{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:22:28Z","timestamp":1759335748257},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642010002"},{"type":"electronic","value":"9783642010019"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01001-9_29","type":"book-chapter","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T12:38:25Z","timestamp":1239799105000},"page":"502-517","source":"Crossref","is-referenced-by-count":25,"title":["Double-Base Number System for Multi-scalar Multiplications"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Doche","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David R.","family":"Kohel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francesco","family":"Sica","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Adikari, J., Dimitrov, V., Imbert, L.: Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography, http:\/\/eprint.iacr.org\/2008\/","DOI":"10.1109\/ARITH.2009.10"},{"key":"29_CR2","series-title":"Discrete Mathematics and its Applications (Boca Raton)","volume-title":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","author":"R.M. Avanzi","year":"2005","unstructured":"Avanzi, R.M., Cohen, H., Doche, C., Frey, G., Nguyen, K., Lange, T., Vercauteren, F.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and its Applications (Boca Raton). Chapman & Hall\/CRC, Boca Raton (2005)"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11935230_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"R.M. Avanzi","year":"2006","unstructured":"Avanzi, R.M., Dimitrov, V.S., Doche, C., Sica, F.: Extending scalar multiplication using double bases. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 130\u2013144. Springer, Heidelberg (2006)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/11958239_9","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"R.M. Avanzi","year":"2006","unstructured":"Avanzi, R.M., Sica, F.: Scalar multiplication on koblitz curves using double bases. In: Nguy\u00ean, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol.\u00a04341, pp. 131\u2013146. Springer, Heidelberg (2006)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 29\u201350. Springer, Heidelberg (2007)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-77026-8_13","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J., Birkner, P., Lange, T., Peters, C.: Optimizing double-base elliptic-curve single-scalar multiplication. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 167\u2013182. Springer, Heidelberg (2007)"},{"key":"29_CR7","unstructured":"Bernstein, D.J., Lange, T.: Explicit-formulas database, http:\/\/www.hyperelliptic.org\/EFD\/"},{"issue":"2","key":"29_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10623-005-3299-y","volume":"39","author":"M. Ciet","year":"2006","unstructured":"Ciet, M., Joye, M., Lauter, K., Montgomery, P.L.: Trading Inversions for Multiplications in Elliptic Curve Cryptography. Des. Codes Cryptogr.\u00a039(2), 189\u2013206 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-39200-9_24","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Ciet","year":"2003","unstructured":"Ciet, M., Lange, T., Sica, F., Quisquater, J.-J.: Improved algorithms for efficient arithmetic on elliptic curves using fast endomorphisms. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 388\u2013400. Springer, Heidelberg (2003)"},{"issue":"7","key":"29_CR10","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/81.401149","volume":"42","author":"V.S. Dimitrov","year":"1995","unstructured":"Dimitrov, V.S., Cooklev, T.: Hybrid Algorithm for the Computation of the Matrix Polynomial I\u2009+\u2009A\u2009+\u2009\u22ef\u2009+\u2009A N\u2009\u2212\u20091. IEEE Trans. on Circuits and Systems\u00a042(7), 377\u2013380 (1995)","journal-title":"IEEE Trans. on Circuits and Systems"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11593447_4","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"V.S. Dimitrov","year":"2005","unstructured":"Dimitrov, V.S., Imbert, L., Mishra, P.K.: Efficient and secure elliptic curve point multiplication using double-base chains. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 59\u201378. Springer, Heidelberg (2005)"},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11894063_35","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"V.S. Dimitrov","year":"2006","unstructured":"Dimitrov, V.S., J\u00e4rvinen, K.U., Jacobson Jr., M.J., Chan, W.F., Huang, Z.: FPGA implementation of point multiplication on koblitz curves using kleinian integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 445\u2013459. Springer, Heidelberg (2006)"},{"issue":"3","key":"29_CR13","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/S0020-0190(98)00044-1","volume":"66","author":"V.S. Dimitrov","year":"1998","unstructured":"Dimitrov, V.S., Jullien, G.A., Miller, W.C.: An Algorithm for Modular Exponentiation. Information Processing Letters\u00a066(3), 155\u2013159 (1998)","journal-title":"Information Processing Letters"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-70500-0_32","volume-title":"Information Security and Privacy","author":"C. Doche","year":"2008","unstructured":"Doche, C., Habsieger, L.: A tree-based approach for computing double-base chains. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol.\u00a05107, pp. 433\u2013446. Springer, Heidelberg (2008)"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Doche, C., Kohel, D.R., Sica, F.: Double-Base Number System for Multi-Scalar Multiplications, http:\/\/eprint.iacr.org\/2008\/","DOI":"10.1007\/978-3-642-01001-9_29"},{"key":"29_CR16","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2003)"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11545262_7","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"K. Okeya","year":"2005","unstructured":"Okeya, K., Takagi, T., Vuillaume, C.: Short memory scalar multiplication on koblitz curves. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 91\u2013105. Springer, Heidelberg (2005)"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24591-9_35","volume-title":"Information Security Applications","author":"D.J. Park","year":"2004","unstructured":"Park, D.J., Sim, S.G., Lee, P.J.: Fast scalar multiplication method using change-of-basis matrix to prevent power analysis attacks on koblitz curves. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 474\u2013488. Springer, Heidelberg (2004)"},{"key":"29_CR19","unstructured":"Solinas, J.A.: Low-weight binary representations for pairs of integers. Combinatorics and Optimization Research Report CORR 2001-41, University of Waterloo (2001)"},{"key":"29_CR20","first-page":"806","volume":"70","author":"E.G. Straus","year":"1964","unstructured":"Straus, E.G.: Addition chains of vectors (problem 5125). Amer. Math. Monthly\u00a070, 806\u2013808 (1964)","journal-title":"Amer. Math. Monthly"},{"key":"29_CR21","series-title":"Discrete Mathematics and its Applications (Boca Raton)","doi-asserted-by":"crossref","DOI":"10.4324\/9780203484029","volume-title":"Elliptic Curves","author":"L.C. Washington","year":"2003","unstructured":"Washington, L.C.: Elliptic Curves. Discrete Mathematics and its Applications (Boca Raton). Chapman & Hall\/CRC, Boca Raton (2003); number theory and cryptography"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - EUROCRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01001-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T04:55:23Z","timestamp":1633323323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01001-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010002","9783642010019"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01001-9_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}