{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:42:19Z","timestamp":1725540139589},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642052576"},{"type":"electronic","value":"9783642052583"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05258-3_60","type":"book-chapter","created":{"date-parts":[[2009,10,31]],"date-time":"2009-10-31T15:14:41Z","timestamp":1257002081000},"page":"680-691","source":"Crossref","is-referenced-by-count":15,"title":["Finding Minimal Addition Chains with a Particle Swarm Optimization Algorithm"],"prefix":"10.1007","author":[{"given":"Alejandro","family":"Le\u00f3n-Javier","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nareli","family":"Cruz-Cort\u00e9s","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marco A.","family":"Moreno-Armend\u00e1riz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sandra","family":"Orantes-Jim\u00e9nez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"60_CR1","first-page":"21","volume":"6","author":"F. Bergeron","year":"1994","unstructured":"Bergeron, F., Berstel, J., Brlek, S.: Efficient computation of addition chains. Journal de thorie des nombres de Bordeaux\u00a06, 21\u201338 (1994)","journal-title":"Journal de thorie des nombres de Bordeaux"},{"issue":"1","key":"60_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TEVC.2007.906082","volume":"12","author":"N. Cruz-Cort\u00e9s","year":"2008","unstructured":"Cruz-Cort\u00e9s, N., Rodr\u00edguez-Henr\u00edquez, F., Coello, C.A.C.: An Artificial Immune System Heuristic for Generating Short Addition Chains. IEEE Transactions on Evolutionary Computation\u00a012(1), 1\u201324 (2008)","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"60_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/978-3-540-30498-2_75","volume-title":"Advances in Artificial Intelligence \u2013 IBERAMIA 2004","author":"N. Cruz-Cort\u00e9s","year":"2004","unstructured":"Cruz-Cort\u00e9s, N., Rodr\u00edguez-Henr\u00edquez, F., Coello Coello, C.A.: On the optimal computation of finite field exponentiation. In: Lema\u00eetre, C., Reyes, C.A., Gonz\u00e1lez, J.A. (eds.) IBERAMIA 2004. LNCS (LNAI), vol.\u00a03315, pp. 747\u2013756. Springer, Heidelberg (2004)"},{"key":"60_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/11596448_30","volume-title":"Computational Intelligence and Security","author":"N. Cruz-Cort\u00e9s","year":"2005","unstructured":"Cruz-Cort\u00e9s, N., Rodr\u00edguez-Henr\u00edquez, F., Ju\u00e1rez-Morales, R., Coello Coello, C.A.: Finding Optimal Addition Chains Using a Genetic Algorithm Approach. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03801, pp. 208\u2013215. Springer, Heidelberg (2005)"},{"issue":"1","key":"60_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D.M. Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"60_CR6","unstructured":"IEEE P1363: Standard specifications for public-key cryptography, Draft Version D18. IEEE standards documents, \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/\n                    \n                    \n                   (November 2004)"},{"issue":"2","key":"60_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.amc.2007.03.010","volume":"192","author":"B. Jarbouia","year":"2007","unstructured":"Jarbouia, B., Cheikha, M., Siarryb, P., Rebaic, A.: Combinatorial particle swarm optimization (cpso) for partitional clustering problem. Applied Mathematics and Computation\u00a0192(2), 337\u2013345 (2007)","journal-title":"Applied Mathematics and Computation"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings IEEE International Conference on Neural Networks, pp. 1942\u20131948 (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"60_CR9","volume-title":"Art of Computer Programming, Seminumerical Algorithms","author":"D.E. Knuth","year":"1997","unstructured":"Knuth, D.E.: Art of Computer Programming, Seminumerical Algorithms, vol.\u00a02. Addison-Wesley Professional, Reading (1997)"},{"key":"60_CR10","unstructured":"Ko\u00e7, \u00c7.K.: High-Speed RSA Implementation. Technical Report TR 201, 71 pages, RSA Laboratories, Redwood City, CA (1994)"},{"issue":"10","key":"60_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0898-1221(95)00153-P","volume":"30","author":"\u00c7.K.. Ko\u00e7","year":"1995","unstructured":"Ko\u00e7, \u00c7.K.: Analysis of sliding window techniques for exponentiation. Computer and Mathematics with Applications\u00a030(10), 17\u201324 (1995)","journal-title":"Computer and Mathematics with Applications"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Koduru, P., Das, S., Welch, S.M.: Multi-objective hybrid pso using -fuzzy dominance. In: Proceedings of the 9th annual conference on Genetic And Evolutionary Computation Conference, pp. 853\u2013860 (2007)","DOI":"10.1145\/1276958.1277125"},{"issue":"1","key":"60_CR13","first-page":"60","volume":"E83-A","author":"N. Kunihiro","year":"2000","unstructured":"Kunihiro, N., Yamamoto, H.: New methods for generating short addition chains. IEICE Trans. Fundamentals\u00a0E83-A(1), 60\u201367 (2000)","journal-title":"IEICE Trans. Fundamentals"},{"key":"60_CR14","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"1","key":"60_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11721-007-0002-0","volume":"1","author":"R. Poli","year":"2007","unstructured":"Poli, R., Kennedy, J., Blackwell, T.: Particle swarm optimization, an overview. Swarm Intelligence\u00a01(1), 33\u201357 (2007)","journal-title":"Swarm Intelligence"},{"key":"60_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-540-31880-4_35","volume-title":"Evolutionary Multi-Criterion Optimization","author":"M.R. Sierra","year":"2005","unstructured":"Sierra, M.R., Coello Coello, C.A.: Improving pso-based multi-objective optimization using crowding, mutation and epsilon-dominance. In: Coello Coello, C.A., Hern\u00e1ndez Aguirre, A., Zitzler, E. (eds.) EMO 2005. LNCS, vol.\u00a03410, pp. 505\u2013519. Springer, Heidelberg (2005)"},{"issue":"5","key":"60_CR17","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/12.926155","volume":"50","author":"N. Takagi","year":"2001","unstructured":"Takagi, N., Yoshiki, J., Tagaki, K.: A fast algorithm for multiplicative inversion in GF(2\n                    m\n                  ) using normal basis. IEEE Transactions on Computers\u00a050(5), 394\u2013398 (2001)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","MICAI 2009: Advances in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05258-3_60.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:25:31Z","timestamp":1619781931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05258-3_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642052576","9783642052583"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05258-3_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}