{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:13:01Z","timestamp":1725491581642},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734888"},{"type":"electronic","value":"9783540734895"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73489-5_20","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T04:58:06Z","timestamp":1189486686000},"page":"349-366","source":"Crossref","is-referenced-by-count":3,"title":["Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2\u2009=\u2009x 7\u2009\u2212\u2009x \u00b11"],"prefix":"10.1007","author":[{"given":"Eunjeong","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hyang-Sook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yoonjin","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BFb0054012","volume-title":"Public Key Cryptography","author":"K. Araki","year":"1998","unstructured":"Araki, K., Miura, S., Satoh, T.: Overview of elliptic curve crptography. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 29\u201349. Springer, Heidelberg (1998)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45708-9_23","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P.S.L.M. Barreto","year":"2002","unstructured":"Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient Algorithms for Pairing-Based Cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 354\u2013368. Springer, Heidelberg (2002)"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","volume":"42","author":"P.S.L.M. Barreto","year":"2007","unstructured":"Barreto, P.S.L.M., Galbraith, S., \u00d3h\u00c9igeartaigh, C., Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties. Des. Codes Cryptogr.\u00a042, 239\u2013271 (2007)","journal-title":"Des. Codes Cryptogr."},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"713","DOI":"10.2307\/2004849","volume":"24","author":"E.R. Berlekamp","year":"1970","unstructured":"Berlekamp, E.R: Factoring polynomials over large finite fields. Math. Comp.\u00a024, 713\u2013735 (1970)","journal-title":"Math. Comp."},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","first-page":"18","volume-title":"Public Key Cryptography - PKC 2003","author":"J.C. Cha","year":"2002","unstructured":"Cha, J.C., Cheon, J.H.: An Identity-Based Signature from Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 18\u201330. Springer, Heidelberg (2002)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-540-24691-6_9","volume-title":"Information Security and Cryptology - ICISC 2003","author":"Y. Choie","year":"2004","unstructured":"Choie, Y., Lee, E.: Implementation of Tate pairing on hyperelliptic curves of genus 2. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 97\u2013111. Springer, Heidelberg (2004)"},{"key":"20_CR8","volume-title":"Ideals, varieties, and algorithms : an introduction to computational algebraic geometry and commutative algebra : with 91 illustrations","author":"D. Cox","year":"1997","unstructured":"Cox, D., Little, J., O\u2019Shea, D.: Ideals, varieties, and algorithms: an introduction to computational algebraic geometry and commutative algebra: with 91 illustrations. Springer, New York (1997)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Duursma, I.: Class numbers for hyperelliptic curves. In: Pellikaan, Perret, Vladuts (eds.) Arithmetic, Geometry and Coding Theory, pp. 45\u201352. deGruyter, Berlin (1996)","DOI":"10.1515\/9783110811056.45"},{"key":"20_CR10","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-3-642-57189-3_6","volume-title":"Coding theory, cryptography and related areas","author":"I. Duursma","year":"2000","unstructured":"Duursma, I., Sakurai, K.: Efficient algorithms for the Jacobian variety of hyperelliptic curves y 2\u2009=\u2009x p \u2212\u2009x\u2009+\u20091 over a finite field of odd characteristic p. In: Coding theory, cryptography and related areas (Guanajuato, 1998) pp. 73\u201389. Springer, Heidelberg (2000)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-40061-5_7","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"I. Duursma","year":"2003","unstructured":"Duursma, I., Lee, H.: Tate pairing implementation for hyperelliptic curves y 2\u2009=\u2009x p \u2009\u2212\u2009x\u2009+\u2009d. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 111\u2013123. Springer, Heidelberg (2003)"},{"issue":"206","key":"20_CR12","doi-asserted-by":"publisher","first-page":"865","DOI":"10.2307\/2153546","volume":"62","author":"G. Frey","year":"1994","unstructured":"Frey, G., R\u00fcck, H.-G.: A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Math. Comp.\u00a062(206), 865\u2013874 (1994)","journal-title":"Math. Comp."},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45455-1_26","volume-title":"Algorithmic Number Theory - V","author":"S.D. Galbraith","year":"2002","unstructured":"Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory - V. LNCS, vol.