{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T12:10:26Z","timestamp":1737288626651,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734161"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73417-8_35","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T16:12:14Z","timestamp":1184602334000},"page":"277-285","source":"Crossref","is-referenced-by-count":0,"title":["Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers"],"prefix":"10.1007","author":[{"given":"Bang-ju","family":"Wang","sequence":"first","affiliation":[]},{"given":"Huan-guo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhang-yi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yu-hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory, IT-"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of computation"},{"key":"35_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Katti, R.: Speeding up Elliptic Cryptosystems using a new Signed Binary Representation for Integers. In: Proceeding of the Euromicro Symposium on Digital System Design (DSD\u201902), Dortmund, DE, pp. 380\u2013384 (2002)","key":"35_CR4","DOI":"10.1109\/DSD.2002.1115395"},{"doi-asserted-by":"crossref","unstructured":"Xiaoyu, R., Katti, R.: On the Signed-Binary Window Method. In: International conference of ISCAS 2005, Kobe, Japan, vol. 5, pp. 4501\u20134504 (2005)","key":"35_CR5","DOI":"10.1109\/ISCAS.2005.1465632"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/TC.2005.34","volume":"54","author":"R. Xiaoyu","year":"2005","unstructured":"Xiaoyu, R., Katti, R.: Left-to-Right Optimal Signed-Binary Representation of a Pair of integers. IEEE Transactions on Computers\u00a054, 132\u2013140 (2005)","journal-title":"IEEE Transactions on Computers"},{"unstructured":"Moon, S.: Elliptic Curve Scalar Point Multiplication Using Radix-4 Booth\u2019s Algorithm. In: International Symposium on Communications and Information Technologies, pp. 26\u201329 (2004)","key":"35_CR7"},{"key":"35_CR8","first-page":"132","volume":"3","author":"S. Moon","year":"2006","unstructured":"Moon, S.: A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems. International Journal of Network Security\u00a03, 132\u2013137 (2006)","journal-title":"International Journal of Network Security"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.1016\/j.amc.2006.05.111","volume":"183","author":"K.W. Wong","year":"2006","unstructured":"Wong, K.W., Edward, C.W., Lee, C.L.M., Liao, X.: Fast elliptic scalar multiplication using new double-base chain and point halving. Applied Mathematics and Computation\u00a0183, 1000\u20131007 (2006)","journal-title":"Applied Mathematics and Computation"},{"unstructured":"Solinas, J.A.: Low-Weight Binary Representations for Pairs of Integers. Technical Report, CORR 2001-41, Center for Applied Cryptographic Research, University of Waterloo, Canada (2001)","key":"35_CR10"},{"unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Huanguo Zhang. Publishing House of Electronics Industry, pp. 74\u201376 (2005)","key":"35_CR11"},{"key":"35_CR12","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027, 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"35_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/3-540-48071-4_25","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"K. Koyama","year":"1993","unstructured":"Koyama, K., Tsuruoka, Y.: Speeding up elliptic cryptosystems by using a signed binary window method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 345\u2013357. Springer, Heidelberg (1993)"}],"container-title":["Lecture Notes in Computer Science","Multimedia Content Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73417-8_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T11:49:01Z","timestamp":1737287341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73417-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734161"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73417-8_35","relation":{},"subject":[]}}