{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T04:15:46Z","timestamp":1774671346274,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319221731","type":"print"},{"value":"9783319221748","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22174-8_18","type":"book-chapter","created":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T16:28:06Z","timestamp":1439569686000},"page":"329-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Fast Implementation of Curve25519 Using AVX2"],"prefix":"10.1007","author":[{"given":"Armando","family":"Faz-Hern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Julio","family":"L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,15]]},"reference":[{"key":"18_CR1","unstructured":"Aranha, D.F., Gouv\u00eaa, C.P.L.: RELIC is an Efficient LIbrary for Cryptography. http:\/\/code.google.com\/p\/relic-toolkit\/"},{"key":"18_CR2","unstructured":"Aranha, D.F., Barreto, P.S.L.M., Pereira, G.C.C.F., Ricardini, J.E.: A note on high-security general-purpose elliptic curves. Cryptology ePrint Archive, Report 2013\/647 (2013). http:\/\/eprint.iacr.org\/"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006)"},{"key":"18_CR4","unstructured":"Bernstein, D.J.: Cryptography in NaCl, March 2009. http:\/\/cr.yp.to\/highspeed\/naclcrypto-20090310.pdf"},{"key":"18_CR5","unstructured":"Bernstein, D.J.: DNSCurve: usable security for DNS, June 2009. http:\/\/dnscurve.org"},{"key":"18_CR6","unstructured":"Bernstein, D.J., Lange, T.: eBACS: ECRYPT benchmarking of cryptographic systems, March 2015. Accessed on 20 March 2015 http:\/\/bench.cr.yp.to\/supercop.html"},{"key":"18_CR7","unstructured":"Bernstein, D.J., Lange, T.: SafeCurves: choosing safe curves for elliptic-curve cryptography (2015). Accessed 20 March 2015 http:\/\/safecurves.cr.yp.to"},{"key":"18_CR8","unstructured":"Bernstein, D.J., Lange, T., Schwabe, P.: NaCl: Networking and Cryptography library, October 2013. http:\/\/nacl.cr.yp.to\/"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-642-33027-8_19","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2012","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Schwabe, P.: NEON Crypto. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 320\u2013339. Springer, Heidelberg (2012). http:\/\/dx.doi.org\/10.1007\/978-3-642-33027-8_19"},{"key":"18_CR10","unstructured":"Bos, J.W., Costello, C., Longa, P., Naehrig, M.: Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. Cryptology ePrint Archive, Report 2014\/130 (2014). http:\/\/eprint.iacr.org\/"},{"key":"18_CR11","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography, (2nd edn). Chapman & Hall\/CRC (2012)"},{"key":"18_CR12","unstructured":"Corporation, I.: Intel Pentium processor with MMX technology documentation, January 2008. http:\/\/www.intel.com\/design\/archives\/Processors\/mmx\/"},{"key":"18_CR13","unstructured":"Corporation, I.: Define SSE2, SSE3 and SSE4, January 2009. http:\/\/www.intel.com\/support\/processors\/sb\/CS-030123.htm"},{"key":"18_CR14","unstructured":"Corporation, I.: Intel Advanced Vector Extensions Programming Reference, June 2011. https:\/\/software.intel.com\/sites\/default\/files\/m\/f\/7\/c\/36945"},{"key":"18_CR15","unstructured":"Fog, A.: Instruction tables: Lists of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs, December 2014"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Granger, R., Scott, M.: Faster ECC over $$\\mathbb{F}_{2^{521}-1}$$. Cryptology ePrint Archive, Report 2014\/852 (2014). http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-662-46447-2_24"},{"key":"18_CR17","unstructured":"Granlund, T., the GMP development team: GNU MP: The GNU Multiple Precision Arithmetic Library, (5.0.5 edn) (2012). http:\/\/gmplib.org\/"},{"issue":"3","key":"18_CR18","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A fast algorithm for computing multiplicative inverses in GF$$(2^m)$$ using normal bases. Inf. Comput. 78(3), 171\u2013177 (1988). http:\/\/dx.doi.org\/10.1016\/0890-5401(88)90024\u20137","journal-title":"Inf. Comput."},{"issue":"177","key":"18_CR19","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987). http:\/\/dx.doi.org\/10.2307\/2007888","journal-title":"Math. Comput."},{"key":"18_CR20","unstructured":"National Institute of Standards and Technology: Digital Signature Standard (DSS). FIPS Publication 186, may 1994. http:\/\/www.bibsonomy.org\/bibtex\/2a98c67565fa98cc7c90d7d622c1ad252\/dret"},{"key":"18_CR21","unstructured":"Shell, O.S.: OpenSSH, January 2014. http:\/\/www.openssh.com\/txt\/release-6.5"},{"key":"18_CR22","unstructured":"Solinas, J.A.: Generalized Mersenne Numbers. Technical report,Center of Applied Cryptographic Research (CACR) (1999)"},{"key":"18_CR23","unstructured":"The OpenSSL Project: OpenSSL: The Open Source toolkit for SSL\/TLS, April 2003. www.openssl.org"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology -- LATINCRYPT 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22174-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T06:09:11Z","timestamp":1676959751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22174-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221731","9783319221748"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22174-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"15 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}