\u00a02369, pp. 324\u2013337. Springer, Heidelberg (2002)"},{"key":"20_CR14","unstructured":"Greuel, G.-M., Pfister, G., Sch\u00f6nemann, H.: SINGULAR 3.0. A Computer Algebra System for PolynomialComputations. Centre for Computer Algebra, University ofKaiserslautern (2005) http:\/\/www.singular.uni-kl.de"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory IV","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory IV. LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"4595","DOI":"10.1109\/TIT.2006.881709","volume":"52","author":"F. Hess","year":"2006","unstructured":"Hess, F., Smart, N.P., Vercauteren, F.: The Eta Pairing Revisited. IEEE Trans. Information Theory\u00a052, 4595\u20134602 (2006)","journal-title":"IEEE Trans. Information Theory"},{"issue":"7","key":"20_CR17","first-page":"595","volume":"7","author":"A. Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of Multidigit Numbers on Automata (Engl. transl.). Sov. Phys.-Dokl.\u00a07(7), 595\u2013596 (1963)","journal-title":"Sov. Phys.-Dokl."},{"key":"20_CR18","volume-title":"The Art of Computer Programming","author":"D.E. Knuth","year":"2004","unstructured":"Knuth, D.E.: The Art of Computer Programming, vol.\u00a0II. Addison Wesley, London (2004)"},{"key":"20_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03642-6","volume-title":"Algebraic Aspects of Cryptography","author":"N. Koblitz","year":"1998","unstructured":"Koblitz, N.: Algebraic Aspects of Cryptography. Springer, Heidelberg (1998)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11586821_2","volume-title":"Cryptography and Coding","author":"N. Koblitz","year":"2005","unstructured":"Koblitz, N., Menezes, A.: Pairing-based cryptography at high security levels. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol.\u00a03796, pp. 3\u201336. Springer, Heidelberg (2005)"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/11506157_12","volume-title":"Information Security and Privacy","author":"S. Kwon","year":"2005","unstructured":"Kwon, S.: Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol.\u00a03574, pp. 134\u2013145. Springer, Heidelberg (2005)"},{"issue":"5","key":"20_CR22","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00200-004-0154-8","volume":"15","author":"T. Lange","year":"2005","unstructured":"Lange, T.: Formulae for arithmetic on genus 2 hyperelliptic curves. Appl. Algebra Engrg. Comm. Comput.\u00a015(5), 295\u2013328 (2005)","journal-title":"Appl. Algebra Engrg. Comm. Comput."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Mumford, D.: Tata Lectures on Theta II, Birkhauser (1984)","DOI":"10.1007\/978-1-4899-2843-6"},{"issue":"18","key":"20_CR24","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/el:20020682","volume":"38","author":"K.G. Paterson","year":"2002","unstructured":"Paterson, K.G.: ID-based signature from pairings on elliptic curves. Electronics Letters\u00a038(18), 1025\u20131026 (2002)","journal-title":"Electronics Letters"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Selected Areas in Cryptography","author":"J. Pelzl","year":"2004","unstructured":"Pelzl, J., Wollinger, T., Paar, C.: Low cost security: explicit formulae for genus-4 hyperelliptic curves. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol.\u00a03006, pp. 1\u201316. Springer, Heidelberg (2004)"},{"key":"20_CR26","unstructured":"Shoup, V.: A library for doing number theory, Software (2001), http:\/\/www.shoup.net\/ntl\/"},{"key":"20_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/3-540-48910-X_12","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"N. Smart","year":"1999","unstructured":"Smart, N.: On the Performance of Hyperelliptic Cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 165\u2013175. Springer, Heidelberg (1999)"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An identity based authentication key agreement protocol based on pairing. Electronics Letters\u00a038, 630\u2013632 (2002)","journal-title":"Electronics Letters"},{"key":"20_CR29","volume-title":"Fundamental Problems in Algorithmic Algebra","author":"C.K. Yap","year":"2000","unstructured":"Yap, C.K.: Fundamental Problems in Algorithmic Algebra. Oxford University Press, Oxford (2000)"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography \u2013 Pairing 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73489-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T23:39:52Z","timestamp":1684021192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73489-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734888","9783540734895"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73489-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}