{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:56:07Z","timestamp":1725533767039},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642023835"},{"type":"electronic","value":"9783642023842"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02384-2_24","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T00:37:08Z","timestamp":1245285428000},"page":"386-402","source":"Crossref","is-referenced-by-count":2,"title":["On Modular Decomposition of Integers"],"prefix":"10.1007","author":[{"given":"Billy Bob","family":"Brumley","sequence":"first","affiliation":[]},{"given":"Kaisa","family":"Nyberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R.P. Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"issue":"7","key":"24_CR2","doi-asserted-by":"publisher","first-page":"806","DOI":"10.2307\/2310929","volume":"71","author":"R. Bellman","year":"1964","unstructured":"Bellman, R., Straus, E.G.: Problems and Solutions: Solutions of Advanced Problems: 5125. Amer. Math. Monthly\u00a071(7), 806\u2013808 (1964)","journal-title":"Amer. Math. Monthly"},{"issue":"4","key":"24_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in cryptology\u2014EUROCRYPT 2009","author":"S.D. Galbraith","year":"2009","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. In: Advances in cryptology\u2014EUROCRYPT 2009. LNCS, Springer, Heidelberg (2009) (to appear)"},{"key":"24_CR5","unstructured":"Gallant, R.: Faster elliptic curve cryptography using efficient endomorphisms. In: 3rd workshop on Elliptic Curve Cryptography\u2014ECC 1999 (1999) (presentation slides)"},{"key":"24_CR6","unstructured":"SECG: Recommended elliptic curve domain parameters. Standards for Efficient Cryptography SEC 2 (September\u00a020, 2000)"},{"key":"24_CR7","unstructured":"ANSI: Public key cryptography for the financial services industry: Key agreement and key transport using elliptical curve cryptography (2001) ANSI X9.63"},{"key":"24_CR8","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"issue":"1","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L. Babai","year":"1986","unstructured":"Babai, L.: On Lov\u00e1sz\u2019 lattice reduction and the nearest lattice point problem. Combinatorica\u00a06(1), 1\u201313 (1986)","journal-title":"Combinatorica"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36492-7_2","volume-title":"Selected Areas in Cryptography","author":"D. Kim","year":"2003","unstructured":"Kim, D., Lim, S.: Integer decomposition for fast scalar multiplication on elliptic curves. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 13\u201320. Springer, Heidelberg (2003)"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-36492-7_3","volume-title":"Selected Areas in Cryptography","author":"F. Sica","year":"2003","unstructured":"Sica, F., Ciet, M., Quisquater, J.J.: Analysis of the Gallant-Lambert-Vanstone method based on efficient endomorphisms: elliptic and hyperelliptic curves. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 21\u201336. Springer, Heidelberg (2003)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/3-540-45664-3_23","volume-title":"Public Key Cryptography","author":"Y.H. Park","year":"2002","unstructured":"Park, Y.H., Jeong, S., Kim, C.H., Lim, J.: An alternate decomposition of an integer for faster point multiplication on certain elliptic curves. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 323\u2013334. Springer, Heidelberg (2002)"},{"issue":"1-3","key":"24_CR13","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.tcs.2004.02.012","volume":"319","author":"P.J. Grabner","year":"2004","unstructured":"Grabner, P.J., Heuberger, C., Prodinger, H.: Distribution results for low-weight binary representations for pairs of integers. Theoret. Comput. Sci.\u00a0319(1-3), 307\u2013331 (2004)","journal-title":"Theoret. Comput. Sci."},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/11693383_21","volume-title":"Selected Areas in Cryptography","author":"A. Antipa","year":"2006","unstructured":"Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 307\u2013318. Springer, Heidelberg (2006)"},{"key":"24_CR15","volume-title":"The Art of Computer Programming, Volume II: Seminumerical Algorithms","author":"D.E. Knuth","year":"1981","unstructured":"Knuth, D.E.: The Art of Computer Programming, Volume II: Seminumerical Algorithms, 2nd edn. Addison-Wesley, Reading (1981)","edition":"2"},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/ICECS.2006.379768","volume-title":"Proceedings of the 13th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2006","author":"K. J\u00e4rvinen","year":"2006","unstructured":"J\u00e4rvinen, K., Forsten, J., Skytt\u00e4, J.: Efficient circuitry for computing \u03c4-adic non-adjacent form. In: Proceedings of the 13th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2006, pp. 232\u2013235. IEEE, Los Alamitos (2006)"},{"issue":"1","key":"24_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/JMC.2007.001","volume":"1","author":"T. Lange","year":"2007","unstructured":"Lange, T., Shparlinski, I.E.: Distribution of some sequences of points on elliptic curves. J. Math. Cryptol.\u00a01(1), 1\u201311 (2007)","journal-title":"J. Math. Cryptol."},{"volume-title":"Handbook of elliptic and hyperelliptic curve cryptography","year":"2005","key":"24_CR18","unstructured":"Cohen, H., Frey, G. (eds.): Handbook of elliptic and hyperelliptic curve cryptography. CRC Press, Boca Raton (2005)"},{"key":"24_CR19","unstructured":"IEEE: IEEE P1363 working group for public-key cryptography standards. meeting minutes (November 15, 2000), \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/WorkingGroup\/minutes\/Nov00.txt"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02384-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T17:04:22Z","timestamp":1552064662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02384-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642023835","9783642023842"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02384-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}