{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T08:33:51Z","timestamp":1776846831247,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_22","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"279-287","source":"Crossref","is-referenced-by-count":190,"title":["CM-Curves with Good Cryptographic Properties"],"prefix":"10.1007","author":[{"given":"Neal","family":"Koblitz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"S. Goldwasser, J. Kilian, Almost all primes can be quickly certified, Proceedings of the 18th ACM Symp. Theory of Computing (1986), 316\u2013329.","DOI":"10.1145\/12130.12162"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, 1987.","DOI":"10.1007\/978-1-4684-0310-7"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic curve cryptosystems, Math. of Computation, 48 (1987), 203\u2013209.","journal-title":"Math. of Computation"},{"key":"22_CR4","first-page":"673","volume-title":"Handbook of Theoretical Computer Science, Vol. A, Algorithms and Complexity","author":"A. K. Lenstra","year":"1990","unstructured":"A. K. Lenstra and H. W. Lenstra, Jr., Algorithms in number theory, in: Handbook of Theoretical Computer Science, Vol. A, Algorithms and Complexity, ed. by j. van Leeuwen, Amsterdam: Elsevier (1990), 673\u2013715."},{"key":"22_CR5","first-page":"135","volume":"38","author":"A. Menezes","year":"1990","unstructured":"A. Menezes and S. A. Vanstone, Isomorphism classes of elliptic curves over finite fields of characteristic 2, Utilitas Mathematica, 38 (1990), 135\u2013154.","journal-title":"Utilitas Mathematica"},{"key":"22_CR6","unstructured":"A. Menezes and S. A. Vanstone, Elliptic curve cryptosystems and their implementation, to appear in J. Cryptology."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"A. Menezes, T. Okamoto, and S. A. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, Proceedings of the 23rd ACM Symp. Theory of Computing, 1991.","DOI":"10.1145\/103418.103434"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"V. Miller, Use of elliptic curves in cryptography, Advanced in Cryptology \u2014 Crypto\u2019 85, Springer-Verlag, 1986, 417\u2013426.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"22_CR9","unstructured":"F. Morain, Implementation of the Goldwasser-Kilian-Atkin primality testing algorithm, preprint."},{"key":"22_CR10","first-page":"531","volume":"24","author":"F. Morain","year":"1990","unstructured":"F. Morain and J. Olivos, Speeding up the computations on an elliptic curve using addition-subtraction chains, R.A.I.R.O. Technical Informatics and Applications, 24 (1990), 531\u2013543.","journal-title":"R.A.I.R.O. Technical Informatics and Applications"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/0166-218X(88)90090-X","volume":"22","author":"R. C. Mullin","year":"1988","unstructured":"R. C. Mullin, I. M. Onyszchuk, S. A. Vanstone, and R. M. Wilson, Optimal normal bases in GF(p n), Discrete Appl. Math., 22 (1988\/89), 149\u2013161.","journal-title":"Discrete Appl. Math."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:28Z","timestamp":1605647608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_22","relation":{},"subject":[]}}