{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:41:33Z","timestamp":1753180893981,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053772"},{"type":"electronic","value":"9783030053789"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05378-9_12","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T01:03:38Z","timestamp":1543971818000},"page":"215-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Las Vegas Algorithm to Solve the Elliptic Curve Discrete Logarithm Problem"],"prefix":"10.1007","author":[{"given":"Ayan","family":"Mahalanobis","sequence":"first","affiliation":[]},{"given":"Vivek Mohan","family":"Mallick","sequence":"additional","affiliation":[]},{"given":"Ansari","family":"Abdullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ffa.2018.01.009","volume":"51","author":"A Amadori","year":"2018","unstructured":"Amadori, A., Pintore, F., Sala, M.: On the discrete logarithm problem for prime-field elliptic curve. Finite Fields Appl. 51, 168\u2013182 (2018)","journal-title":"Finite Fields Appl."},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-42045-0_17","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"DJ Bernstein","year":"2013","unstructured":"Bernstein, D.J., Lange, T.: Non-uniform cracks in the concrete: the power of free precomputation. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 321\u2013340. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42045-0_17"},{"key":"12_CR3","unstructured":"Fulton, W.: Algebraic Curves (2008, self-published)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10623-015-0146-7","volume":"78","author":"S Galbraith","year":"2016","unstructured":"Galbraith, S., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Crypt. 78, 51\u201378 (2016)","journal-title":"Des. Codes Crypt."},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-13039-2_24","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2014","author":"SD Galbraith","year":"2014","unstructured":"Galbraith, S.D., Gebregiyorgis, S.W.: Summation polynomial algorithms for elliptic curves in characteristic two. In: Meier, W., Mukhopadhyay, D. (eds.) INDOCRYPT 2014. LNCS, vol. 8885, pp. 409\u2013427. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13039-2_24"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1016\/j.jsc.2008.08.005","volume":"44","author":"P Gaudry","year":"2009","unstructured":"Gaudry, P.: Index calculus for abeian varieties of small dimension and the elliptic curve discrete logarithm problem. J. Symbolic Comput. 44, 1690\u20131702 (2009)","journal-title":"J. Symbolic Comput."},{"key":"12_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2189-8","volume-title":"Algebraic Geometry","author":"J Harris","year":"1992","unstructured":"Harris, J.: Algebraic Geometry. Springer, New York (1992). https:\/\/doi.org\/10.1007\/978-1-4757-2189-8"},{"key":"12_CR8","series-title":"Undergraduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77993-5","volume-title":"An Introduction to Mathematical Cryptography","author":"JH Silverman","year":"2008","unstructured":"Silverman, J.H., Pipher, J., Hoffstein, J.: An Introduction to Mathematical Cryptography. UTM. Springer, New York (2008). https:\/\/doi.org\/10.1007\/978-0-387-77993-5"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1023\/A:1008312401197","volume":"20","author":"MJ Jacobson","year":"2000","unstructured":"Jacobson, M.J., Koblitz, N., Silverman, J.H., Stein, A., Teske, E.: Analysis of the xedni calculus attack. Des. Codes Crypt. 20(1), 41\u201364 (2000)","journal-title":"Des. Codes Crypt."},{"key":"12_CR10","unstructured":"Milne, J.S.: Elliptic Curves. BookSurge Publishers (2006)"},{"key":"12_CR11","unstructured":"Semaev, I.: Summation polynomials and the discrete logarithm problem on elliptic curves (2004). https:\/\/eprint.iacr.org\/2004\/031"},{"key":"12_CR12","unstructured":"Shoup, V.: NTL: a library for doing number theory (2016). http:\/\/www.shoup.net\/ntl"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1008319518035","volume":"20","author":"JH Silverman","year":"2000","unstructured":"Silverman, J.H.: The xedni calculus and the elliptic curve discrete logarithm problem. Des. Codes Crypt. 20(1), 5\u201320 (2000)","journal-title":"Des. Codes Crypt."},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-48892-8_15","volume-title":"Selected Areas in Cryptography","author":"MJ Wiener","year":"1999","unstructured":"Wiener, M.J., Zuccherato, R.J.: Faster Attacks on Elliptic Curve Cryptosystems. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 190\u2013200. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48892-8_15"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05378-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:49:12Z","timestamp":1709822952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-05378-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053772","9783030053789"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05378-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"5 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isical.ac.in\/~indocrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}