{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:38:41Z","timestamp":1725565121319},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221562"},{"type":"electronic","value":"9783540248477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24847-7_2","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T22:33:04Z","timestamp":1284157984000},"page":"18-41","source":"Crossref","is-referenced-by-count":14,"title":["Using Primitive Subgroups to Do More with Fewer Bits"],"prefix":"10.1007","author":[{"given":"K.","family":"Rubin","sequence":"first","affiliation":[]},{"given":"A.","family":"Silverberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Barreto, P.: Pairing-based crypto lounge, http:\/\/planeta.terra.com.br\/informatica\/paulobarreto\/pblounge.html"},{"key":"2_CR2","unstructured":"Bernstein, D.: A state-of-the-art public-key signature system, http:\/\/cr.yp.to\/sigs.html"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-24660-2_10","volume-title":"Topics in Cryptology \u2013 CT-RSA 2004","author":"D. Bleichenbacher","year":"2004","unstructured":"Bleichenbacher, D.: Compressing Rabin Signatures. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol.\u00a02964, pp. 126\u2013128. Springer, Heidelberg (2004)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-44750-4_31","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Bleichenbacher","year":"1995","unstructured":"Bleichenbacher, D., Bosma, W., Lenstra, A.K.: Some remarks on Lucas-based cryptosystems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 386\u2013396. Springer, Heidelberg (1995)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-36178-2_3","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"W. Bosma","year":"2002","unstructured":"Bosma, W., Hutton, J., Verheul, E.R.: Looking beyond XTR. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 46\u201363. Springer, Heidelberg (2002)"},{"key":"2_CR7","unstructured":"Brezing, F., Weng, A.: Elliptic curves suitable for pairing based cryptography, Cryptology ePrint Archive, Report 2003\/143"},{"key":"2_CR8","series-title":"Lect. Notes in Comp. Sci","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-48000-6_26","volume-title":"Advances in Cryptology \u2014 Asiacrypt 1999","author":"E. Brouwer","year":"1999","unstructured":"Brouwer, E., Pellikaan, R., Verheul, E.R.: Doing more with fewer bits. In: Advances in Cryptology \u2014 Asiacrypt 1999. Lect. Notes in Comp. Sci, vol.\u00a01716, pp. 321\u2013332. Springer, Berlin (1999)"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"Coppersmith, D.: Fast evaluation of logarithms in fields of characteristic two. IEEE Trans. Inform. Theory\u00a030, 587\u2013594 (1984)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. Inform. Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/978-3-642-56755-1_13","volume-title":"Finite fields and applications (Augsburg, 1999)","author":"G. Frey","year":"2001","unstructured":"Frey, G.: Applications of arithmetical geometry to cryptographic constructions. In: Finite fields and applications (Augsburg, 1999), pp. 128\u2013161. Springer, Berlin (2001)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-45682-1_29","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"S. Galbraith","year":"2001","unstructured":"Galbraith, S.: Supersingular curves in cryptography. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 495\u2013513. Springer, Heidelberg (2001)"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1109\/18.796413","volume":"45","author":"G. Gong","year":"1999","unstructured":"Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inform. Theory\u00a045, 2601\u20132605 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/3-540-45455-1_3","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2002","unstructured":"Joux, A.: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 20\u201332. Springer, Heidelberg (2002)"},{"key":"2_CR16","first-page":"73","volume-title":"Arithmetic and geometry of varieties","author":"A.A. Klyachko","year":"1988","unstructured":"Klyachko, A.A.: On the rationality of tori with cyclic splitting field. In: Arithmetic and geometry of varieties, pp. 73\u201378. Kuybyshev Univ. Press, Kuybyshev (1988) (Russian)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0027920","volume-title":"Information Security and Privacy","author":"K. Lenstra","year":"1997","unstructured":"Lenstra, K.: Using Cyclotomic Polynomials to Construct Efficient Discrete Logarithm Cryptosystems Over Finite Fields. In: Mu, Y., Pieprzyk, J.P., Varadharajan, V. (eds.) ACISP 1997. LNCS, vol.\u00a01270, pp. 127\u2013138. Springer, Heidelberg (1997)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Lenstra, K.A.: The XTR public key system, lecture at MSRI Number-Theoretic Cryptography Workshop, October 20 (2000)","DOI":"10.1007\/3-540-44598-6_1"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Verheul, E.R.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"184","DOI":"10.2307\/2369308","volume":"1","author":"E. Lucas","year":"1878","unstructured":"Lucas, E.: Th\u00e9orie des fonctions num\u00e9riques simplement p\u00e9riodiques. Amer. J. Math.\u00a01, 184\u2013239, 289\u2013321 (1878)","journal-title":"Amer. J. Math."},{"key":"2_CR21","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"2_CR22","first-page":"71","volume":"16","author":"W.B. M\u00fcller","year":"1981","unstructured":"M\u00fcller, W.B., N\u00f6bauer, W.: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar.\u00a016, 71\u201376 (1981)","journal-title":"Studia Sci. Math. Hungar."},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.2307\/1970307","volume":"74","author":"T. Ono","year":"1961","unstructured":"Ono, T.: Arithmetic of algebraic tori. Ann. of Math.\u00a074, 101\u2013139 (1961)","journal-title":"Ann. of Math."},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45708-9_22","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"K. Rubin","year":"2002","unstructured":"Rubin, K., Silverberg, A.: Supersingular abelian varieties in cryptology. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 336\u2013353. Springer, Heidelberg (2002)"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-540-45146-4_21","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"K. Rubin","year":"2003","unstructured":"Rubin, K., Silverberg, A.: Torus-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 349\u2013365. Springer, Heidelberg (2003)"},{"key":"2_CR26","series-title":"Fields Institute Communications Series","volume-title":"High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams","author":"K. Rubin","year":"2004","unstructured":"Rubin, K., Silverberg, A.: Algebraic tori in cryptography. In: High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Fields Institute Communications Series, AMS, Providence (2004) (to appear)"},{"key":"2_CR27","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: SCIS2000 (The 2000 Symposium on Cryptography and Information Security), Okinawa, Japan, January 26-28, vol.\u00a0C20 (2000)"},{"key":"2_CR28","first-page":"103","volume-title":"Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec 1993","author":"P.J. Smith","year":"1993","unstructured":"Smith, P.J., Lennon, M.J.J.: LUC: A New Public Key System. In: Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec 1993, pp. 103\u2013117. North-Holland, Amsterdam (1993)"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0000447","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"P. Smith","year":"1995","unstructured":"Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 357\u2013364. Springer, Heidelberg (1995)"},{"key":"2_CR30","unstructured":"Voskresenskii, V.E.: Algebraic groups and their birational invariants. Translations of Mathematical Monographs\u00a0179, AMS, Providence, RI (1998)"},{"key":"2_CR31","first-page":"225","volume":"39","author":"H.C. Williams","year":"1982","unstructured":"Williams, H.C.: A p + 1 method of factoring. Math. Comp.\u00a039, 225\u2013234 (1982)","journal-title":"Math. Comp."},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/0161-118591859942","volume":"9","author":"H.C. Williams","year":"1985","unstructured":"Williams, H.C.: Some public-key crypto-functions as intractable as factorization. Cryptologia\u00a09, 223\u2013237 (1985)","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Number Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24847-7_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T14:07:29Z","timestamp":1636466849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24847-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221562","9783540248477"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24847-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}