{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:39:24Z","timestamp":1725561564938},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147111"},{"type":"electronic","value":"9783642147128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14712-8_4","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T09:17:50Z","timestamp":1280395070000},"page":"61-80","source":"Crossref","is-referenced-by-count":7,"title":["Starfish on Strike"],"prefix":"10.1007","author":[{"given":"Daniel J.","family":"Bernstein","sequence":"first","affiliation":[]},{"given":"Peter","family":"Birkner","sequence":"additional","affiliation":[]},{"given":"Tanja","family":"Lange","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1090\/S0025-5718-1993-1140645-1","volume":"60","author":"A.O.L. Atkin","year":"1993","unstructured":"Atkin, A.O.L., Morain, F.: Finding suitable curves for the elliptic curve method of factorization. Mathematics of Computation\u00a060, 399\u2013405 (1993) ISSN 0025\u20135718. MR 93k:11115, http:\/\/www.lix.polytechnique.fr\/~morain\/Articles\/articles.english.html Citations in this document: \u00a76","journal-title":"Mathematics of Computation"},{"key":"4_CR2","unstructured":"B\u0103rbulesc, R.: Familles de courbes adapt\u00e9es \u00e0 la factorisation des entiers (2009), http:\/\/hal.inria.fr\/inria-00419218\/PDF\/Familles_version2.pdf Citations in this document: \u00a71.3, \u00a75.3"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"AFRICACRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008 [16]. LNCS, vol.\u00a05023, pp. 389\u2013405. Springer, Heidelberg (2008), http:\/\/eprint.iacr.org\/2008\/013 Citations in this document: \u00a71.1"},{"key":"4_CR4","unstructured":"Bernstein, D.J., Birkner, P., Lange, T., Peters, C.: ECM using Edwards curves (24 January 2010 version) (2010), http:\/\/eprint.iacr.org\/2008\/016 Citations in this document: \u00a71.1, \u00a71.1, \u00a71.1, \u00a71.1, \u00a71.1, \u00a71.2, \u00a72, \u00a73.4, \u00a73.4, \u00a73.4, \u00a75.3, \u00a75.3, \u00a75.3, \u00a75.5, \u00a76, \u00a76, \u00a76, \u00a76, \u00a76, \u00a77, \u00a77, \u00a77"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster addition and doubling on elliptic curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007 [10]. LNCS, vol.\u00a04833, pp. 29\u201350. Springer, Heidelberg (2007), http:\/\/cr.yp.to\/papers.html#newelliptic Citations in this document: \u00a71.1"},{"key":"4_CR6","unstructured":"Bernstein, D.J., Lange, T.: A complete set of addition laws for incomplete Edwards curves (2009), http:\/\/eprint.iacr.org\/2009\/580 Citations in this document: \u00a72"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H.M. Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bulletin of the American Mathematical Society\u00a044, 393\u2013422 (2007), http:\/\/www.ams.org\/bull\/2007-44-03\/S0273-0979-07-01153-6\/home.html Citations in this document: \u00a71.1","journal-title":"Bulletin of the American Mathematical Society"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Algorithmic Number Theory","year":"2006","unstructured":"Hess, F., Pauli, S., Pohst, M. (eds.): ANTS 2006. LNCS, vol.\u00a04076. Springer, Heidelberg (2006) ISBN 3-540-36075-1. See [17]"},{"key":"4_CR9","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Asiacrypt 2008 [14] (2008), http:\/\/eprint.iacr.org\/2008\/522 Citations in this document: \u00a71.1, \u00a71.1"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","year":"2007","unstructured":"Kurosawa, K. (ed.): ASIACRYPT 2007. LNCS, vol.\u00a04833. Springer, Heidelberg (2007), See [5]"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"H.W. Lenstra Jr.","year":"1987","unstructured":"Lenstra Jr., H.W.: Factoring integers with elliptic curves. Annals of Mathematics\u00a0126, 649\u2013673 (1987) ISSN 0003\u2013486X. MR 89g:11125, http:\/\/links.jstor.org\/sici?sici=0003-486X(198711)2:126:3<649:FIWEC>2.0.CO;2-V Citations in this document: \u00a71","journal-title":"Annals of Mathematics"},{"key":"4_CR12","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048, 243\u2013264 (1987) ISSN 0025\u20135718. MR 88e:11130, http:\/\/links.jstor.org\/sici?sici=0025-5718(198701)48:177<243:STPAEC>2.0.CO;2-3 Citations in this document: \u00a71.2, \u00a76. See [15]","journal-title":"Mathematics of Computation"},{"key":"4_CR13","unstructured":"Montgomery, P.L.: An FFT extension of the elliptic curve method of factorization, Ph.D. thesis, University of California at Los Angeles (1992), ftp:\/\/ftp.cwi.nl\/pub\/pmontgom\/ucladissertation.psl.gz Citations in this document: \u00a71.2, \u00a71.3, \u00a77.1"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - ASIACRYPT 2008","year":"2008","unstructured":"Pieprzyk, J. (ed.): ASIACRYPT 2008. LNCS, vol.\u00a05350. Springer, Heidelberg (2008) ISBN 978-3-540-89254-0. See [9]"},{"key":"4_CR15","unstructured":"Suyama, H.: Informal preliminary report (8), cited in [12] (1985), Citations in this document: \u00a75.3"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","year":"2008","unstructured":"Vaudenay, S. (ed.): AFRICACRYPT 2008. LNCS, vol.\u00a05023. Springer, Heidelberg (2008) ISBN 978-3-540-68159-5. See [3]"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Zimmermann, P., Dodson, B.: 20 Years of ECM. In: ANTS 2006 [8], pp. 525\u2013542 (2006) Citations in this document: \u00a71.1, \u00a71.2, \u00a71.3","DOI":"10.1007\/11792086_37"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14712-8_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:41Z","timestamp":1606186601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14712-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147111","9783642147128"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14712-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}