{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T23:40:32Z","timestamp":1740354032973,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642150302"},{"type":"electronic","value":"9783642150319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15031-9_6","type":"book-chapter","created":{"date-parts":[[2010,8,7]],"date-time":"2010-08-07T15:34:35Z","timestamp":1281195275000},"page":"80-94","source":"Crossref","is-referenced-by-count":28,"title":["Efficient Techniques for High-Speed Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Longa","sequence":"first","affiliation":[]},{"given":"Catherine","family":"Gebotys","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-30564-4_9","volume-title":"Selected Areas in Cryptography","author":"R. Avanzi","year":"2004","unstructured":"Avanzi, R.: A Note on the Signed Sliding Window Integer Recoding and its Left-to-Right Analogue. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 130\u2013143. Springer, Heidelberg (2004)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"D. Bernstein","year":"2008","unstructured":"Bernstein, D., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards Curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 389\u2013405. Springer, Heidelberg (2008)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H. Edwards","year":"2007","unstructured":"Edwards, H.: A Normal Form for Elliptic Curves. Bulletin of the American Mathematical Society\u00a044, 393\u2013422 (2007)","journal-title":"Bulletin of the American Mathematical Society"},{"key":"6_CR4","volume-title":"Cryptographic Engineering, ch. 5","author":"S.S. Erdem","year":"2009","unstructured":"Erdem, S.S., Yanik, T., Ko\u00e7, \u00c7.K.: Fast Finite Field Multiplication. In: Ko\u00e7, \u00c7.K. (ed.) Cryptographic Engineering, ch. 5. Springer, Heidelberg (2009)"},{"key":"6_CR5","unstructured":"Fog, A.: Instruction Tables: Lists of Instruction Latencies, Throughputs and Micro-operation Breakdowns for Intel, AMD and VIA CPUs (2009), http:\/\/www.agner.org\/optimize\/#manuals (accessed, January 2010)"},{"key":"6_CR6","unstructured":"Fog, A.: The Microarchitecture of Intel, AMD and VIA CPUs (2009), http:\/\/www.agner.org\/optimize\/#manuals (accessed, January 2010)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Galbraith, S., Lin, X., Scott, M.: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. Cryptology ePrint Archive, Report 2008\/194 (2008)","DOI":"10.1007\/978-3-642-01001-9_30"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-642-01001-9_30","volume-title":"EUROCRYPT 2009","author":"S. Galbraith","year":"2010","unstructured":"Galbraith, S., Lin, X., Scott, M.: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 518\u2013535. Springer, Heidelberg (2010)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R. Gallant","year":"2001","unstructured":"Gallant, R., Lambert, R., Vanstone, S.: Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"key":"6_CR10","unstructured":"Gaudry, P., Thom\u00e9, E.: The mpFq Library and Implementing Curve-Based Key Exchanges. In: SPEED 2007, pp. 49\u201364 (2007)"},{"key":"6_CR11","volume-title":"Identity-Based Cryptography, ch. 12","author":"D. Hankerson","year":"2009","unstructured":"Hankerson, D., Menezes, A., Scott, M.: Software Implementation of Pairings. In: Joye, M., Neven, G. (eds.) Identity-Based Cryptography, ch. 12. IOS Press, Amsterdam (2009)"},{"key":"6_CR12","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Hisil","year":"2008","unstructured":"Hisil, H., Wong, K., Carter, G., Dawson, E.: Twisted Edwards Curves Revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 326\u2013343. Springer, Heidelberg (2008)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Hisil, H., Wong, K., Carter, G., Dawson, E.: Jacobi Quartic Curves Revisited. Cryptology ePrint Archive, Report 2009\/312 (2009)","DOI":"10.1007\/978-3-642-02620-1_31"},{"key":"6_CR15","unstructured":"Longa, P.: Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields. Master\u2019s Thesis, University of Ottawa (2007), http:\/\/patricklonga.bravehost.com\/publications.html#thesis"},{"key":"6_CR16","unstructured":"Longa, P.: ECC Point Arithmetic Formulae, EPAF (2008), http:\/\/patricklonga.bravehost.com\/jacobian.html"},{"key":"6_CR17","unstructured":"Longa, P., Gebotys, C.: Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication. CACR technical report, CACR 2008-06 (2008)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Longa, P., Gebotys, C.: Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors (2010), http:\/\/patricklonga.bravehost.com\/publications.html","DOI":"10.1007\/978-3-642-15031-9_6"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-78440-1_14","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"P. Longa","year":"2008","unstructured":"Longa, P., Miri, A.: New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 229\u2013247. Springer, Heidelberg (2008)"},{"key":"6_CR20","unstructured":"Scott, M.: MIRACL - Multiprecision Integer and Rational Arithmetic C\/C++ Library (1988-2007), ftp:\/\/ftp.computing.dcu.ie\/pub\/crypto\/miracl.zip"},{"issue":"2","key":"6_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/ip-cdt:20020235","volume":"149","author":"T. Yanik","year":"2002","unstructured":"Yanik, T., Sava\u015f, E., Ko\u00e7, \u00c7.K.: Incomplete Reduction in Modular Arithmetic. IEE Proc. of Computers and Digital Techniques\u00a0149(2), 46\u201352 (2002)","journal-title":"IEE Proc. of Computers and Digital Techniques"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems, CHES 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15031-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T23:09:13Z","timestamp":1740352153000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15031-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642150302","9783642150319"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15031-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}