{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:27Z","timestamp":1725558687934},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240150"},{"type":"electronic","value":"9783540318156"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31815-6_28","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T12:44:24Z","timestamp":1277901864000},"page":"345-359","source":"Crossref","is-referenced-by-count":7,"title":["Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors"],"prefix":"10.1007","author":[{"given":"Masanobu","family":"Katagi","sequence":"first","affiliation":[]},{"given":"Izuru","family":"Kitamura","sequence":"additional","affiliation":[]},{"given":"Toru","family":"Akishita","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/10958513_17","volume-title":"Information Security","author":"T. Akishita","year":"2003","unstructured":"Akishita, T., Takagi, T.: Zero-Value Point Attacks on Elliptic Curve Cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 218\u2013233. Springer, Heidelberg (2003)"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-540-45238-6_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R. Avanzi","year":"2003","unstructured":"Avanzi, R.: Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 366\u2013381. Springer, Heidelberg (2003)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Avanzi, R.: Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations. Cryptology ePrint Archive, 2003\/253, IACR (2003)","DOI":"10.1007\/978-3-540-28632-5_11"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"D. Cantor","year":"1987","unstructured":"Cantor, D.: Computing in the Jacobian of a Hyperelliptic Curve. Mathematics of Computation\u00a048, 95\u2013101 (1987)","journal-title":"Mathematics of Computation"},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"28_CR7","unstructured":"Dhem, J.F., Koeune, F., Leroux, P.A., Mestr\u00e9, P., Quisquater, J.J., Willems, J.L.: A Practical Implementation of the Timing Attack. UCL Crypto Group Technical Report CG 1998\/1 (1998)"},{"key":"28_CR8","unstructured":"GMP, GNU MP Library GMP, http:\/\/www.swox.com\/gmp"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography - PKC 2003","author":"L. Goubin","year":"2003","unstructured":"Goubin, L.: A Refined Power-Analysis Attack on Elliptic Curve Cryptosystem. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 199\u2013210. Springer, Heidelberg (2003)"},{"key":"28_CR10","unstructured":"Harley, R.: Adding.text (2000), http:\/\/cristal.inria.fr\/~harley\/hyper\/"},{"key":"28_CR11","unstructured":"Harley, R.: Doubling.c (2000), http:\/\/cristal.inria.fr\/~harley\/hyper\/"},{"key":"28_CR12","unstructured":"Hess, F., Seroussi, G., Smart, N.: Two Topics in Hyperelliptic Cryptography. CSTR-00-008, Depart. of Computer Science, University of Bristol (2000)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-36288-6_17","volume-title":"Public Key Cryptography - PKC 2003","author":"T. Izu","year":"2002","unstructured":"Izu, T., Takagi, T.: Exceptional Procedure Attack on Elliptic Curve Cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 224\u2013239. Springer, Heidelberg (2002)"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Tymen, C.: Protection against Differential Analysis for Elliptic Curve Cryptography. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 377\u2013390. Springer, Heidelberg (2001)"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Katagi, M., Kitamura, I., Akishita, T., Takagi, T.: Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors. Cryptology ePrint Archive, IACR (2004), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-31815-6_28"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology\u00a01, 139\u2013150 (1989)","journal-title":"Journal of Cryptology"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"C. Kocher","year":"1996","unstructured":"Kocher, C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"C. Kocher","year":"1999","unstructured":"Kocher, C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"28_CR19","unstructured":"Kuroki, J., Gonda, M., Matsuo, K., Chao, J., Tsujii, S.: Fast Genus Three Hyperelliptic Curve Cryptosystems. In: Proc. of SCIS 2002 (2002)"},{"key":"28_CR20","unstructured":"Lange, T.: Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae. Cryptology ePrint Archive, 2002\/121, IACR (2002)"},{"key":"28_CR21","unstructured":"Lange, T.: Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves. Cryptology ePrint Archive, 2002\/147, IACR (2002)"},{"key":"28_CR22","unstructured":"Lange, T.: Weighed Coordinate on Genus 2 Hyperellipitc Curve. Cryptology ePrint Archive, 2002\/153, IACR (2002)"},{"key":"28_CR23","volume-title":"Progress in Mathematics 43","author":"D. Mumford","year":"1984","unstructured":"Mumford, D.: Tata Lectures on Theta II. In: Progress in Mathematics 43, Birkh\u00e4user, Basel (1984)"},{"key":"28_CR24","unstructured":"Matsuo, K., Chao, J., Tsuji, S.: Fast Genus Two Hyperelliptic Curve Cryptosystems. Technical Report ISEC2001-31, IEICE Japan, pp.\u00a089\u201396 (2001)"},{"key":"28_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/10722028_28","volume-title":"Algorithmic Number Theory","author":"N. Nagao","year":"2000","unstructured":"Nagao, N.: Improving Group Law Algorithms for Jacobians of Hyperelliptic Curves. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 439\u2013448. Springer, Heidelberg (2000)"},{"key":"28_CR26","unstructured":"NTL: A Library for Doing Number Theory, http:\/\/www.shoup.net\/ntl"},{"key":"28_CR27","unstructured":"Pelzl, J.: Hyperelliptic Cryptosystems on Embedded Microprocessors. Diploma Thesis, R\u00fchr-Universit\u00e4t Bochum (2002)"},{"key":"28_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-45238-6_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"J. Pelzl","year":"2003","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 351\u2013365. Springer, Heidelberg (2003)"},{"key":"28_CR29","unstructured":"Sugizaki, T., Matsuo, K., Chao, J., Tsujii, S.: An Extension of Harley Addition Algorithm for Hyperelliptic Curves over Finite Fields of Characteristic Two. Technical Report ISEC2002-9, IEICE Japan, pp.\u00a049\u201356 (2002)"},{"key":"28_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/3-540-44499-8_8","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"W. Schindler","year":"2000","unstructured":"Schindler, W.: A Timing Attack against RSA with the Chinese Remainder Theorem. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 109\u2013124. Springer, Heidelberg (2000)"},{"key":"28_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-45664-3_19","volume-title":"Public Key Cryptography","author":"W. Schindler","year":"2002","unstructured":"Schindler, W.: A Combined Timing and Power Attack. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 263\u2013279. Springer, Heidelberg (2002)"},{"key":"28_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45325-3_22","volume-title":"Cryptography and Coding","author":"W. Schindler","year":"2001","unstructured":"Schindler, W., Koeune, F., Quisquater, J.-J.: Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection\/Correction Strategies. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol.\u00a02260, pp. 245\u2013267. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31815-6_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T08:07:34Z","timestamp":1635581254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31815-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540240150","9783540318156"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31815-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}