{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:24Z","timestamp":1725541584125},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_34","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"273-280","source":"Crossref","is-referenced-by-count":0,"title":["A Simple Encryption Scheme for Binary Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Brian","family":"King","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Blake, I.F., Smart, N., Seroussi, G.: Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge (1999) (2001)","DOI":"10.1017\/CBO9781107360211"},{"issue":"1","key":"34_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00145-001-0011-x","volume":"15","author":"P. Gaudry","year":"2002","unstructured":"Gaudry, P., Hess, F., Smart, N.: Constructive and Destructive Facets of Weil Descent on Elliptic Curves. Journal of Cryptology\u00a015(1), 19\u201346 (2002)","journal-title":"Journal of Cryptology"},{"key":"34_CR3","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997)","edition":"2"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/3-540-48892-8_16","volume-title":"Selected Areas in Cryptography","author":"J. Lopez","year":"1999","unstructured":"Lopez, J., Dahab, R.: Improved Algorithms for Elliptic Curve Arithmetic in GF(2\n                  n\n                )\u201d. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 201\u2013212. Springer, Heidelberg (1999)"},{"key":"34_CR5","volume-title":"Modern Cryptography Theory and Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography Theory and Practice. Prentice Hall, New York (2004)"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"34_CR7","unstructured":"NIST, Recommended elliptic curves for federal use, \n                  \n                    http:\/\/www.nist.gov"},{"key":"34_CR8","unstructured":"Seroussi, G.: Compact Representation of Elliptic Curve Points over F2\n                \n                  n\n                , HP Labs Technical Reports, pp. 1\u20136, \n                  \n                    http:\/\/www.hpl.hp.com\/techreports\/98\/HPL-98-94R1.html"},{"key":"34_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-1920-8","volume-title":"The Arithmetic of Elliptic Curves","author":"J. Silverman","year":"1986","unstructured":"Silverman, J.: The Arithmetic of Elliptic Curves. Springer, New York (1986)"},{"key":"34_CR10","volume-title":"Introduction to Cryptography with Coding Theory","author":"W. Trappe","year":"2006","unstructured":"Trappe, W., Washington, L.C.: Introduction to Cryptography with Coding Theory, 2nd edn. Prentice Hall, Englewood Cliffs (2006)","edition":"2"},{"key":"34_CR11","unstructured":"Institute for Electrical and Electronics Engineers (IEEE) Standard 1363-2000, Standard Specifications for Public Key Cryptography (January 2000)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:38:37Z","timestamp":1558388317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}