{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T11:07:48Z","timestamp":1775732868364,"version":"3.50.1"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226976","type":"print"},{"value":"9783032226983","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22698-3_2","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:29Z","timestamp":1775730269000},"page":"39-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Use of\u00a0Atkin and\u00a0Weber Modular Polynomials in\u00a0Isogeny Proofs of\u00a0Knowledge"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2097-4117","authenticated-orcid":false,"given":"Thomas","family":"den Hollander","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5953-8724","authenticated-orcid":false,"given":"Marzio","family":"Mula","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4181-2561","authenticated-orcid":false,"given":"Daniel","family":"Slamanig","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5421-3143","authenticated-orcid":false,"given":"Sebastian A.","family":"Spindler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.ffa.2018.10.002","volume":"55","author":"G Adj","year":"2019","unstructured":"Adj, G., Ahmadi, O., Menezes, A.: On isogeny graphs of supersingular elliptic curves over finite fields. Finite Fields Appl. 55, 268\u2013283 (2019). https:\/\/doi.org\/10.1016\/j.ffa.2018.10.002","journal-title":"Finite Fields Appl."},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017: 24th Conference on Computer and Communications Security. pp. 2087\u20132104. ACM Press, Dallas, TX, USA (Oct\u00a031\u00a0\u2013\u00a0Nov\u00a02, (2017). https:\/\/doi.org\/10.1145\/3133956.3134104","DOI":"10.1145\/3133956.3134104"},{"key":"2_CR3","unstructured":"Atkin, A.O.L.: The number of points on an elliptic curve modulo a prime (1991). https:\/\/www.lix.polytechnique.fr\/Labo\/Francois.Morain\/AtkinEmails\/19910614.txt. Email on the Number Theory Mailing List"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: PRISM: simple and compact identification and signatures from large prime degree isogenies. In: Jager, T., Pan, J. (eds.) PKC\u00a02025: 28th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0III. Lecture Notes in Computer Science, vol. 15676, pp. 300\u2013332. Springer, Cham, Switzerland, R\u00f8ros, Norway (2025). https:\/\/doi.org\/10.1007\/978-3-031-91826-1_10","DOI":"10.1007\/978-3-031-91826-1_10"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: Supersingular curves you can trust. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0II. Lecture Notes in Computer Science, vol. 14005, pp. 405\u2013437. Springer, Cham, Switzerland, Lyon, France (2023). https:\/\/doi.org\/10.1007\/978-3-031-30617-4_14","DOI":"10.1007\/978-3-031-30617-4_14"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.P.: Aurora: transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02019, Part\u00a0I. Lecture Notes in Computer Science, vol. 11476, pp. 103\u2013128. Springer, Cham, Switzerland, Darmstadt, Germany (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_4","DOI":"10.1007\/978-3-030-17653-2_4"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Beullens, W., De Feo, L., Galbraith, S.D., Petit, C.: Proving knowledge of isogenies: a survey. Designs, Codes Cryptography 91(11), 3425\u20133456 (2023). https:\/\/doi.org\/10.1007\/s10623-023-01243-3","DOI":"10.1007\/s10623-023-01243-3"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02019, Part\u00a0I. Lecture Notes in Computer Science, vol. 11921, pp. 227\u2013247. Springer, Cham, Switzerland, Kobe, Japan (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Birch, B.J.: Weber\u2019s class invariants. Mathematika 16(2), 283\u2013294 (1969). https:\/\/doi.org\/10.1112\/S0025579300008251","DOI":"10.1112\/S0025579300008251"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Boneh, D., Chen, B.: LatticeFold+: Faster, simpler, shorter lattice-based folding for succinct proof systems. In: Kalai, Y.T., Kamara, S.F. