{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:54:53Z","timestamp":1764996893941},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406747"},{"type":"electronic","value":"9783540451464"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_21","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T17:51:19Z","timestamp":1277229079000},"page":"349-365","source":"Crossref","is-referenced-by-count":56,"title":["Torus-Based Cryptography"],"prefix":"10.1007","author":[{"given":"Karl","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Alice","family":"Silverberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-44750-4_31","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"D. Bleichenbacher","year":"1995","unstructured":"Bleichenbacher, D., Bosma, W., Lenstra, A.K.: Some remarks on Lucas-based cryptosystems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 386\u2013396. Springer, Heidelberg (1995)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-36178-2_3","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"W. Bosma","year":"2002","unstructured":"Bosma, W., Hutton, J., Verheul, E.R.: Looking beyond XTR. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 46\u201363. Springer, Heidelberg (2002)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-540-48000-6_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"A.E. Brouwer","year":"1999","unstructured":"Brouwer, A.E., Pellikaan, R., Verheul, E.R.: Doing more with fewer bits. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 321\u2013332. Springer, Heidelberg (1999)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"de Bruijn, N.G.: On the factorization of cyclic groups. Nederl. Akad. Wetensch. Proc. Ser. A 56 (= Indagationes Math. 15), 370\u2013377 (1953)","DOI":"10.1016\/S1385-7258(53)50046-0"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1109\/18.796413","volume":"45","author":"G. Gong","year":"1999","unstructured":"Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Trans. Inform. Theory\u00a045, 2601\u20132605 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"21_CR6","first-page":"73","volume-title":"Arithmetic and geometry of varieties","author":"A.A. Klyachko","year":"1988","unstructured":"Klyachko, A.A.: On the rationality of tori with cyclic splitting field. In: Arithmetic and geometry of varieties, pp. 73\u201378. Kuybyshev Univ. Press, Kuybyshev (1988) (Russian)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Verheul, E.R.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"key":"21_CR8","first-page":"151","volume-title":"in Publickey cryptography and computational number theory (Warsaw, 2000)","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K., Verheul, E.R.: An overview of the XTR public key system. In: Publickey cryptography and computational number theory (Warsaw, 2000), pp. 151\u2013180. de Gruyter, Berlin (2001)"},{"key":"21_CR9","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"key":"21_CR10","first-page":"71","volume":"16","author":"W.B. M\u00fcller","year":"1981","unstructured":"M\u00fcller, W.B., N\u00f6bauer, W.: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar\u00a016, 71\u201376 (1981)","journal-title":"Studia Sci. Math. Hungar"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.2307\/1970307","volume":"74","author":"T. Ono","year":"1961","unstructured":"Ono, T.: Arithmetic of algebraic tori. Ann. of Math.\u00a074, 101\u2013139 (1961)","journal-title":"Ann. of Math."},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-45708-9_22","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"K. Rubin","year":"2002","unstructured":"Rubin, K., Silverberg, A.: Supersingular abelian varieties in cryptology. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 336\u2013353. Springer, Heidelberg (2002)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Rubin, K., Silverberg, A.: Algebraic tori in cryptography. In: To appear in High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams. Fields Institute Communications Series. American Mathematical Society, Providence","DOI":"10.1090\/fic\/041\/25"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1112\/S0025579300004344","volume":"11","author":"I.J. Schoenberg","year":"1964","unstructured":"Schoenberg, I.J.: A note on the cyclotomic polynomial. Mathematika\u00a011, 131\u2013136 (1964)","journal-title":"Mathematika"},{"key":"21_CR15","first-page":"103","volume-title":"Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec 1993","author":"P.J. Smith","year":"1993","unstructured":"Smith, P.J., Lennon, M.J.J.: LUC: A New Public Key System. In: Proceedings of the IFIP TC11 Ninth International Conference on Information Security IFIP\/Sec 1993, pp. 103\u2013117. North-Holland, Amsterdam (1993)"},{"key":"21_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0000447","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"P. Smith","year":"1995","unstructured":"Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 357\u2013364. Springer, Heidelberg (1995)"},{"key":"21_CR17","volume-title":"Algebraic groups and their birational invariants, Translations of Mathematical Monographs","author":"V.E. Voskresenskii","year":"1998","unstructured":"Voskresenskii, V.E.: Algebraic groups and their birational invariants, Translations of Mathematical Monographs, vol.\u00a0179. American Mathematical Society, Providence (1998)"},{"key":"21_CR18","doi-asserted-by":"crossref","first-page":"263","DOI":"10.5802\/jtnb.250","volume":"11","author":"V.E. Voskresenskii","year":"1999","unstructured":"Voskresenskii, V.E.: Stably rational algebraic tori, Les XX\u00e8mes Journ\u00e9es Arithm\u00e9tiques (Limoges, 1997). J. Th\u00e9or. Nombres Bordeaux\u00a011, 263\u2013268 (1999)","journal-title":"J. Th\u00e9or. Nombres Bordeaux"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Weil, A.: Adeles and algebraic groups. Progress in Math. 23, Birkh\u00e4user, Boston (1982)","DOI":"10.1007\/978-1-4684-9156-2"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2307\/2007633","volume":"39","author":"H.C. Williams","year":"1982","unstructured":"Williams, H.C.: A p + 1 method of factoring. Math. Comp.\u00a039, 225\u2013234 (1982)","journal-title":"Math. Comp."},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/0161-118591859942","volume":"9","author":"H.C. Williams","year":"1985","unstructured":"Williams, H.C.: Some public-key crypto-functions as intractable as factorization. Cryptologia\u00a09, 223\u2013237 (1985)","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:51:43Z","timestamp":1559195503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}