{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:39:57Z","timestamp":1742402397721},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_23","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"262-276","source":"Crossref","is-referenced-by-count":6,"title":["Improvements to the Point Halving Algorithm"],"prefix":"10.1007","author":[{"given":"Brian","family":"King","sequence":"first","affiliation":[]},{"given":"Ben","family":"Rubin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"482","volume-title":"Advances in Cryptology - Crypto 1991","author":"G. Agnew","year":"1991","unstructured":"Agnew, G., Mullin, R., Vanstone, S.: On the development of a fast elliptic curve processor chip. In: Advances in Cryptology - Crypto 1991, pp. 482\u2013487. Springer, Heidelberg (1991)"},{"issue":"8","key":"23_CR2","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/TC.2002.1024743","volume":"51","author":"E. Al-Daoud","year":"2002","unstructured":"Al-Daoud, E., Mahmod, R., Rushdan, M., Kilicman, A.: A New Addition Formula for Elliptic Curves over GF(2n). IEEE Transactions on Computers\u00a051(8), 972\u2013975 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"8","key":"23_CR3","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/12.238495","volume":"42","author":"S. Arno","year":"1993","unstructured":"Arno, S., Wheeler, F.: Signed Digit Representations of Minimal Hamming Weight. IEEE Transactions on Computers\u00a042(8), 1007\u20131009 (1993)","journal-title":"IEEE Transactions on Computers"},{"key":"23_CR4","volume-title":"Algorithmic Number Theory","author":"E. Bach","year":"1996","unstructured":"Bach, E., Shalit, J.: Algorithmic Number Theory. MIT Press, Cambridge (1996)"},{"key":"23_CR5","series-title":"London Mathematical Society Lecture Note Series","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107360211","volume-title":"Elliptic Curves in Cryptography","author":"I.F. Blake","year":"1999","unstructured":"Blake, I.F., Smart, N., Seroussi, G.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge (1999)"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Adv. in Appl. Math.\u00a07, 385\u2013434 (1986)","journal-title":"Adv. in Appl. Math."},{"unstructured":"Fong, K., Hankerson, D., Lopez, J., Menezes, A., Tucker, M.: Performance comparisons of elliptic curve systems in software. In: The 5th Workshop on Elliptic Curve Cryptography, ECC 2001 (2001), http:\/\/www.cacr.math.uwaterloo.ca\/conferences\/2001\/ecc\/hankerson.pdf","key":"23_CR7"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"D. Hankerson","year":"2000","unstructured":"Hankerson, D., Hernandez, J.L., Menezes, A.: Software Implementation of Elliptic Curve Cryptography over Binary Fields. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 1\u201324. Springer, Heidelberg (2000)"},{"unstructured":"Hankerson, D., Vanstone, S., Menezes, A.: A Guide to Elliptic Curve Cryptography (January 2004)","key":"23_CR9"},{"unstructured":"King, B.: A method to compute squares and square roots in GF(2n), http:\/\/www.engr.iupui.edu\/~briking\/papers\/sqr.ps","key":"23_CR10"},{"doi-asserted-by":"crossref","unstructured":"King, B.: An Improved Implementation of Elliptic Curves over GF(2n) when Using Projective Point Arithmetic. In: Selected Areas in Cryptography 2001, pp. 134\u2013150 (2001)","key":"23_CR11","DOI":"10.1007\/3-540-45537-X_11"},{"issue":"177","key":"23_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-48000-6_12","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"E. Knudsen","year":"1999","unstructured":"Knudsen, E.: Elliptic Scalar Multiplication Using Point Halving. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 135\u2013149. Springer, Heidelberg (1999)"},{"key":"23_CR14","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997)","edition":"2"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/3-540-48892-8_16","volume-title":"Selected Areas in Cryptography","author":"J. Lopez","year":"1999","unstructured":"Lopez, J., Dahab, R.: Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 201\u2013212. Springer, Heidelberg (1999)"},{"key":"23_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"177","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48\u00a0177, 243\u2013264 (1987)","journal-title":"Mathematics of Computation 48"},{"unstructured":"NIST, Recommended elliptic curves for federal use, http:\/\/www.nist.gov","key":"23_CR19"},{"unstructured":"IEEE P1363 Appendix A, http:\/\/www.grouper.org\/groups\/1363","key":"23_CR20"},{"unstructured":"Schroeppel, R.: Elliptic Curves: Twice as Fast! In: Rump session of CRYPTO 2000 (2000)","key":"23_CR21"},{"unstructured":"Seroussi, G.: Compact Representation of Elliptic Curve Points over F2n, HP Labs Technical Reports pp. 1-6, http:\/\/www.hpl.hp.com\/techreports\/98\/HPL-98-94R1.html","key":"23_CR22"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0020-0190(01)00169-7","volume":"80","author":"N.P. Smart","year":"2001","unstructured":"Smart, N.P.: A note on the x-coordinate of points on an elliptic curve in characteristic two. Information Processing Letters\u00a080, 261\u2013263 (2001)","journal-title":"Information Processing Letters"},{"unstructured":"WTLS Specification, http:\/\/www.wapforum.org","key":"23_CR24"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:18Z","timestamp":1605759678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}