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02025, Part\u00a0VII. Lecture Notes in Computer Science, vol. 16006, pp. 327\u2013361. Springer, Cham, Switzerland, Santa Barbara, CA, USA (2025). https:\/\/doi.org\/10.1007\/978-3-032-01907-3_11","DOI":"10.1007\/978-3-032-01907-3_11"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Borcherds, R.E.: Monstrous moonshine and monstrous lie superalgebras. Invent. Math. 109(1), 405\u2013444 (1992)","DOI":"10.1007\/BF01232032"},{"key":"2_CR12","unstructured":"Boscardin, S., Spindler, S.A.: Exploring Kaneko\u2019s bound: on multi-edges, loops and the diameter of the supersingular $$\\ell $$-isogeny graph. Cryptology ePrint Archive, Paper 2025\/1361 (2025). https:\/\/eprint.iacr.org\/2025\/1361"},{"key":"2_CR13","unstructured":"Br\u00f6ker, R.: Constructing elliptic curves of prescribed order. Ph.D. thesis, Leiden University (2006). https:\/\/hdl.handle.net\/1887\/4425"},{"issue":"278","key":"2_CR14","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1090\/S0025-5718-2011-02508-1","volume":"81","author":"R Br\u00f6ker","year":"2012","unstructured":"Br\u00f6ker, R., Lauter, K., Sutherland, A.V.: Modular polynomials via isogeny volcanoes. Math. Comput. 81(278), 1201\u20131231 (2012)","journal-title":"Math. Comput."},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: CSIDH on the surface. In: Ding, J., Tillich, J.P. (eds.) Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, pp. 111\u2013129. Springer, Cham, Switzerland, Paris, France (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_7","DOI":"10.1007\/978-3-030-44223-1_7"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T., Houben, M., Vercauteren, F.: Horizontal racewalking using radical isogenies. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02022, Part\u00a0II. Lecture Notes in Computer Science, vol. 13792, pp. 67\u201396. Springer, Cham, Switzerland, Taipei, Taiwan (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_3","DOI":"10.1007\/978-3-031-22966-4_3"},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T., Vercauteren, F.: Radical isogenies. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02020, Part\u00a0II. Lecture Notes in Computer Science, vol. 12492, pp. 493\u2013519. Springer, Cham, Switzerland, Daejeon, South Korea (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_17","DOI":"10.1007\/978-3-030-64834-3_17"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Ch\u00e1vez-Saab, J., Rodr\u00edguez-Henr\u00edquez, F., Tibouchi, M.: Verifiable isogeny walks: Towards an isogeny-based postquantum VDF. In: AlTawy, R., H\u00fclsing, A. (eds.) SAC 2021: 28th Annual International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 13203, pp. 441\u2013460. Springer, Cham, Switzerland, Virtual Event (2022). https:\/\/doi.org\/10.1007\/978-3-030-99277-4_21","DOI":"10.1007\/978-3-030-99277-4_21"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Chiang-Hsieh, H.J., Yang, Y.: Determination of hauptmoduls and construction of abelian extensions of quadratic number fields. Canadian Math. Bull. 50(3), 334\u2014-346 (2007). https:\/\/doi.org\/10.4153\/CMB-2007-032-1","DOI":"10.4153\/CMB-2007-032-1"},{"key":"2_CR20","unstructured":"Col\u00f2, L.: Oriented supersingular elliptic curves and class group actions. Ph.D. thesis, Aix-Marseille Universit\u00e9 (2022). https:\/\/leonardocolo.com\/documents\/thesis\/PhD_Thesis.pdf"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Cong, K., Lai, Y.F., Levin, S.: Efficient isogeny proofs using generic techniques. In: Tibouchi, M., Wang, X. (eds.) ACNS 2023: 21st International Conference on Applied Cryptography and Network Security, Part\u00a0II. Lecture Notes in Computer Science, vol. 13906, pp. 248\u2013275. Springer, Cham, Switzerland, Kyoto, Japan (2023). https:\/\/doi.org\/10.1007\/978-3-031-33491-7_10","DOI":"10.1007\/978-3-031-33491-7_10"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1112\/blms\/11.3.308","volume":"11","author":"JH Conway","year":"1979","unstructured":"Conway, J.H., Norton, S.P.: Monstrous moonshine. Bull. Lond. Math. Soc. 11(3), 308\u2013339 (1979). https:\/\/doi.org\/10.1112\/blms\/11.3.308","journal-title":"Bull. Lond. Math. Soc."},{"key":"2_CR23","unstructured":"Corte-Real\u00a0Santos, M., Eriksen, J.K., Leroux, A., Meyer, M., Panny, L.: Evaluation of modular polynomials from supersingular elliptic curves. Cryptology ePrint Archive, Paper 2025\/1154 (2025). https:\/\/eprint.iacr.org\/2025\/1154"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Cox, D.A.: Primes of the Form $$x^2 + ny^2$$. Fermat, Class Field Theory, and Complex Multiplication. Pure and Applied Mathematics: A Wiley Series of Texts, Monographs and Tracts, John Wiley & Sons, 2nd edn. (2013). https:\/\/doi.org\/10.1002\/9781118400722","DOI":"10.1002\/9781118400722"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02020, Part\u00a0I. Lecture Notes in Computer Science, vol. 12491, pp. 64\u201393. Springer, Cham, Switzerland, Daejeon, South Korea (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Delpech de Saint Guilhem, C., Orsini, E., Tanguy, T.: Limbo: efficient zero-knowledge MPCitH-based arguments. