{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:58Z","timestamp":1772283478867,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540440505","type":"print"},{"value":"9783540457084","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45708-9_22","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T08:48:16Z","timestamp":1192783696000},"page":"336-353","source":"Crossref","is-referenced-by-count":49,"title":["Supersingular Abelian Varieties in Cryptology"],"prefix":"10.1007","author":[{"given":"Karl","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Alice","family":"Silverberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"22_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/3-540-58691-1_39","volume-title":"Algorithmic number theory","author":"L. Adleman","year":"1994","unstructured":"L. Adleman, J. DeMarrais and M-D. Huang. A subexponential algorithm for discrete logarithms over the rational subgroup of the Jacobians of large genus hyperelliptic curves over finite fields, in Algorithmic number theory. Lecture Notes in Computer Science, Vol. 877. Springer-Verlag (1994) 28\u201340."},{"key":"22_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 Crypto 2001","author":"D. Boneh","year":"2001","unstructured":"D. Boneh and M. Franklin. Identity based encryption from the Weil pairing, in Advances in Cryptology \u2014 Crypto 2001. Lecture Notes in Computer Science, Vol. 2139. Springer-Verlag (2001) 213\u2013229."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"D. Boneh, B. Lynn and H. Shacham. Short signatures from the Weil pairing, in Advances in Cryptology \u2014 Asiacrypt 2001. Lect. Notes in Comp. Sci. 2248 (2001), Springer-Verlag, 514\u2013532.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"22_CR4","first-page":"41","volume":"385","author":"R. Coleman","year":"1988","unstructured":"R. Coleman and W. McCallum, Stable reduction of Fermat curves and Jacobi sum Hecke characters. J. Reine Angew. Math. 385 (1988) 41\u2013101.","journal-title":"J. Reine Angew. Math"},{"key":"22_CR5","unstructured":"D. Cox, J. Little and D. O\u2019shea. Ideals, varieties, and algorithms: an introduction to computational algebraic geometry and commutative algebra. Springer-Verlag (1997)."},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"G. Frey. Applications of arithmetical geometry to cryptographic constructions, in Finite fields and applications (Augsburg, 1999). Springer-Verlag (2001) 128\u2013161.","DOI":"10.1007\/978-3-642-56755-1_13"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G. Frey","year":"1999","unstructured":"G. Frey, M. M\u00fcller and H-G. R\u00fcck. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inform. Theory 45 (1999) 1717\u20131719.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"G. Frey and H-G. R\u00fcck. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp. 62 (1994) 865\u2013874.","journal-title":"Math. Comp."},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology \u2014 Asiacrypt 2001","author":"S. Galbraith","year":"2001","unstructured":"S. Galbraith. Supersingular curves in cryptography, in Advances in Cryptology \u2014 Asiacrypt 2001. Lecture Notes in Computer Science, Vol. 2248. Springer-Verlag (2001) 495\u2013513."},{"key":"22_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-46035-7_3","volume-title":"Advances in Cryptology \u2014 Eurocrypt 2002","author":"S. Galbraith","year":"2002","unstructured":"S. Galbraith, F. Hess and N. P. Smart. Extending the GHS Weil descent attack, in Advances in Cryptology \u2014 Eurocrypt 2002. Lecture Notes in Computer Science, Vol. 2332. Springer-Verlag (2002) 29\u201344."},{"key":"22_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-45539-6_2","volume-title":"Advances in Cryptology \u2014 Eurocrypt 2000","author":"P. Gaudry","year":"2000","unstructured":"P. Gaudry. A variant of the Adleman-DeMarrais-Huang algorithm and its application to small genera, in Advances in Cryptology \u2014 Eurocrypt 2000. Lecture Notes in Computer Science, Vol. 1807. Springer-Verlag (2000) 19\u201334."},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-001-0011-x","volume":"15","author":"P. Gaudry","year":"2002","unstructured":"P. Gaudry, F. Hess and N. P. Smart. Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptology 15 (2002) 19\u201346.","journal-title":"J. Cryptology"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.2969\/jmsj\/02010083","volume":"20","author":"T. Honda","year":"1968","unstructured":"T. Honda. Isogeny classes of abelian varieties over finite fields. J. Math. Soc. Japan 20 (1968) 83\u201395.","journal-title":"J. Math. Soc. Japan"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"B. Huppert and N. Blackburn. Finite groups II. Springer-Verlag (1982).","DOI":"10.1007\/978-3-642-67994-0"},{"key":"22_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory (ANTS-IV)","author":"A. Joux","year":"2000","unstructured":"A. Joux. A one round protocol for tripartite Diffie-Hellman, in Algorithmic Number Theory (ANTS-IV), Leiden, The Netherlands, July 2\u20137, 2000, Lecture Notes in Computer Science, Vol. 1838. Springer-Verlag (2000) 385\u2013394."},{"key":"22_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology \u2014 Crypto 2000","author":"A. K. Lenstra","year":"2000","unstructured":"A. K. Lenstra and E. R. Verheul. The XTR public key system, in Advances in Cryptology \u2014 Crypto 2000. Lecture Notes in Computer Science, Vol. 1880. Springer-Verlag (2000) 1\u201319."},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. J. Menezes","year":"1993","unstructured":"A. J. Menezes, T. Okamoto and S. A. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 39 (1993) 1639\u20131646.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"22_CR18","unstructured":"R. Sakai, K. Ohgishi and M. Kasahara, Cryptosystems based on pairing. SCIS2000 (The 2000 Symposium on Cryptography and Information Security), Okinawa, Japan, January 26\u201328, 2000, C20."},{"key":"22_CR19","doi-asserted-by":"crossref","DOI":"10.1515\/9781400883943","volume-title":"Abelian varieties with complex multiplication and modular functions","author":"G. Shimura","year":"1998","unstructured":"G. Shimura. Abelian varieties with complex multiplication and modular functions. Princeton Univ. Press, Princeton, NJ (1998)."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"J. Silverman. The arithmetic of elliptic curves. Springer-Verlag (1986).","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"J. Tate. Classes d\u2019isog\u00e9nie des vari\u00e9t\u00e9s ab\u00e9liennes sur un corps fini (d\u2019apr\u00e8s T. Honda), in S\u00e9minaire Bourbaki, 1968\/69, Soc. Math. France, Paris (1968) 95\u2013110.","DOI":"10.1007\/BFb0058807"},{"key":"22_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45682-1_31","volume-title":"Advances in Cryptology \u2014 Asiacrypt 2001","author":"E. R. Verheul","year":"2001","unstructured":"E. R. Verheul. Self-blindable credential certificates from the Weil pairing, in Advances in Cryptology \u2014 Asiacrypt 2001, Lecture Notes in Computer Science, Vol. 2248. Springer-Verlag (2001) 533\u2013551."},{"key":"22_CR23","volume-title":"Progress in Math","author":"A. Weil","year":"1982","unstructured":"A. Weil. Adeles and algebraic groups. Progress in Math. 23, Birkh\u00e4user, Boston (1982)."},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1006\/jnth.1999.2463","volume":"81","author":"H. J. Zhu","year":"2000","unstructured":"H. J. Zhu. Group structures of elementary supersingular abelian varieties over finite fields. J. Number Theory 81 (2000) 292\u2013309.","journal-title":"J. Number Theory"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45708-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T21:27:30Z","timestamp":1556918850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45708-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540440505","9783540457084"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-45708-9_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]}}}