{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:41:02Z","timestamp":1725514862261},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540694847"},{"type":"electronic","value":"9783540694854"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69485-4_10","type":"book-chapter","created":{"date-parts":[[2008,6,7]],"date-time":"2008-06-07T01:41:54Z","timestamp":1212802914000},"page":"134-149","source":"Crossref","is-referenced-by-count":6,"title":["Fast Point Decompression for Standard Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Billy Bob","family":"Brumley","sequence":"first","affiliation":[]},{"given":"Kimmo U.","family":"J\u00e4rvinen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"FIPS: Digital signature standard (DSS). FIPS PUB 186-2 (+ Change Notice). Technical report, U.S. DEPARTMENT OF COMMERCE\/National Institute of Standards and Technology (2000)"},{"key":"10_CR2","unstructured":"IEEE: Standard specifications for public-key cryptography. Technical Report IEEE P1363 \/ D13, Institute of Electrical and Electronics Engineers, Inc. (1999)"},{"key":"10_CR3","unstructured":"ANSI: The elliptic curve digital signature algorithm. American National Standards Institute, ANSI X9.62-1998 (1998)"},{"key":"10_CR4","unstructured":"SECG: Standards for efficient cryptography. Standards for Efficient Cryptography Group, Version 1.0 (2000)"},{"key":"10_CR5","unstructured":"NIST: Recommended elliptic curves for federal government use. Technical report, National Institute of Standards and Technology (NIST) (1999)"},{"key":"10_CR6","unstructured":"WTLS: Wireless application protocol, wireless transport layer security specification. Wireless Application Forum (1999)"},{"key":"10_CR7","unstructured":"BSIG: Simple pairing whitepaper. Technical report, Bluetooth Special Interest Group (2006), \n                    \n                      http:\/\/www.bluetooth.com\/Bluetooth\/Apply\/Technology\/Research\/.Simple_Pairing.htm\n                    \n                    \n                  ."},{"key":"10_CR8","unstructured":"Cox, M., Engelschall, R., Henson, S., Laurie, B.: The OpenSSL Project. v0.9.8g (2007), \n                    \n                      http:\/\/www.openssl.org\/"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Information Theory"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"1","key":"10_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. J. Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"J. Algorithms"},{"key":"10_CR12","series-title":"The Art of Computer Programming","volume-title":"Seminumerical Algorithms","author":"D.E. Knuth","year":"1998","unstructured":"Knuth, D.E.: Seminumerical Algorithms. 3rd edn. The Art of Computer Programming, vol.\u00a02. Addison-Wesley, Reading (1998)","edition":"3"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1090\/S0002-9904-1939-07068-7","volume":"45","author":"A. Brauer","year":"1939","unstructured":"Brauer, A.: On addition chains. Bulletin of the American Mathematical Society\u00a045, 736\u2013739 (1939)","journal-title":"Bulletin of the American Mathematical Society"},{"issue":"247","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1090\/S0025-5718-03-01599-0","volume":"73","author":"J. zur Gathen von","year":"2004","unstructured":"von zur Gathen, J., N\u00f6cker, M.: Computing special powers in finite fields. Math. Comp.\u00a073(247), 1499\u20131523 (2004) (electronic)","journal-title":"Math. Comp."},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/0-387-34805-0_37","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"J.N. Bos","year":"1990","unstructured":"Bos, J.N., Coster, M.J.: Addition chain heuristics. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 400\u2013407. Springer, Heidelberg (1990)"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Comm. ACM"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-45353-9_19","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Brown","year":"2001","unstructured":"Brown, M., Hankerson, D., L\u00f3pez, J., Menezes, A.: Software implementation of the NIST elliptic curves over prime fields. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 250\u2013265. Springer, Heidelberg (2001)"},{"key":"10_CR18","unstructured":"Beiler, A.H.: Recreations in the Theory of Numbers. Dover, NY (1964)"},{"issue":"3","key":"10_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases. Inform. and Comput.\u00a078(3), 171\u2013177 (1988)","journal-title":"Inform. and Comput."},{"issue":"170","key":"10_CR20","doi-asserted-by":"publisher","first-page":"519","DOI":"10.2307\/2007970","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comp.\u00a044(170), 519\u2013521 (1985)","journal-title":"Math. Comp."},{"key":"10_CR21","unstructured":"Altera: Stratix II device handbook, vol. 1\u20132, ver. 4.1 (2006)"},{"key":"10_CR22","unstructured":"Solinas, J.A.: Generalized Mersenne numbers. Technical report CORR 99-39, Centre for Applied Cryptographic Research, University of Waterloo (1999)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/3-540-44586-2_27","volume-title":"Public Key Cryptography","author":"J. Guajardo","year":"2001","unstructured":"Guajardo, J., Bl\u00fcmel, R., Krieger, U., Paar, C.: Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 365\u2013382. Springer, Heidelberg (2001)"},{"key":"10_CR24","unstructured":"Crandall, R.: Method and apparatus for public key exchange in a cryptographic system. United States Patent 5,159,632 (1992)"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69485-4_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:41:22Z","timestamp":1620002482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69485-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540694847","9783540694854"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69485-4_10","relation":{},"subject":[]}}