{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:09Z","timestamp":1747104189175},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540730736"},{"type":"electronic","value":"9783540730743"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73074-3_7","type":"book-chapter","created":{"date-parts":[[2007,9,20]],"date-time":"2007-09-20T11:26:47Z","timestamp":1190287607000},"page":"69-84","source":"Crossref","is-referenced-by-count":8,"title":["Effects of Optimizations for Software Implementations of Small Binary Field Arithmetic"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Avanzi","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Th\u00e9riault","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/978-3-540-28632-5_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"R. Avanzi","year":"2004","unstructured":"Avanzi, R.: Aspects of hyperelliptic curves over large prime fields in software implementations. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 148\u2013162. Springer, Heidelberg (2004)"},{"key":"7_CR2","volume-title":"The Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"R. Avanzi","year":"2005","unstructured":"Avanzi, R., Cohen, H., Doche, C., Frey, G., Lange, T., Nguyen, K., Vercauteren, F.: The Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, Boca Raton (2005)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Fan, X., Wollinger, T., Wang, Y.: Efficient Doubling on Genus 3 Curves over Binary Fields. IACR ePrint 2005\/228","DOI":"10.1007\/11605805_5"},{"issue":"8","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TC.2004.43","volume":"53","author":"K. Fong","year":"2004","unstructured":"Fong, K., Hankerson, D., L\u00f3pez, J., Menezes, A.: Field Inversion and Point Halving Revisited. IEEE Trans. Computers\u00a053(8), 1047\u20131059 (2004)","journal-title":"IEEE Trans. Computers"},{"issue":"2","key":"7_CR5","first-page":"75","volume":"19","author":"C. Guyot","year":"2004","unstructured":"Guyot, C., Kaveh, K., Patankar, V.M.: Explicit algorithm for the arithmetic on the hyperelliptic Jacobians of genus 3. J. Ramanujan Math. Soc.\u00a019(2), 75\u2013115 (2004)","journal-title":"J. Ramanujan Math. Soc."},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44499-8_1","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"D. Hankerson","year":"2000","unstructured":"Hankerson, D., L\u00f3pez-Hernandez, J., Menezes, A.: Software Implementation of Elliptic Curve Cryprography over Binary Fields. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 1\u201324. Springer, Heidelberg (2000)"},{"key":"7_CR7","first-page":"595","volume":"7","author":"A. Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of Multidigit Numbers on Automata. Soviet Physics - Doklady\u00a07, 595\u2013596 (1963)","journal-title":"Soviet Physics - Doklady"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/3-540-45537-X_11","volume-title":"Selected Areas in Cryptography","author":"B. King","year":"2001","unstructured":"King, B.: An Improved Implementation of Elliptic Curves over GF(2 n ) when Using Projective Point Arithmetic. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 134\u2013150. Springer, Heidelberg (2001)"},{"key":"7_CR9","series-title":"Seminumerical Algorithms","volume-title":"The Art of Computer Programming","author":"D. Knuth","year":"1998","unstructured":"Knuth, D.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol.\u00a02. Addison Wesley Longman, Redwood City (1998)","edition":"3"},{"key":"7_CR10","unstructured":"Lange, T.: Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae. Cryptology ePrint Archive, Report 2002\/121"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","first-page":"170","volume-title":"Selected Areas in Cryptography","author":"T. Lange","year":"2005","unstructured":"Lange, T., Stevens, M.: Efficient doubling for genus two curves over binary fields. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 170\u2013181. Springer, Heidelberg (2005)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C. Lim","year":"1994","unstructured":"Lim, C., Lee, P.: More flexible exponentiation with precomputation. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 95\u2013107. Springer, Heidelberg (1994)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/3-540-44495-5_18","volume-title":"Progress in Cryptology - INDOCRYPT 2000","author":"J. L\u00f3pez","year":"2000","unstructured":"L\u00f3pez, J., Dahab, R.: High-speed software multiplication in $F_{2^m}$ . In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol.\u00a01977, pp. 203\u2013212. Springer, Heidelberg (2000)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Pelzl, J., Wollinger, T., Guajardo, J., Paar, C.: Hyperelliptic curve cryptosystems: closing the perfomance gap to elliptic curves (Update). IACR ePrint 2003\/026","DOI":"10.1007\/978-3-540-45238-6_28"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Selected Areas in Cryptography","author":"J. Pelzl","year":"2004","unstructured":"Pelzl, J., Wollinger, T., Paar, C.: Low cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 1\u201316. Springer, Heidelberg (2004)"},{"key":"7_CR16","first-page":"258","volume-title":"On the evaluation of powers and related problems (preliminary version)","author":"N. Pippenger","year":"1976","unstructured":"Pippenger, N.: On the evaluation of powers and related problems (preliminary version). 17th Annual Symp. on Foundations of Comp. Sci, pp. 258\u2013263. IEEE Computer Society, Los Alamitos (1976)"},{"key":"7_CR17","volume-title":"Fast Algorithms\u2013A Multitape Turing Machine Implementation","author":"A. Sch\u00f6nhage","year":"1994","unstructured":"Sch\u00f6nhage, A., Grotefeld, A.F.W., Vetter, E.: Fast Algorithms\u2013A Multitape Turing Machine Implementation. BI Wissenschafts-Verlag, Mannheim (1994)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/3-540-44750-4_4","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"R. Schroeppel","year":"1995","unstructured":"Schroeppel, R., Orman, H., O\u2019Malley, S., Spatscheck, O.: Fast key exchange with elliptic curve systems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 43\u201356. Springer, Heidelberg (1995)"},{"key":"7_CR19","unstructured":"Shoup, V.: NTL: A Library for doing number theory. URL: http:\/\/shoup.net\/ntl\/"},{"key":"7_CR20","unstructured":"Sun Corporation\u2019s Elliptic Curve Cryptography contributions to OpenSSL. Available at http:\/\/research.sun.com\/projects\/crypto\/"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/3-540-45067-X_8","volume-title":"Information Security and Privacy","author":"A. Weimerskirch","year":"2003","unstructured":"Weimerskirch, A., Stebila, D., Shantz, S.C.: Generic GF(2 m ) Arithmetic in Software and its Application to ECC. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 79\u201392. Springer, Heidelberg (2003)"},{"key":"7_CR22","unstructured":"Wollinger, T.: Software and Hardware Implementation of Hyperelliptic Curve Cryptosystems. Ph.D. Thesis, Ruhr-Universit\u00e4t Bochum, Germany (2004)"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Wollinger, T., Pelzl, J., Paar, C.: Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystems. IEEE Transactions on Computers (To appear)","DOI":"10.1109\/TC.2005.109"}],"container-title":["Lecture Notes in Computer Science","Arithmetic of Finite Fields"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73074-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:58:59Z","timestamp":1619517539000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73074-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540730736","9783540730743"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73074-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}