{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:54:59Z","timestamp":1743126899707,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319715001"},{"type":"electronic","value":"9783319715018"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71501-8_5","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:46:46Z","timestamp":1511250406000},"page":"74-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Diego F.","family":"Aranha","sequence":"first","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]},{"given":"Koray","family":"Karabina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"issue":"10","key":"5_CR1","doi-asserted-by":"publisher","first-page":"2614","DOI":"10.1109\/TC.2013.112","volume":"63","author":"R Azarderakhsh","year":"2014","unstructured":"Azarderakhsh, R., Karabina, K.: A new double point multiplication algorithm and its application to binary elliptic curves with endomorphisms. IEEE Trans. Comput. 63(10), 2614\u20132619 (2014)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR2","unstructured":"Bernstein, D.J.: Differential addition chains, Preprint (2006)"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.: High-speed high-security signatures. J. Cryptograph. Eng. 2(2), 77\u201389 (2012)","journal-title":"J. Cryptograph. Eng."},{"key":"5_CR4","unstructured":"Bernstein, D.J., Lange, T.: Montgomery curves and the Montgomery ladder. In: Bos, J.W., Lenstra, A.K. (eds.) Topics In Computational Number Theory Inspired by Peter L. Montgomery. Cambridge University Press (2017, to appear). https:\/\/eprint.iacr.org\/2017\/293"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-85053-3_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Lange, T., Rezaeian Farashahi, R.: Binary edwards curves. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 244\u2013265. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_16"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-55220-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"C Costello","year":"2014","unstructured":"Costello, C., Hisil, H., Smith, B.: Faster compact Diffie\u2013Hellman: endomorphisms on the x-line. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 183\u2013200. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_11"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-662-48797-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"C Costello","year":"2015","unstructured":"Costello, C., Longa, P.: Four$$\\mathbb{Q}$$: four-dimensional decompositions on a $$\\mathbb{Q}$$-curve over the mersenne prime. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 214\u2013235. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_10"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-19074-2_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J Devigne","year":"2011","unstructured":"Devigne, J., Joye, M.: Binary huff curves. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 340\u2013355. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_22"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-55227-9_2","volume-title":"Arithmetic of Finite Fields","author":"R Rezaeian Farashahi","year":"2016","unstructured":"Rezaeian Farashahi, R., Hosseini, S.G.: Differential addition on binary elliptic curves. In: Duquesne, S., Petkova-Nikova, S. (eds.) WAIFI 2016. LNCS, vol. 10064, pp. 21\u201335. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-55227-9_2"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10623-015-0146-7","volume":"78","author":"SD Galbraith","year":"2016","unstructured":"Galbraith, S.D., Gaudry, P.: Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Crypt. 78(1), 51\u201372 (2016)","journal-title":"Des. Codes Crypt."},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/s00145-010-9065-y","volume":"24","author":"SD Galbraith","year":"2011","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Cryptol. 24(3), 446\u2013469 (2011)","journal-title":"J. Cryptol."},{"issue":"10","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TC.2009.61","volume":"58","author":"D Hankerson","year":"2009","unstructured":"Hankerson, D., Karabina, K., Menezes, A.: Analyzing the Galbraith-Lin-scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Comput. 58(10), 1411\u20131420 (2009). http:\/\/dx.doi.org\/10.1109\/TC.2009.61","journal-title":"IEEE Trans. Comput."},{"key":"5_CR13","unstructured":"Institute of Electrical and Electronics Engineers: Traditional public-key cryptography (IEEE Std 1363\u20132000 and 1363a\u20132004) (2004). http:\/\/grouper.ieee.org\/groups\/1363\/"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/978-3-319-56620-7_23","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"D Kohel","year":"2017","unstructured":"Kohel, D.: Twisted $${\\mu }_4$$-normal form for elliptic curves. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 659\u2013678. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_23"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-48059-5_27","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J L\u00f3pez","year":"1999","unstructured":"L\u00f3pez, J., Dahab, R.: Fast multiplication on elliptic curves over GF(2m) without precomputation. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316\u2013327. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_27"},{"issue":"177","key":"5_CR16","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"5_CR17","unstructured":"National Institute of Standards and Technology: Recommended Elliptic Curves for Federal Government Use. NIST Special Publication (1999). http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/978-3-319-13051-4_20","volume-title":"Selected Areas in Cryptography \u2013 SAC 2014","author":"T Oliveira","year":"2014","unstructured":"Oliveira, T., Aranha, D.F., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: Fast point multiplication algorithms for binary elliptic curves with and without precomputation. In: Joux, A., Youssef, A. (eds.) SAC 2014. LNCS, vol. 8781, pp. 324\u2013344. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13051-4_20"},{"key":"5_CR19","unstructured":"Oliveira, T., Aranha, D.F., Hernandez, J.L., Rodr\u00edguez-Henr\u00edquez, F.: Improving the performance of the GLS254 curve. In: CHES Rump Session (2016)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-40349-1_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"T Oliveira","year":"2013","unstructured":"Oliveira, T., L\u00f3pez, J., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F.: Lambda coordinates for binary elliptic curves. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 311\u2013330. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_18"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13389-013-0069-z","volume":"4","author":"T Oliveira","year":"2014","unstructured":"Oliveira, T., L\u00f3pez, J., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F.: Two is the fastest prime: lambda coordinates for binary elliptic curves. J. Cryptograph. Eng. 4(1), 3\u201317 (2014)","journal-title":"J. Cryptograph. Eng."},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-662-53140-2_13","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"T Oliveira","year":"2016","unstructured":"Oliveira, T., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: Software implementation of Koblitz curves over quadratic fields. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 259\u2013279. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_13"},{"key":"5_CR23","unstructured":"Oliveira, T., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: The Montgomery ladder on binary elliptic curves. J. Cryptograph. Eng. (2017, to appear). https:\/\/eprint.iacr.org\/2017\/350"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/3-540-36288-6_18","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"M Stam","year":"2003","unstructured":"Stam, M.: On montgomery-like representations for elliptic curves over GF(2k). In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 240\u2013254. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_18"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71501-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:48:37Z","timestamp":1709819317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71501-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319715001","9783319715018"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71501-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Goa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.space.dbcegoa.ac.in\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}