{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:41:11Z","timestamp":1743003671836,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319162942"},{"type":"electronic","value":"9783319162959"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16295-9_9","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T07:06:51Z","timestamp":1427612811000},"page":"162-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Isogeny Volcanoes of Elliptic Curves and Sylow Subgroups"],"prefix":"10.1007","author":[{"given":"Mireille","family":"Fouquet","sequence":"first","affiliation":[]},{"given":"Josep M.","family":"Miret","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Valera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,29]]},"reference":[{"issue":"5","key":"9_CR1","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.jnt.2009.11.003","volume":"131","author":"G Bisson","year":"2011","unstructured":"Bisson, G., Sutherland, A.V.: Computing the endomorphism ring of an ordinary elliptic curve over a finite field. J. Number Theory 131(5), 815\u2013831 (2011)","journal-title":"J. Number Theory"},{"issue":"278","key":"9_CR2","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1090\/S0025-5718-2011-02508-1","volume":"81","author":"R Br\u00f6ker","year":"2012","unstructured":"Br\u00f6ker, R., Lauter, K., Sutherland, A.V.: Modular polynomials via isogeny volcanoes. Math. Comput. 81(278), 1201\u20131231 (2012)","journal-title":"Math. Comput."},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-58691-1_42","volume-title":"Algorithmic Number Theory","author":"J-M Couveignes","year":"1994","unstructured":"Couveignes, J.-M., Morain, F.: Schoof\u2019s algorithm and isogeny cycles. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol. 877, pp. 43\u201358. Springer, Heidelberg (1994)"},{"key":"9_CR4","volume-title":"Primes of the Form $$ x^2 + ny^2 $$","author":"DA Cox","year":"1989","unstructured":"Cox, D.A.: Primes of the Form $$ x^2 + ny^2 $$. Wiley-Interscience, New York (1989)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/11745853_13","volume-title":"Public Key Cryptography - PKC 2006","author":"C Doche","year":"2006","unstructured":"Doche, C., Icart, T., Kohel, D.R.: Efficient scalar multiplication by isogeny decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 191\u2013206. Springer, Heidelberg (2006)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/3-540-45455-1_23","volume-title":"Algorithmic Number Theory","author":"M Fouquet","year":"2002","unstructured":"Fouquet, M., Morain, F.: Isogeny volcanoes and the SEA algorithm. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 276\u2013291. Springer, Heidelberg (2002)"},{"issue":"281","key":"9_CR7","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1090\/S0025-5718-2012-02622-6","volume":"82","author":"S Ionica","year":"2013","unstructured":"Ionica, S., Joux, A.: Pairing the volcano. Math. Comput. 82(281), 581\u2013603 (2013)","journal-title":"Math. Comput."},{"issue":"4","key":"9_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","volume":"16","author":"A Joux","year":"2003","unstructured":"Joux, A., Nguyen, K.: Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups. J. Cryptol. 16(4), 239\u2013247 (2003)","journal-title":"J. Cryptol."},{"key":"9_CR9","unstructured":"Kohel, D.: Endomorphism rings of elliptic curves over finite fields. Ph.D. thesis, University of California, Berkeley (1996)"},{"key":"9_CR10","unstructured":"Lercier, R.: Algorithmique des courbes elliptiques dans les corps finis. Ph.D. thesis, \u00c9cole Polytechnique, Paris (1997)"},{"issue":"2","key":"9_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1006\/jnth.1996.0015","volume":"56","author":"HW Lenstra Jr","year":"1996","unstructured":"Lenstra Jr., H.W.: Complex multiplication structure of elliptic curves. J. Number Theory 56(2), 227\u2013241 (1996)","journal-title":"J. Number Theory"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theory 39, 1639\u20131646 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Miret, J., Moreno, R., Rio, A.: Generalization of V\u00e9lu\u2019s formulae for isogenies between elliptic curves. In: Proceedings of the Primeras Jornadas de Teor\u00eda de N\u00fameros Publicacions Matem\u00e0tiques, vol. Extra, pp. 147\u2013163 (2007)","DOI":"10.5565\/PUBLMAT_PJTN05_07"},{"issue":"267","key":"9_CR14","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1090\/S0025-5718-08-02201-1","volume":"78","author":"J Miret","year":"2009","unstructured":"Miret, J., Moreno, R., Rio, A., Valls, M.: Computing the $$ \\ell $$-power torsion of an elliptic curve over a finite field. Math. Comput. 78(267), 1767\u20131786 (2009)","journal-title":"Math. Comput."},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.amc.2007.05.037","volume":"196","author":"J Miret","year":"2008","unstructured":"Miret, J., Moreno, R., Sadornil, D., Tena, J., Valls, M.: Computing the height of volcanoes of $$ \\ell $$-isogenies of elliptic curves over finite fields. Appl. Math. Comput. 196(1), 67\u201376 (2008)","journal-title":"Appl. Math. Comput."},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-642-00306-6_20","volume-title":"Information Security Applications","author":"J Miret","year":"2009","unstructured":"Miret, J., Sadornil, D., Tena, J., Tom\u00e0s, R., Valls, M.: On avoiding ZVP-attacks using isogeny volcanoes. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 266\u2013277. Springer, Heidelberg (2009)"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S Pohlig","year":"1978","unstructured":"Pohlig, S., Hellman, M.: An improved algorithm for computing algorithms over $$ GF( p ) $$ and its cryptographyc significance. IEEE Trans. Inf. Theory 24, 106\u2013110 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.5802\/jtnb.142","volume":"7","author":"R Schoof","year":"1995","unstructured":"Schoof, R.: Counting points on elliptic curves over finite fields. J. Th\u00e9or. Nombres Bordeaux 7(1), 219\u2013254 (1995)","journal-title":"J. Th\u00e9or. Nombres Bordeaux"},{"key":"9_CR19","series-title":"Graduate Texts in Mathemathics","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"JH Silverman","year":"1986","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. Graduate Texts in Mathemathics. Springer-Verlag, New York (1986)"},{"issue":"273","key":"9_CR20","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1090\/S0025-5718-2010-02373-7","volume":"80","author":"AV Sutherland","year":"2011","unstructured":"Sutherland, A.V.: Computing Hilbert class polynomials with the Chinese remainder theorem. Math. Comput. 80(273), 501\u2013538 (2011)","journal-title":"Math. Comput."},{"key":"9_CR21","first-page":"238","volume":"273","author":"J V\u00e9lu","year":"1971","unstructured":"V\u00e9lu, J.: Isogenies entre courbes elliptiques. Comptes Rendus De L\u2019Academie Des Sciences Paris, Serie I-Mathematique, Serie A 273, 238\u2013241 (1971)","journal-title":"Comptes Rendus De L\u2019Academie Des Sciences Paris, Serie I-Mathematique, Serie A"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - LATINCRYPT 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16295-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T23:54:23Z","timestamp":1676937263000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16295-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319162942","9783319162959"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16295-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}