{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:42:18Z","timestamp":1726069338217},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_7","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"95-108","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementing Cryptography Pairings over Ordinary Pairing-Friendly Curves of Type $$ y^2 = x^5 +a \\, x$$"],"prefix":"10.1007","author":[{"given":"Mohammed","family":"Zitouni","sequence":"first","affiliation":[]},{"given":"Farid","family":"Mokrane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"issue":"177","key":"7_CR1","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"DG Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobian of a hyperelliptic curve. Math. Comput. 48(177), 95\u2013101 (1987)","journal-title":"Math. Comput."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-73489-5_7","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2007","author":"SD Galbraith","year":"2007","unstructured":"Galbraith, S.D., Hess, F., Vercauteren, F.: Hyperelliptic pairings. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 108\u2013131. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-73489-5_7"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/10722028_18","volume-title":"Algorithmic Number Theory","author":"P Gaudry","year":"2000","unstructured":"Gaudry, P., Harley, R.: Counting points on hyperelliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 313\u2013332. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/10722028_18"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/978-3-540-72540-4_25","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"R Granger","year":"2007","unstructured":"Granger, R., Hess, F., Oyono, R., Th\u00e9riault, N., Vercauteren, F.: Ate pairing on hyperelliptic curves. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 430\u2013447. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-72540-4_25"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/11792086_34","volume-title":"Algorithmic Number Theory","author":"R Granger","year":"2006","unstructured":"Granger, R., Page, D., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 480\u2013494. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11792086_34"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for Tripartite Diffie\u2013Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385\u2013393. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/10722028_23"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-17455-1_20","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"EJ Kachisa","year":"2010","unstructured":"Kachisa, E.J.: Generating more kawazoe-takahashi genus 2 pairing-friendly hyperelliptic curves. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 312\u2013326. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-17455-1_20"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-85538-5_12","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"M Kawazoe","year":"2008","unstructured":"Kawazoe, M., Takahashi, T.: Pairing-friendly hyperelliptic curves with ordinary Jacobians of Type $$y^2=x^5+ax$$. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 164\u2013177. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85538-5_12"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic cryptosystems. J. Cryptol. 1(3), 139\u2013150 (1989)","journal-title":"J. Cryptol."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Manin, J.I.: The Hasse-Witt matrix of an algebraic curve. In: Selected Papers of Yu I Manin, pp. 3\u201322. World Scientific (1996)","DOI":"10.1142\/9789812830517_0001"},{"issue":"5","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"AJ Menezes","year":"1993","unstructured":"Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39(5), 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR12","unstructured":"Miller, V., et al.: Short programs for functions on curves. 97(101\u2013102), 44 (1986, Unpublished manuscript)"},{"key":"7_CR13","volume-title":"Tata Lectures on Theta i, ii","author":"D Mumford","year":"1984","unstructured":"Mumford, D.: Tata Lectures on Theta i, ii. Birkh\u00e4user, Boston (1984)"},{"issue":"143","key":"7_CR14","first-page":"918","volume":"32","author":"JM Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte carlo methods for index computation. Math. Comput. 32(143), 918\u2013924 (1978)","journal-title":"Math. Comput."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"PC Oorschot Van","year":"1999","unstructured":"Van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12(1), 1\u201328 (1999)","journal-title":"J. Cryptol."},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/0021-8693(78)90247-8","volume":"52","author":"N Yui","year":"1978","unstructured":"Yui, N.: On the Jacobian varieties of hyperelliptic curves over fields of characteristic $$p> 2$$. J. Algebra 52(2), 378\u2013410 (1978)","journal-title":"J. Algebra"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:05:01Z","timestamp":1582812301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}