{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T05:59:45Z","timestamp":1759730385994},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_25","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"345-357","source":"Crossref","is-referenced-by-count":52,"title":["Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method"],"prefix":"10.1007","author":[{"given":"Kenji","family":"Koyama","sequence":"first","affiliation":[]},{"given":"Yukio","family":"Tsuruoka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Bos, J. and Coster, M: \u201cAddition chain heuristics\u201d Proc. of CRYPTO\u201989 (1989)."},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Brickell, E. F.: \u201cA fast modular multiplication algorithm with application to two key cryptography\u201d Proc. of CRYPTO\u201982 (1982).","DOI":"10.1007\/978-1-4757-0602-4_5"},{"key":"25_CR3","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., and Wilson, D.: \u201cFast exponentiation with precomputation\u201d Proc. of EUROCRYPT\u201992 (1992)."},{"issue":"6","key":"25_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W. and Hellman, M.E.: \u201cNew directions in cryptography\u201d, IEEE Transactions on Information Theory, Vol. 22, No. 6, (1976), pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1137\/0210047","volume":"3","author":"P. Downey","year":"1981","unstructured":"Downey, P. Leony, B. and Sethi, R: \u201cComputing sequences with addition chains\u201d, Siam J. Comput. 3 (1981) pp. 638\u2013696.","journal-title":"Siam J. Comput."},{"issue":"4","key":"25_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: \u201cA public key cryptosystem and a signature scheme based on the discrete logarithm\u201d, IEEE Transactions on Information Theory, Vol. 31, No. 4, (1985), pp. 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Goldwasser, S. and Killian, J.: \u201cAlmost all primes can be quickly certified\u201d, Proc. 18th STOC. Berkeley, (1986), pp. 316\u2013329.","DOI":"10.1145\/12130.12162"},{"issue":"17","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1049\/el:19890785","volume":"25","author":"J. Jedwab","year":"1989","unstructured":"Jedwab, J. and Mitchell, C, J.: \u201cMinimum weight modified signed-digit representations and fast exponentiation\u201d, Electronics Letters Vol. 25, No. 17, (1989), pp. 1171\u20131172.","journal-title":"Electronics Letters"},{"key":"25_CR9","unstructured":"Koyama, K. Maurer, U. Okamoto, T and Vanstone, S, A: \u201cNew public-key schemes based on elliptic curves over the ring Z n\u201d, Proc. of CRYPTO\u201991 (1991)."},{"key":"25_CR10","unstructured":"Knuth, D.E.: \u201cSeminumerical algorithm (arithmetic)\u201d The Art of Computer Programming Vol.2, Addison Wesley, (1969)."},{"key":"25_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0310-7","volume-title":"A course in number theory and cryptography","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: A course in number theory and cryptography, Berlin: Springer-Verlag, (1987)."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H. W. Lenstra Jr.","year":"1987","unstructured":"Lenstra, H. W. Jr.: \u201cFactoring integers with elliptic curves\u201d, Ann. of Math. 126 (1987), pp. 649\u2013673.","journal-title":"Ann. of Math."},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: \u201cSpeeding the Pollard and elliptic curve methods of factorization\u201d, Math. Comp. 48, (1987), pp. 243\u2013264.","journal-title":"Math. Comp."},{"issue":"6","key":"25_CR14","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"Morain, F. and Olivos, J.: \u201cSpeeding up the computations on an elliptic curve using addition-subtraction chains\u201d Theoretical Informatics and Applications Vol. 24, No. 6 (1990) pp. 531\u2013544.","journal-title":"Theoretical Informatics and Applications"},{"issue":"2","key":"25_CR15","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L. Shamir, A. and Adleman, L.: \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Communications of the ACM, Vol. 21, No. 2, (1978), pp. 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Yacobi, Y.: \u201cExponentiating faster with addition chains\u201d Proc. of EUROCRYPT\u201990 (1990).","DOI":"10.1007\/3-540-46877-3_20"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:15Z","timestamp":1605647715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_25","relation":{},"subject":[]}}