{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:43:33Z","timestamp":1725914613183},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_47","type":"book-chapter","created":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:08:03Z","timestamp":1509311283000},"page":"542-551","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Yunqi","family":"Dou","sequence":"first","affiliation":[]},{"given":"Chuangui","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanbin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fushan","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"47_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). doi:\n10.1007\/3-540-39799-X_31"},{"issue":"177","key":"47_CR2","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"47_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/3-540-46766-1_22","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"N Koblitz","year":"1992","unstructured":"Koblitz, N.: CM-Curves with Good Cryptographic Properties. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 279\u2013287. Springer, Heidelberg (1992). doi:\n10.1007\/3-540-46766-1_22"},{"key":"47_CR4","unstructured":"National Institute of Standards and Technology. Recommended elliptic curves for federal government use. NIST Special Publication (1999). \nhttp:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf"},{"key":"47_CR5","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2. RFC 5246. Internet Engineering Task Force (IETF) (2008). \nhttps:\/\/tools.ietf.org\/html\/rfc5246"},{"key":"47_CR6","unstructured":"Blake-Wilson, S., Bolyard, N., et al.: Elliptic curve cryptography (ECC) cipher suites for transport layer security (TLS). RFC 4492. Internet Engineering Task Force (IETF) (2006). \nhttps:\/\/tools.ietf.org\/html\/rfc4492"},{"issue":"2","key":"47_CR7","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"J Solinas","year":"2000","unstructured":"Solinas, J.: Efficient arithmetic on Koblitz curves. Des. Codes Crypt. 19(2), 195\u2013249 (2000)","journal-title":"Des. Codes Crypt."},{"key":"47_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-24632-9_3","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"RM Avanzi","year":"2004","unstructured":"Avanzi, R.M., Ciet, M., Sica, F.: Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 28\u201340. Springer, Heidelberg (2004). doi:\n10.1007\/978-3-540-24632-9_3"},{"key":"47_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-48000-6_12","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"EW Knudsen","year":"1999","unstructured":"Knudsen, E.W.: Elliptic scalar multiplication using point halving. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol. 1716, pp. 135\u2013149. Springer, Heidelberg (1999). doi:\n10.1007\/978-3-540-48000-6_12"},{"key":"47_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11545262_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"K Okeya","year":"2005","unstructured":"Okeya, K., Takagi, T., Vuillaume, C.: Short memory scalar multiplication on Koblitz Curves. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 91\u2013105. Springer, Heidelberg (2005). doi:\n10.1007\/11545262_7"},{"key":"47_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/11958239_9","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"R Avanzi","year":"2006","unstructured":"Avanzi, R., Sica, F.: Scalar multiplication on Koblitz curves using double bases. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 131\u2013146. Springer, Heidelberg (2006). doi:\n10.1007\/11958239_9"},{"key":"47_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11894063_35","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"VS Dimitrov","year":"2006","unstructured":"Dimitrov, V.S., J\u00e4rvinen, K.U., Jacobson, M.J., Chan, W.F., Huang, Z.: FPGA implementation of point multiplication on Koblitz curves using Kleinian integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 445\u2013459. Springer, Heidelberg (2006). doi:\n10.1007\/11894063_35"},{"key":"47_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-662-53140-2_13","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"T Oliveira","year":"2016","unstructured":"Oliveira, T., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: Software implementation of Koblitz curves over quadratic fields. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 259\u2013279. Springer, Heidelberg (2016). doi:\n10.1007\/978-3-662-53140-2_13"},{"issue":"8","key":"47_CR14","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TC.2006.129","volume":"55","author":"PK Mishra","year":"2006","unstructured":"Mishra, P.K.: Pipelined computation of scalar multiplication in elliptic curve cryptosystems. IEEE Trans. Comput. 55(8), 1000\u20131010 (2006)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"47_CR15","first-page":"481","volume":"14","author":"O Ahmadi","year":"2008","unstructured":"Ahmadi, O., Hankerson, D., Rodr\u00edguez-Henr\u00edquez, F.: Parallel formulations of scalar multiplication on Koblitz curves. J. Univ. Comput. Sci. 14(3), 481\u2013504 (2008)","journal-title":"J. Univ. Comput. Sci."},{"issue":"6","key":"47_CR16","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1002\/sec.359","volume":"5","author":"K Wu","year":"2012","unstructured":"Wu, K., Li, H., Zhu, D.: Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems. Secur. Commun. Netw. 5(6), 648\u2013657 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"47_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"RP Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190\u2013200. Springer, Heidelberg (2001). doi:\n10.1007\/3-540-44647-8_11"},{"issue":"3","key":"47_CR18","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/s00145-010-9065-y","volume":"24","author":"SD Galbraith","year":"2011","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Cryptol. 24(3), 446\u2013469 (2011)","journal-title":"J. Cryptol."},{"issue":"10","key":"47_CR19","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TC.2009.61","volume":"58","author":"D Hankerson","year":"2009","unstructured":"Hankerson, D., Karabina, K., Menezes, A.: Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Comput. 58(10), 1411\u20131420 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"47_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","volume-title":"Cryptographic Hardware and Embedded Systems \u2014 CHES 2000","author":"D Hankerson","year":"2000","unstructured":"Hankerson, D., L\u00f3pez Hernandez, J., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol. 1965, pp. 1\u201324. Springer, Heidelberg (2000). doi:\n10.1007\/3-540-44499-8_1"},{"issue":"8","key":"47_CR21","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TC.2004.43","volume":"53","author":"K Fong","year":"2004","unstructured":"Fong, K., Hankerson, D., L\u00f3pez, J., Menezes, A.: Field inversion and point halving revisited. IEEE Trans. Comput. 53(8), 1047\u20131059 (2004)","journal-title":"IEEE Trans. Comput."},{"key":"47_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-23951-9_8","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J Taverne","year":"2011","unstructured":"Taverne, J., Faz-Hern\u00e1ndez, A., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F., Hankerson, D., L\u00f3pez, J.: Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 108\u2013123. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-23951-9_8"},{"key":"47_CR23","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,29]],"date-time":"2017-10-29T21:27:43Z","timestamp":1509312463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}