{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:43:28Z","timestamp":1725486208541},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540431688"},{"type":"electronic","value":"9783540456643"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45664-3_22","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T17:32:07Z","timestamp":1180891927000},"page":"310-322","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Method of Multiplication on Certain Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Young-Ho","family":"Park","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sangho","family":"Oh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jongin","family":"Lim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maenghee","family":"Sung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2002,2,5]]},"reference":[{"key":"22_CR1","first-page":"33","volume":"46","author":"G. Cornacchia","year":"1908","unstructured":"G. Cornacchia, \u201cSu di un metodo per la risoluzione in numeri interi dell\u2019 equazione \u03c3 h n =0C h x n\u2212h y h = P\u201d, Giornale di Matematiche di Battaglini, 46 (1908), 33\u201390.","journal-title":"Giornale di Matematiche di Battaglini"},{"key":"22_CR2","unstructured":"P. Gaudry, F. Hess and N. Smart, \u201cConstructive and destructive facets of Weil descent on elliptic curves\u201d, to appear J. Cryptology."},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1090\/S0025-5718-99-01119-9","volume":"69","author":"R. Gallant","year":"2000","unstructured":"R. Gallant, R. Lambert, and S. Vanstone, \u201cImproving the parallelized Pollard lambda search on binary anomalous curves\u201d, Math. of Com., 69 (2000), 1699\u20131705.","journal-title":"Math. of Com."},{"key":"22_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology, CRYPTO 91","author":"N. Koblitz","year":"1992","unstructured":"N. Koblitz, \u201cCM-curves with good cryptographic properties\u201d, In Advances in Cryptology, CRYPTO 91, LNCS 576, Springer-Verlag (1992), 279\u2013287."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"W. Meier, O. Staffelbach, \u201cEfficient multiplication on certain nonsupersingular elliptic curves\u201d, Advances in Cryptology, Crypto\u201992, 333\u2013344.","DOI":"10.1007\/3-540-48071-4_24"},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s001459900045","volume":"11","author":"V. M\u00fcller","year":"1998","unstructured":"V. M\u00fcller, \u201cFast multiplication on elliptic curves over small fields of characteristic two\u201d, Journal of Cryptology, 11 (1998), 219\u2013234.","journal-title":"Journal of Cryptology"},{"key":"22_CR7","unstructured":"D. Shanks, \u201cFive number theoretic algorithms\u201d In Proc. 2nd Manitoba Conference on Numerical Mathematics (1972), 51\u201370."},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/PL00003820","volume":"12","author":"N.P. Smart","year":"1998","unstructured":"N.P. Smart, \u201cElliptic curve cryptosystems over small fields of odd characteristic\u201d, Journal of Cryptology, 12 (1998), 141\u2013151.","journal-title":"Journal of Cryptology"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J. Solinas","year":"2000","unstructured":"J. Solinas, \u201cEfficient arithmetic on Koblitz curves\u201d, Design, Codes and Cryptography, 19 (2000), 195\u2013249.","journal-title":"Design, Codes and Cryptography"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"I. Stewart, D. Tall, \u201cAlgebraic Number Theory\u201d, Chapman and Hall, Halsted Press, 1979.","DOI":"10.1007\/978-1-4615-6412-6"},{"key":"22_CR11","unstructured":"B. Vall\u00e9e,\u201cUne approche g\u00e9om\u00e9trique des algorithmes de r\u00e9duction des r\u00e9seaux en petite dimension\u201d, (1986) Th\u00e9se, Universit\u00e9 de Caen."},{"key":"22_CR12","unstructured":"M. Wiener and R. Zuccherato, \u2018Faster Attacks on Elliptic Curve Cryptosystems\u2019, contribution to IEEE P1363."}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45664-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:58:19Z","timestamp":1556456299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45664-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540431688","9783540456643"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45664-3_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}