{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:24:54Z","timestamp":1725488694483},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540546207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46416-6_27","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T14:02:07Z","timestamp":1186408927000},"page":"316-327","source":"Crossref","is-referenced-by-count":9,"title":["Non Supersingular Elliptic Curves for Public Key Cryptosystems"],"prefix":"10.1007","author":[{"given":"T.","family":"Beth","sequence":"first","affiliation":[]},{"given":"F.","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"27_CR1","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/49.17708","volume":"7","author":"T. Beth","year":"1989","unstructured":"T. Beth, D. Gollmann; Algorithm Engineering for Public Key Algorithms; IEEE Journal on Selected Areas in Comm., Vol. 7, No. 4, 1989, pp. 458\u2013466.","journal-title":"IEEE Journal on Selected Areas in Comm."},{"key":"27_CR2","unstructured":"T. Beth, W. Geiselmann, F. Schaefer; Arithmetics on Elliptic Curves; Algebraic and Combinatorical Coding Theory, 2nd int. workshop, Leningrad, 1990, pp. 28\u201333."},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"IT 30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith; Fast evaluation of logarithms in fields of characteristic two; IEEE Trans. Inform. Theory, IT 30, 1984, pp. 587\u2013594.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M. Deuring","year":"1941","unstructured":"M. Deuring; Die Typen der Multiplikatorenringe elliptischer Funktionenkoerper; Abh. Math. Sem. Hamburg, Bd. 14, 1941, pp. 197\u2013272.","journal-title":"Abh. Math. Sem. Hamburg"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT 22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M. Hellman; New directions in cryptography; IEEE Trans. Inform. Theory, IT 22, 1976, pp. 644\u2013654.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT 31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal; A public key cryptosystem and a signature scheme based on discrete logarithms; IEEE Trans. Inform. Theory, IT 31, 1985, pp. 469\u2013472.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"177","key":"27_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz; Elliptic Curve Cryptosystems; Mathematics of Computation, Vol. 48, No177, 1987, pp. 203\u2013209.","journal-title":"Mathematics of Computation"},{"key":"27_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/BFb0030345","volume-title":"Advances in Cryptology-Auscrypt 90","author":"A. Menezes","year":"1990","unstructured":"A. Menezes, S. A. Vanstone; The Implementation fo Elliptic Curve Cryptosystems; Advances in Cryptology-Auscrypt 90, Springer LNCS 453, 1990, pp. 2\u201313."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"A. Menezes, T. Okamoto, S. A. Vanstone; Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field; University of Waterloo, preliminary version, sep. 1990.","DOI":"10.1145\/103418.103434"},{"key":"27_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology: Proceedings of Crypto 85","author":"V. S. Miller","year":"1986","unstructured":"V. S. Miller; Use of Elliptic Curves in Cryptography; Advances in Cryptology: Proceedings of Crypto 85, Springer LNCS 218, 1986, pp. 417\u2013426."},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"P. Montgomery","year":"1977","unstructured":"P. Montgomery; Speeding the Pollard and elliptic curve methods of factorization; Math. Comp., Vol. 48, 1977, pp 243\u2013264.","journal-title":"Math. Comp."},{"key":"27_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J. H. Silverman","year":"1986","unstructured":"J. H. Silverman; The Arithmetic of Elliptic Curves; Springer, New York, 1986."},{"key":"27_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/BF01389745","volume":"23","author":"J. T. Tate","year":"1974","unstructured":"J. T. Tate; The Arithmetic of Elliptic Curves; Inventiones math. 23, Springer, 1974, pp. 179\u2013206.","journal-title":"Inventiones math."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"W. C. Waterhouse, Abelian Varieties over finite fields; Ann. scient. Ec. Norm. Sup., 4th serie, 1969, pp. 521\u2013560.","DOI":"10.24033\/asens.1183"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46416-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T16:11:27Z","timestamp":1605629487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46416-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540546207"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-46416-6_27","relation":{},"subject":[]}}