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021: 28th Conference on Computer and Communications Security, pp. 3022\u20133036. ACM Press, Virtual Event, Republic of Korea (2021). https:\/\/doi.org\/10.1145\/3460120.3484595","DOI":"10.1145\/3460120.3484595"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Diamond, F., Shurman, J.: A First Course in Modular Forms, Graduate Texts in Mathematics, vol.\u00a0228. Springer New York, NY (2005). https:\/\/doi.org\/10.1007\/978-0-387-27226-9","DOI":"10.1007\/978-0-387-27226-9"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Egner, S., Minkwitz, T.: Sparsification of rectangular matrices. J. Symb. Comput. 26(2), 135\u2013149 (1998)","DOI":"10.1006\/jsco.1998.0204"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Elkies, N.D.: Elliptic and modular curves over finite fields and related computational issues. In: Buell, D.A., Teitelbaum, J.T. (eds.) Computational Perspectives on Number Theory: Proceedings of a Conference in Honor of A. O. L. Atkin. AMS\/IP Studies in Advanced Mathematics, vol.\u00a07, pp. 21\u201376. American Mathematical Society, International Press (1998)","DOI":"10.1090\/amsip\/007\/03"},{"key":"2_CR30","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02017, Part\u00a0I. Lecture Notes in Computer Science, vol. 10624, pp. 3\u201333. Springer, Cham, Switzerland, Hong Kong, China (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Gow, R.: Some properties and uses of the discriminant of a polynomial. In: Ryan, R., Hurley, T., Rippon, P. (eds.) Irish Mathematical Society Bulletin. vol.\u00a024, pp. 12\u201319. Irish Mathematical Society (March 1990)","DOI":"10.33232\/BIMS.0024.12.19"},{"key":"2_CR32","unstructured":"Hajouji, N.: Supersingular isogeny graphs from algebraic modular curves. arXiV:2303.09096v3 [math.NT] (2023)"},{"key":"2_CR33","doi-asserted-by":"publisher","unstructured":"den Hollander, T., Kleine, S., Mula, M., Slamanig, D., Spindler, S.A.: More efficient isogeny proofs of knowledge via canonical modular polynomials. In: Kalai, Y.T., Kamara, S.F. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02025, Part\u00a0I. Lecture Notes in Computer Science, vol. 16000, pp. 131\u2013166. Springer, Cham, Switzerland, Santa Barbara, CA, USA (2025). https:\/\/doi.org\/10.1007\/978-3-032-01855-7_5","DOI":"10.1007\/978-3-032-01855-7_5"},{"key":"2_CR34","unstructured":"den Hollander, T., Mula, M., Slamanig, D., Spindler, S.A.: On the use of Atkin and Weber modular polynomials in isogeny proofs of knowledge. Cryptology ePrint Archive, Paper 2026\/XXXX (2026). https:\/\/eprint.iacr.org\/2026\/XXXX, full ePrint version"},{"key":"2_CR35","doi-asserted-by":"publisher","unstructured":"Houben, M., Streng, M.: Generalized class polynomials. Res. Number Theory 8(4), 103 (2022). https:\/\/doi.org\/10.1007\/s40993-022-00400-2","DOI":"10.1007\/s40993-022-00400-2"},{"key":"2_CR36","doi-asserted-by":"publisher","unstructured":"Igusa, J.I.: Fibre systems of Jacobian varieties: (III. Fibre systems of elliptic curves). American J. Math. 81(2), 453\u2013476 (1959). https:\/\/doi.org\/10.2307\/2372751","DOI":"10.2307\/2372751"},{"key":"2_CR37","doi-asserted-by":"publisher","unstructured":"Kothapalli, A., Setty, S., Tzialla, I.: Nova: recursive zero-knowledge arguments from folding schemes. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02022, Part\u00a0IV. Lecture Notes in Computer Science, vol. 13510, pp. 359\u2013388. Springer, Cham, Switzerland, Santa Barbara, CA, USA (2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_13","DOI":"10.1007\/978-3-031-15985-5_13"},{"key":"2_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4752-4","volume-title":"Elliptic Functions","author":"S Lang","year":"1987","unstructured":"Lang, S.: Elliptic Functions. Springer, New York, New York, NY (1987)"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Lehner, J., Newman, M.: Weierstrass points of $$\\gamma _0(n)$$. Ann. Math. 79(2), 360\u2013368 (1964). http:\/\/www.jstor.org\/stable\/1970550","DOI":"10.2307\/1970550"},{"key":"2_CR40","unstructured":"Lercier, R.: Algorithmique des courbes elliptiques dans les corps finis. Ph.D. thesis, Ecole Polytechnique (1997). https:\/\/univ-rennes.hal.science\/tel-01101949"},{"key":"2_CR41","doi-asserted-by":"publisher","unstructured":"Levin, S., Pedersen, R.: Faster proofs and VRFs from isogenies. In: Hanaoka, G., Yang, B.Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02025, Part\u00a0IV. Lecture Notes in Computer Science, vol. 16248, pp. 307\u2013340. Springer, Singapore, Singapore, Melbourne, VIC, Australia (2025). https:\/\/doi.org\/10.1007\/978-981-95-5113-2_10","DOI":"10.1007\/978-981-95-5113-2_10"},{"key":"2_CR42","doi-asserted-by":"publisher","unstructured":"Li, S., Ouyang, Y., Xu, Z.: Neighborhood of the supersingular elliptic curve isogeny graph at $$j=0$$ and $$1728$$. Finite Fields Their Appl. 61, 101600 (2020). https:\/\/doi.org\/10.1016\/j.ffa.2019.101600","DOI":"10.1016\/j.ffa.2019.101600"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Li, Y., Yang, T.: On a conjecture of Yui and Zagier. Algebra & Number Theory (2019)","DOI":"10.2140\/ant.2020.14.2197"},{"key":"2_CR44","unstructured":"The LMFDB Collaboration: The L-functions and modular forms database (beta version) (2025). https:\/\/beta.lmfdb.xyz"},{"key":"2_CR45","doi-asserted-by":"publisher","unstructured":"Maughan, K., Near, J.P., Vincent, C.: Foldable, recursive proofs of isogeny computation with reduced time complexity. In: Osinski, M., Cour, B.L., Yeh, L. (eds.) IEEE International Conference on Quantum Computing and Engineering, QCE 2024, Montreal, QC, Canada, September 15-20, 2024, pp. 1304\u20131308. IEEE (2024). https:\/\/doi.org\/10.1109\/QCE60285.2024.00155","DOI":"10.1109\/QCE60285.2024.00155"},{"key":"2_CR46","unstructured":"Milne, J.S.: Modular functions and modular forms (elliptic modular curves) (2017). https:\/\/www.jmilne.org\/math\/CourseNotes\/MF.pdf, V1.31"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Morain, F.: Calcul du nombre de points sur une courbe elliptique dans un corps fini: aspects algorithmiques. Journal de Th\u00e9orie des Nombres de Bordeaux 7(1), 255\u2013282 (1995). http:\/\/www.jstor.org\/stable\/43972443","DOI":"10.5802\/jtnb.143"},{"key":"2_CR48","unstructured":"M\u00fcller, V.: Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven \u00fcber endlichen K\u00f6rpern der Charakteristik gr\u00f6\u00dfer drei. Ph.D. thesis, Universit\u00e4t des Saarlandes (1995). https:\/\/publikationen.sulb.uni-saarland.de\/handle\/20.500.11880\/25777"},{"key":"2_CR49","doi-asserted-by":"publisher","unstructured":"Ogg, A.P.: Hyperelliptic modular curves. Bulletin de la Soci\u00e9t\u00e9 Math\u00e9matique de France 102, 449\u2013462 (1974). https:\/\/doi.org\/10.24033\/bsmf.1789","DOI":"10.24033\/bsmf.1789"},{"issue":"170","key":"2_CR50","first-page":"483","volume":"44","author":"R Schoof","year":"1985","unstructured":"Schoof, R.: Elliptic curves over finite fields and the computation of square roots $$\\mathrel {\\operatorname{mod}} p$$. Math. Comput. 44(170), 483\u2013494 (1985)","journal-title":"Math. Comput."},{"key":"2_CR51","doi-asserted-by":"publisher","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves, Grad. Texts Math., vol.\u00a0106. Springer New York, NY, 2nd edn. (2009). https:\/\/doi.org\/10.1007\/978-0-387-09494-6","DOI":"10.1007\/978-0-387-09494-6"},{"key":"2_CR52","unstructured":"Weber, H.: Lehrbuch der Algebra, vol.\u00a03. F. Vieweg und Sohn, Braunschweig, 2nd edn. (1898), dritter Band: Elliptische Funktionen und algebraische Zahlen"},{"issue":"220","key":"2_CR53","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1090\/S0025-5718-97-00854-5","volume":"66","author":"N Yui","year":"1997","unstructured":"Yui, N., Zagier, D.: On the singular values of weber modular functions. Math. Comput. 66(220), 1645\u20131662 (1997). https:\/\/doi.org\/10.1090\/S0025-5718-97-00854-5","journal-title":"Math. Comput."}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22698-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:36Z","timestamp":1775730276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22698-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226976","9783032226983"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22698-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}