{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:44:47Z","timestamp":1725770687094},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319048727"},{"type":"electronic","value":"9783319048734"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04873-4_11","type":"book-chapter","created":{"date-parts":[[2014,1,26]],"date-time":"2014-01-26T22:49:57Z","timestamp":1390776597000},"page":"186-198","source":"Crossref","is-referenced-by-count":9,"title":["Pseudo 8\u2013Sparse Multiplication for Efficient Ate\u2013Based Pairing on Barreto\u2013Naehrig Curve"],"prefix":"10.1007","author":[{"given":"Yuki","family":"Mori","sequence":"first","affiliation":[]},{"given":"Shoichi","family":"Akagi","sequence":"additional","affiliation":[]},{"given":"Yasuyuki","family":"Nogami","sequence":"additional","affiliation":[]},{"given":"Masaaki","family":"Shirase","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1109\/TIT.2009.2013048","volume":"55","author":"E. Lee","year":"2009","unstructured":"Lee, E., Lee, H.-S., Park, C.-M.: Efficient and generalized pairing computation on abelian varieties. IEEE Transactions on Information Theory\u00a055(4), 1793\u20131803 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"11_CR2","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TIT.2009.2034881","volume":"56","author":"F. Vercauteren","year":"2010","unstructured":"Vercauteren, F.: Optimal pairings. IEEE Transactions on Information Theory\u00a056(1), 455\u2013461 (2010)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1587\/transfun.E92.A.1859","volume":"2009","author":"Y. Nogami","year":"2009","unstructured":"Nogami, Y., Sakemi, Y., Kato, H., Akane, M., Morikawa, Y.: Integer Variable \u03c7-based Cross Twisted Ate Pairing and Its Optimization for Barreto-Naehrig Curve. IEICE Transactions on Fundamentals of Electronics\u00a02009(8), 1859\u20131867 (2009)","journal-title":"IEICE Transactions on Fundamentals of Electronics"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-20465-4_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"D.F. Aranha","year":"2011","unstructured":"Aranha, D.F., Karabina, K., Longa, P., Gebotys, C.H., L\u00f3pez, J.: Faster explicit formulas for computing pairings over ordinary curves. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 48\u201368. Springer, Heidelberg (2011)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Grewal, G., Azarderakhsh, R., Longa, P., Hu, S., Jao, D.: Efficient Implementation of Bilinear Pairings on ARM Processors. Cryptology ePrint Archive, Vol. 2012:408 (2012)","DOI":"10.1007\/978-3-642-35999-6_11"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"Selected Areas in Cryptography","author":"P.S.L.M. Barreto","year":"2006","unstructured":"Barreto, P.S.L.M., Naehrig, M.: Pairing-Friendly Elliptic Curves of Prime Order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 319\u2013331. Springer, Heidelberg (2006)"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00145-009-9048-z","volume":"23","author":"D. Freeman","year":"2006","unstructured":"Freeman, D., Scott, M., Teske, E.: A Taxonomy of Pairing-Friendly Elliptic Curves. Journal of Cryptology\u00a023, 224\u2013280 (2006)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography \u2013 Pairing 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04873-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T00:50:14Z","timestamp":1558831814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04873-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319048727","9783319048734"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04873-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}