{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:53:08Z","timestamp":1743090788778,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319224244"},{"type":"electronic","value":"9783319224251"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22425-1_4","type":"book-chapter","created":{"date-parts":[[2015,8,19]],"date-time":"2015-08-19T14:42:31Z","timestamp":1439995351000},"page":"56-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates"],"prefix":"10.1007","author":[{"given":"Wei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Kwang Ho","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Myong Song","family":"Jo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,20]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-00468-1_25","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"P Longa","year":"2009","unstructured":"Longa, P., Gebotys, C.: Fast multibase methods and other several optimizations for elliptic curve scalar multiplication. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 443\u2013462. Springer, Heidelberg (2009)"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TC.2007.70815","volume":"57","author":"P Longa","year":"2008","unstructured":"Longa, P., Miri, A.: Fast and flexible elliptic curve point arithmetic over prime fields. IEEE Trans. Comput. 57(3), 289\u2013302 (2008)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Le, D.P., Nguyen, B.Pb.: Fast point quadupling on elliptic curve. In: SoICT 2012, pp. 218\u2013222. ACM (2012)","DOI":"10.1145\/2350716.2350750"},{"key":"4_CR6","unstructured":"Bernstein, D.J., Lange, T.: http:\/\/www.hyperelliptic.org\/EFD\/ (2015)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0065-2458(08)60610-5","volume":"1","author":"GW Reitwiesner","year":"1960","unstructured":"Reitwiesner, G.W.: Binary arithmetic. Adv. Comput. 1, 231\u2013308 (1960)","journal-title":"Adv. Comput."},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11593447_4","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"VS Dimitrov","year":"2005","unstructured":"Dimitrov, V.S., Imbert, L., Mishra, P.K.: Efficient and secure elliptic curve point multiplication using double-base chains. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 59\u201378. Springer, Heidelberg (2005)"},{"issue":"262","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1090\/S0025-5718-07-02048-0","volume":"77","author":"VS Dimitrov","year":"2008","unstructured":"Dimitrov, V.S., Imbert, L., Mishra, P.K.: The double-base number system and its application to elliptic curve cryptography. Math. Comp. 77(262), 1075\u20131104 (2008)","journal-title":"Math. Comp."},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-70500-0_32","volume-title":"Information Security and Privacy","author":"C Doche","year":"2008","unstructured":"Doche, C., Habsieger, L.: A tree-based approach for computing double-base chains. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 433\u2013446. Springer, Heidelberg (2008)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-04138-9_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"N M\u00e9loni","year":"2009","unstructured":"M\u00e9loni, N., Hasan, M.A.: Elliptic curve scalar multiplication combining Yao\u2019s algorithm and double bases. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 304\u2013316. Springer, Heidelberg (2009)"},{"issue":"99","key":"4_CR12","first-page":"1","volume":"PP","author":"N M\u00e9loni","year":"2015","unstructured":"M\u00e9loni, N., Hasan, M.A.: Efficient double bases for scalar multiplication. IEEE Trans. Comput. PP(99), 1 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-662-45611-8_16","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"C Doche","year":"2014","unstructured":"Doche, C.: On the enumeration of double-base chains with applications to elliptic curve cryptography. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 297\u2013316. Springer, Heidelberg (2014)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/TC.2010.138","volume":"60","author":"J Adikari","year":"2011","unstructured":"Adikari, J., Dimitrov, V.S., Imbert, L.: Hybrid binary ternary number system for elliptic curve cryptosystems. IEEE Trans. Comput. 60, 254\u2013265 (2011)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TC.2012.184","volume":"63","author":"C Doche","year":"2014","unstructured":"Doche, C., Sutantyo, D.: New and improved methods to analyze and compute double-scalar multiplications. IEEE Trans. Comput. 63(1), 230\u2013242 (2014)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10623-005-3299-y","volume":"39","author":"M Ciet","year":"2006","unstructured":"Ciet, M., Joye, M., Lauter, K., Montgomery, P.L.: Trading inversions for multiplications in elliptic curve cryptography. Des. Codes Crypt. 39(2), 189\u2013206 (2006)","journal-title":"Des. Codes Crypt."},{"key":"4_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"IF Blake","year":"1999","unstructured":"Blake, I.F., Seroussi, G., Smart, N.P.: Elliptic Curves in Cryptography. Cambridge University Press, Cambridge (1999)"},{"key":"4_CR18","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"RM Avanzi","year":"2005","unstructured":"Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-36563-X_24","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"K Eisentr\u00e4ger","year":"2003","unstructured":"Eisentr\u00e4ger, K., Lauter, K., Montgomery, P.L.: Fast elliptic curve arithmetic and improved weil pairing evaluation. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 343\u2013354. Springer, Heidelberg (2003)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-45353-9_19","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M Brown","year":"2001","unstructured":"Brown, M., Hankerson, D., L\u00f3pez, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 250\u2013265. Springer, Heidelberg (2001)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-73458-1_19","volume-title":"Information Security and Privacy","author":"E Dahmen","year":"2007","unstructured":"Dahmen, E., Okeya, K., Schepers, D.: Affine precomputation with sole inversion in elliptic curve cryptography. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 245\u2013258. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22425-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T06:22:09Z","timestamp":1676960529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22425-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319224244","9783319224251"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22425-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}