{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T20:50:39Z","timestamp":1767991839919,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540794554","type":"print"},{"value":"9783540794561","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-79456-1_6","type":"book-chapter","created":{"date-parts":[[2008,5,6]],"date-time":"2008-05-06T00:16:34Z","timestamp":1210032994000},"page":"102-117","source":"Crossref","is-referenced-by-count":10,"title":["On Prime-Order Elliptic Curves with Embedding Degrees k\u2009=\u20093, 4, and 6"],"prefix":"10.1007","author":[{"given":"Koray","family":"Karabina","sequence":"first","affiliation":[]},{"given":"Edlyn","family":"Teske","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"203","key":"6_CR1","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2307\/2152935","volume":"61","author":"A.O.L. Atkin","year":"1993","unstructured":"Atkin, A.O.L., Morain, F.: Elliptic curves and primality proving. Math. Comp.\u00a061(203), 29\u201368 (1993)","journal-title":"Math. Comp."},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","volume":"42","author":"P.S.L.M. Barreto","year":"2007","unstructured":"Barreto, P.S.L.M., Galbraith, S., O\u2019hEigeartaigh, C., Scott, M.: Efficient pairing computation on supersingular abelian varieties. Designs, Codes and Cryptography\u00a042, 239\u2013271 (2007)","journal-title":"Designs, Codes and Cryptography"},{"key":"6_CR3","unstructured":"Computational\u00a0Algebra Group: The Magma computational algebra system for algebra, number theory and geometry. School of Mathematics and Statistics, University of Sydney, \n                    \n                      http:\/\/magma.maths.usyd.edu.au\/magma"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/b99099","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"M. Franklin","year":"2004","unstructured":"Franklin, M., Boneh, D.: Identity based encryption from the Weil pairing. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"},{"key":"6_CR5","unstructured":"Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. Cryptology ePrint Archive Report 2006\/372 (2006), \n                    \n                      http:\/\/eprint.iacr.org\/2006\/372\/"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1155\/S1073792898000592","volume":"19","author":"A. Granville","year":"1998","unstructured":"Granville, A.: ABC allows us to count squarefrees. International Mathematical Research Notices\u00a019, 991\u20131009 (1998)","journal-title":"International Mathematical Research Notices"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"4595","DOI":"10.1109\/TIT.2006.881709","volume":"52","author":"F. Hess","year":"2006","unstructured":"Hess, F., Smart, N., Vercauteren, F.: The Eta pairing revisited. IEEE Transactions on Information Theory\u00a052, 4595\u20134602 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A one round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 383\u2013394. Springer, Heidelberg (2000)"},{"key":"6_CR9","unstructured":"Karabina, K.: On prime-order elliptic curves with embedding degrees 3,4 and 6. Master\u2019s thesis, University of Waterloo (2006), \n                    \n                      http:\/\/uwspace.uwaterloo.ca\/handle\/10012\/2671"},{"key":"6_CR10","first-page":"182","volume":"49","author":"H.W. Lenstra Jr.","year":"2002","unstructured":"Lenstra Jr., H.W.: Solving the Pell equation. Notices Amer. Math. Soc.\u00a049, 182\u2013192 (2002)","journal-title":"Notices Amer. Math. Soc."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s00145-006-0544-0","volume":"19","author":"F. Luca","year":"2006","unstructured":"Luca, F., Shparlinski, I.E.: Elliptic curves with low embedding degree. Journal of Cryptology\u00a019, 553\u2013562 (2006)","journal-title":"Journal of Cryptology"},{"key":"6_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-9356-6","volume-title":"Number fields","author":"D.A. Marcus","year":"1977","unstructured":"Marcus, D.A.: Number fields. Springer, New York (1977)"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"A. Menezes","year":"1993","unstructured":"Menezes, A., Okamoto, T., Vanstone, S.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory\u00a039, 1639\u20131646 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR14","first-page":"1234","volume":"E84-A","author":"A. Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundamentals\u00a0E84-A, 1234\u20131243 (2001)","journal-title":"IEICE Trans. Fundamentals"},{"key":"6_CR15","volume-title":"Fundamental number theory with applications","author":"R.A. Mollin","year":"1998","unstructured":"Mollin, R.A.: Fundamental number theory with applications. CRC Press, Boca Raton (1998)"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/S0723-0869(01)80015-3","volume":"19","author":"R.A. Mollin","year":"2001","unstructured":"Mollin, R.A.: Simple continued fraction solutions for Diophantine equations. Expositiones Mathematicae\u00a019, 55\u201373 (2001)","journal-title":"Expositiones Mathematicae"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00200-006-0017-6","volume":"17","author":"D. Page","year":"2006","unstructured":"Page, D., Smart, N.P., Vercauteren, F.: A comparison of MNT curves and supersingular curves. Applicable Algebra in Engineering, Communication and Computing\u00a017, 379\u2013392 (2006)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/BF03017586","volume":"57","author":"G. Ricci","year":"1933","unstructured":"Ricci, G.: Ricerche aritmetiche sui polinomi. Rend. Circ. Mat. Palermo.\u00a057, 433\u2013475 (1933)","journal-title":"Rend. Circ. Mat. Palermo."},{"key":"6_CR19","unstructured":"Robertson, J.P.: Solving the generalized Pell equation x\n                           2\u2009\u2212\u2009dy\n                           2\u2009=\u2009n (2004), \n                    \n                      http:\/\/hometown.aol.com\/jpr2718\/"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10623-005-0538-1","volume":"38","author":"M. Scott","year":"2006","unstructured":"Scott, M., Barreto, P.S.L.M.: Generating more MNT elliptic curves. Designs, Codes and Cryptography\u00a038, 209\u2013217 (2006)","journal-title":"Designs, Codes and Cryptography"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","first-page":"514","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"H. Shacham","year":"2001","unstructured":"Shacham, H., Boneh, D., Lynn, B.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Number Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79456-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T15:45:47Z","timestamp":1551455147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79456-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540794554","9783540794561"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79456-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}