timestamp":1180906167000},"page":"181-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Two Topics in Hyperelliptic Cryptography"],"prefix":"10.1007","author":[{"given":"Florian","family":"Hess","sequence":"first","affiliation":[]},{"given":"Gadiel","family":"Seroussi","sequence":"additional","affiliation":[]},{"given":"Nigel P.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,12,20]]},"reference":[{"key":"14_CR1","unstructured":"X9.62 Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standards Institute, 1999."},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.2307\/2007876","volume":"48","author":"D.G. Cantor","year":"1987","unstructured":"D.G. Cantor. Computing in the Jacobian of a hyperelliptic curve. Math. Comp., 48, 95\u2013101, 1987.","journal-title":"Math. Comp."},{"key":"14_CR3","first-page":"281","volume":"15","author":"M. Fouquet","year":"2000","unstructured":"M. Fouquet, P. Gaudry and R. Harley. An extension of Satoh\u2019s algorithm and its implementation. J. Ramanujan Math. Soc., 15, 281\u2013318, 2000.","journal-title":"J. Ramanujan Math. Soc."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey and H.-G. R\u00fcck. A remark concerning m-divisibility and the discrete logarithm problem in the divisor class group of curves. Math. Comp., 62, 865\u2013874, 1994.","journal-title":"Math. Comp."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"G. Frey, Applications of arithmetical geometry to cryptographic constructions, Preprint, 2000.","DOI":"10.1007\/978-3-642-56755-1_13"},{"key":"14_CR6","unstructured":"S.D. Galbraith. Limitations of constructive Weil descent. To appear Proceedings of a Conference on Cryptography and Computational Number Theory,Warsaw, Sept 2000."},{"key":"14_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45539-6_2","volume-title":"Advances in Cryptology, EUROCRYPT 2000","author":"P. Gaudry","year":"2000","unstructured":"P. Gaudry. An algorithm for solving the discrete log problem on hyperelliptic curves. Advances in Cryptology, EUROCRYPT 2000, Springer-Verlag LNCS 1807, 19\u201334, 2000."},{"key":"14_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/10722028_18","volume-title":"ANTS-IV","author":"P. Gaudry","year":"2000","unstructured":"P. Gaudry and R. Harley. Counting points on hyperelliptic curves over finite fields. ANTS-IV, Springer-Verlag LNCS 1838, 313\u2013332, 2000."},{"key":"14_CR9","unstructured":"P. Gaudry, F. Hess and N.P. Smart. Constructive and destructive facets of Weil descent on elliptic curves. To appear J. Cryptology."},{"key":"14_CR10","unstructured":"K. Kedlaya. Counting points on hyperelliptic curves using Monsky-Washnitzer cohomology. Preprint 2001."},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48, 203\u2013209, 1987.","journal-title":"Math. Comp."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"N. Koblitz. Hyperelliptic cryptosystems. J. Cryptology, 1, 139\u2013150, 1989.","journal-title":"J. Cryptology"},{"key":"14_CR13","series-title":"Lect Notes Comput Sci","first-page":"47","volume-title":"Advances in Cryptology, CRYPTO\u2014\u201985","author":"V. Miller","year":"1986","unstructured":"V. Miller. Use of elliptic curves in cryptography. Advances in Cryptology, CRYPTO\u2014\u201985, Springer-Verlag LNCS 218, 47\u2013426, 1986."},{"key":"14_CR14","first-page":"247","volume":"15","author":"T. Satoh","year":"2000","unstructured":"T. Satoh. The canonical lift of an ordinary elliptic curve over a finite field and its point counting. J. Ramanujan Math. Soc., 15, 247\u2013270, 2000.","journal-title":"J. Ramanujan Math. Soc."},{"key":"14_CR15","unstructured":"B. Skjernaa. Satoh\u2019s algorithm in characteristic two. Preprint 2000."},{"key":"14_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-48910-X_12","volume-title":"Advances in Cryptology,EUROCRYPT\u2019 99","author":"N.P. Smart","year":"1999","unstructured":"N.P. Smart. On the performance of hyperelliptic cryptosystems. Advances in Cryptology,EUROCRYPT\u2019 99, Springer-Verlag, LNCS 1592, 165\u2013175, 1999."},{"key":"14_CR17","unstructured":"A.-M. Spallek, Kurven vom Geschlecht 2 und ihre Anwendung in Public-Key-Kryptosystemen, PhD Thesis, IEM Essen, 1994."},{"key":"14_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44987-6_1","volume-title":"Advances in Cryptology,EUROCRYPT 2001","author":"F. Vercauteren","year":"2001","unstructured":"F. Vercauteren, B. Preneel and J. Vandewalle. A memory e.cient version of Satoh\u2019s algorithm. Advances in Cryptology,EUROCRYPT 2001, Springer-Verlag, LNCS 2045, 1\u201313, 2001."},{"key":"14_CR19","unstructured":"A. Weng, Constructing hyperelliptic curves of genus 2 suitable for cryptography, Preprint, 2000."}],"container-title":["Selected Areas in Cryptography","Lecture Notes in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45537-X_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:41:49Z","timestamp":1558273309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45537-X_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540430667","9783540455370"],"references-count":19,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-45537-x_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"published":{"date-parts":[[2001]]},"assertion":[{"value":"20 December 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}