{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:12:45Z","timestamp":1725541965799},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108679"},{"type":"electronic","value":"9783642108686"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10868-6_20","type":"book-chapter","created":{"date-parts":[[2009,12,2]],"date-time":"2009-12-02T05:17:15Z","timestamp":1259731035000},"page":"336-350","source":"Crossref","is-referenced-by-count":1,"title":["Double-Exponentiation in Factor-4 Groups and Its Applications"],"prefix":"10.1007","author":[{"given":"Koray","family":"Karabina","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/978-3-540-48000-6_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"A. Brouwer","year":"1999","unstructured":"Brouwer, A., Pellikaan, R., Verheul, E.: Doing more with fewer bits. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 321\u2013332. Springer, Heidelberg (1999)"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"Coppersmith, D.: Fast evaluation of logarithms in fields of characteristic two. IEEE Transactions on Information Theory\u00a030, 587\u2013594 (1984)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013665 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/11426639_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"M. Dijk","year":"2005","unstructured":"Dijk, M., Granger, R., Page, D., Rubin, K., Silverberg, A., Stam, M., Woodruff, D.: Practical cryptography in high dimensional tori. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 234\u2013250. Springer, Heidelberg (2005)"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-540-28628-8_10","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"M. Dijk Van","year":"2004","unstructured":"Van Dijk, M., Woodruff, D.: Asymptotically optimal communication for torus-based cryptography. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 157\u2013178. Springer, Heidelberg (2004)"},{"key":"20_CR6","unstructured":"FIPS\u00a0186-3, Digital signature standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/11423461_22","volume-title":"Sequences and Their Applications - SETA 2004","author":"K. Giuliani","year":"2005","unstructured":"Giuliani, K., Gong, G.: New LFSR-based cryptosystems and the trace discrete log problem (Trace-DLP). In: Helleseth, T., Sarwate, D., Song, H.-Y., Yang, K. (eds.) SETA 2004. LNCS, vol.\u00a03486, pp. 298\u2013312. Springer, Heidelberg (2005)"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1109\/18.796413","volume":"45","author":"G. Gong","year":"1999","unstructured":"Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Transactions on Information Theory\u00a045, 2601\u20132605 (1999)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. Gordon","year":"1993","unstructured":"Gordon, D.: Discrete logarithms in GF(p) using the number field sieve. SIAM Journal on Discrete Mathematics\u00a06, 124\u2013138 (1993)","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"20_CR10","volume-title":"Guide to elliptic curve cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Karabina, K.: Factor-4 and 6 compression of cyclotomic subgroups of $\\mathbb{F}_{2^{4m}}^*$ and $\\mathbb{F}_{3^{6m}}^*$ . Journal of Mathematical Cryptology (to appear), http:\/\/eprint.iacr.org\/2009\/304","DOI":"10.1515\/jmc.2010.001"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45682-1_5","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"A. Lenstra","year":"2001","unstructured":"Lenstra, A.: Unbelievable security matching AES security using public key systems. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 67\u201386. Springer, Heidelberg (2001)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A. Lenstra","year":"2000","unstructured":"Lenstra, A., Verheul, E.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"key":"20_CR14","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, New York (1997)"},{"key":"#cr-split#-20_CR15.1","unstructured":"Montgomery, P.: Evaluating recurrences of form X m\u2009+\u2009n \u2009=\u2009f(X m, X n, X m\u2009\u2212\u2009nvia Lucas chains, December 13 (1983);"},{"key":"#cr-split#-20_CR15.2","unstructured":"Revised (March 1991) and (January 1992), www.cwi.nl\/ftp\/pmontgom\/Lucas.ps.gz"},{"key":"20_CR16","first-page":"61","volume":"7","author":"K. Nyberg","year":"1996","unstructured":"Nyberg, K., Rueppel, A.: Message recovery for signature schemes based on the discrete logarithm problem. Designs, Codes and Cryptography\u00a07, 61\u201381 (1996)","journal-title":"Designs, Codes and Cryptography"},{"key":"20_CR17","doi-asserted-by":"publisher","first-page":"918","DOI":"10.2307\/2006496","volume":"32","author":"J. Pollard","year":"1978","unstructured":"Pollard, J.: Monte Carlo methods for index computation mod p. Mathematics of Computation\u00a032, 918\u2013924 (1978)","journal-title":"Mathematics of Computation"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1137\/060676155","volume":"37","author":"K. Rubin","year":"2008","unstructured":"Rubin, K., Silverberg, A.: Compression in finite fields and torus-based cryptography. SIAM Journal on Computing\u00a037, 1401\u20131428 (2008)","journal-title":"SIAM Journal on Computing"},{"key":"20_CR19","unstructured":"Scott, M.: Authenticated ID-based key exchange and remote log-in with simple token and PIN number, Cryptology ePrint Archive, Report 2002\/164 (2002), http:\/\/eprint.iacr.org\/2002\/164"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"2843","DOI":"10.1093\/ietfec\/e91-a.10.2843","volume":"91","author":"M. Shirase","year":"2008","unstructured":"Shirase, M., Han, D., Hibin, Y., Kim, H., Takagi, T.: A more compact representation of XTR cryptosystem. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E91-A, 2843\u20132850 (2008)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BFb0000447","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"P. Smith","year":"1995","unstructured":"Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 357\u2013364. Springer, Heidelberg (1995)"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-45682-1_8","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"M. Stam","year":"2001","unstructured":"Stam, M., Lenstra, A.: Speeding up XTR. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 125\u2013143. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Cryptography and Coding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10868-6_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:36:07Z","timestamp":1606185367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10868-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108679","9783642108686"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10868-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}