{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:33:29Z","timestamp":1725514409939},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540725039"},{"type":"electronic","value":"9783540725046"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72504-6_17","type":"book-chapter","created":{"date-parts":[[2007,7,22]],"date-time":"2007-07-22T11:36:39Z","timestamp":1185104199000},"page":"189-198","source":"Crossref","is-referenced-by-count":1,"title":["New Left-to-Right Radix-r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems"],"prefix":"10.1007","author":[{"given":"Fanyu","family":"Kong","sequence":"first","affiliation":[]},{"given":"Jia","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhun","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Daxing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one-round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"17_CR4","unstructured":"Miller, V.S.: Short programs for functions on curves. Unpublished manuscript (1986), Available at: \n                    \n                      http:\/\/crypto.stanford.edu\/miller\/miller.pdf"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P. Barreto","year":"2002","unstructured":"Barreto, P., et al.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory","author":"S. Galbraith","year":"2002","unstructured":"Galbraith, S., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol.\u00a02369, pp. 324\u2013337. Springer, Heidelberg (2002)"},{"issue":"6","key":"17_CR7","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/s00200-002-0114-0","volume":"13","author":"N. Smart","year":"2003","unstructured":"Smart, N., Westwood, J.: Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three. Applicable Algebra in Engineering, Communication and Computing\u00a013(6), 485\u2013497 (2003)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-40061-5_7","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"I.M. Duursma","year":"2003","unstructured":"Duursma, I.M., Lee, H.-S.: Tate Pairing Implementation for Hyperelliptic Curves y\n                           2\u2009=\u2009x\n                           \n                    p\n                  \u2009\u2212\u2009x\u2009+\u2009d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 111\u2013123. Springer, Heidelberg (2003)"},{"issue":"2","key":"17_CR9","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","volume":"4","author":"A.D. Booth","year":"1951","unstructured":"Booth, A.D.: A Signed Binary Multiplication Technique. Q. J. Mech. Appl. Math.\u00a04(2), 236\u2013240 (1951)","journal-title":"Q. J. Mech. Appl. Math."},{"key":"17_CR10","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/S0065-2458(08)60610-5","volume":"1","author":"G.W. Reitwiesner","year":"1960","unstructured":"Reitwiesner, G.W.: Binary arithmetic. Advances in Computers\u00a01, 231\u2013308 (1960)","journal-title":"Advances in Computers"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/TIT.1973.1055100","volume":"19","author":"W. Clark","year":"1973","unstructured":"Clark, W., Liang, J.: On Arithmetic Weight for a General Radix Representation of Integers. IEEE Transaction on IT\u00a019, 823\u2013826 (1973)","journal-title":"IEEE Transaction on IT"},{"issue":"8","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/12.238495","volume":"42","author":"S. Arno","year":"1993","unstructured":"Arno, S., Wheeler, F.S.: Signed digit representations of minimal hamming weight. IEEE Transactions on Computers\u00a042(8), 1007\u20131010 (1993)","journal-title":"IEEE Transactions on Computers"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"J.A. Solinas","year":"1997","unstructured":"Solinas, J.A.: An improved algorithm for arithmetic on a family of elliptic curves. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 357\u2013371. Springer, Heidelberg (1997)"},{"key":"17_CR14","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s001459900045","volume":"11","author":"V. M\u00fcller","year":"1998","unstructured":"M\u00fcller, V.: Fast Multiplication on Elliptic Curves over Small Fields of Characteristic Two. Journal of Cryptology\u00a011, 219\u2013234 (1998)","journal-title":"Journal of Cryptology"},{"issue":"7","key":"17_CR15","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"M. Joye","year":"2000","unstructured":"Joye, M., Yen, S.-M.: Optimal left-to-right binary signed-digit recoding. IEEE Trans. on Comp.\u00a049(7), 740\u2013748 (2000)","journal-title":"IEEE Trans. on Comp."},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1007\/978-3-540-30564-4_9","volume-title":"Selected Areas in Cryptography","author":"R.M. Avanzi","year":"2004","unstructured":"Avanzi, R.M.: A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 130\u2013143. Springer, Heidelberg (2004)"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","first-page":"123","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"T. Takagi","year":"2004","unstructured":"Takagi, T., et al.: Signed Binary Representations Revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 123\u2013139. Springer, Heidelberg (2004)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/978-3-540-30574-3_25","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"J.A. Muir","year":"2005","unstructured":"Muir, J.A., Stinson, D.R.: New Minimal Weight Representations for Left-to-Right Window Methods. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 366\u2013383. Springer, Heidelberg (2005)"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/3-540-45664-3_27","volume-title":"Public Key Cryptography","author":"M. Joye","year":"2002","unstructured":"Joye, M., Yen, S.-M.: New Minimal Modified Radix-r Representation with Applications to Smart Cards. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 375\u2013384. Springer, Heidelberg (2002)"},{"issue":"3","key":"17_CR20","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1109\/TIT.2006.890775","volume":"53","author":"J.A. Muir","year":"2007","unstructured":"Muir, J.A.: A Simple Left-to-Right Algorithm for Minimal Weight Signed Radix-r Representations. IEEE Transactions on Information Theory\u00a053(3), 1234\u20131241 (2007)","journal-title":"IEEE Transactions on Information Theory"},{"key":"17_CR21","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/ICHIT.2006.253503","volume-title":"The First International Conference on Hybrid Information Technology","author":"F. Kong","year":"2006","unstructured":"Kong, F., et al.: Left-to-right Generalized Non-adjacent Form Recoding for Elliptic Curve Cryptosystems. In: The First International Conference on Hybrid Information Technology, pp. 299\u2013303. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"17_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/978-3-540-30144-8_9","volume-title":"Information Security","author":"T. Takagi","year":"2004","unstructured":"Takagi, T., Yen, S.-M., Wu, B.-C.: Radix-r Non-Adjacent Form. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 99\u2013110. Springer, Heidelberg (2004)"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/11599371_19","volume-title":"Cryptology and Network Security","author":"F. Kong","year":"2005","unstructured":"Kong, F., Li, D.: A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. In: Desmedt, Y.G., et al. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 223\u2013235. Springer, Heidelberg (2005)"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A Survey of Fast Exponentiation Methods. Journal of Algorithms\u00a027, 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"issue":"6","key":"17_CR25","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1109\/TC.2004.14","volume":"53","author":"B. Phillips","year":"2004","unstructured":"Phillips, B., Burgess, N.: Minimal Weight Digit Set Conversions. IEEE Transactions on Computers\u00a053(6), 666\u2013677 (2004)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Theory and Applications of Models of Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72504-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:38:05Z","timestamp":1619516285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72504-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540725039","9783540725046"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72504-6_17","relation":{},"subject":[]}}