{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:22:04Z","timestamp":1768548124667,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319598697","type":"print"},{"value":"9783319598703","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_21","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:14:17Z","timestamp":1496096057000},"page":"366-378","source":"Crossref","is-referenced-by-count":12,"title":["Differential Addition on Twisted Edwards Curves"],"prefix":"10.1007","author":[{"given":"Reza Rezaeian","family":"Farashahi","sequence":"first","affiliation":[]},{"given":"Seyed Gholamhossein","family":"Hosseini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389\u2013405. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-68164-9_26"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"DJ Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 29\u201350. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-76900-2_3"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-85053-3_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Lange, T., Rezaeian Farashahi, R.: Binary edwards curves. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 244\u2013265. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-85053-3_16"},{"key":"21_CR4","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1016\/j.jnt.2010.06.015","volume":"131","author":"D Bernstein","year":"2011","unstructured":"Bernstein, D., Lange, T.: A complete set of addition laws for incomplete Edwards curves. J. Number Theory 131, 858\u2013872 (2011)","journal-title":"J. Number Theory"},{"key":"21_CR5","unstructured":"Bernstein, D., Lange, T.: Explicit-formulas database. \nhttp:\/\/www.hyperelliptic.org\/EFD\/"},{"key":"21_CR6","unstructured":"Castryck, W., Galbraith, S., Farashahi, R.: Efficient arithmetic on elliptic curves using a mixed Edwards Montgomery representation. \nhttps:\/\/eprint.iacr.org\/2008\/218.pdf"},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"HM Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Amer. Math. Soc. 44, 393\u2013422 (2007)","journal-title":"Bull. Amer. Math. Soc."},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-55227-9_2","volume-title":"Arithmetic of Finite Fields","author":"R Rezaeian Farashahi","year":"2016","unstructured":"Rezaeian Farashahi, R., Hosseini, S.G.: Differential addition on binary elliptic curves. In: Duquesne, S., Petkova-Nikova, S. (eds.) WAIFI 2016. LNCS, vol. 10064, pp. 21\u201335. Springer, Cham (2016). doi:\n10.1007\/978-3-319-55227-9_2"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Gaudry P. and Lubicz D.: The arithmetic of characteristic 2 Kummer surface. Finite Fields Appl. 15, 246\u2013260 (2009)","DOI":"10.1016\/j.ffa.2008.12.006"},{"key":"21_CR10","unstructured":"Gu, H., Gu, D., Xie, W.: Differential addition on Jacobi quartic curves Conference: ICT and Energy Efficiency and Workshop on Information Theory and Security (CIICT 2012)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/978-3-662-47989-6_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"M Hamburg","year":"2015","unstructured":"Hamburg, M.: Decaf: eliminating cofactors through point compression. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 705\u2013723. Springer, Heidelberg (2015). doi:\n10.1007\/978-3-662-47989-6_34"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326\u2013343. Springer, Heidelberg (2008). doi:\n10.1007\/978-3-540-89255-7_20"},{"issue":"177","key":"21_CR13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comp. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO 85 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). doi:\n10.1007\/3-540-39799-X_31"},{"issue":"177","key":"21_CR15","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comp. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comp."},{"key":"21_CR16","volume-title":"The Arithmetic of Elliptic Curves","author":"JH Silverman","year":"1995","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. Springer, Berlin (1995)"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Washington, D.C.: Elliptic Curves: Number Theory and Cryptography, 2nd edn. CRC Press, Boca Raton (2008)","DOI":"10.1201\/9781420071474"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T22:21:44Z","timestamp":1496096504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}