{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:31:41Z","timestamp":1725568301589},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168246"},{"type":"electronic","value":"9783642168253"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16825-3_22","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:30:44Z","timestamp":1288690244000},"page":"326-336","source":"Crossref","is-referenced-by-count":6,"title":["Efficient Implementation of Pairing on BREW Mobile Phones"],"prefix":"10.1007","author":[{"given":"Tadashi","family":"Iyama","sequence":"first","affiliation":[]},{"given":"Shinsaku","family":"Kiyomoto","sequence":"additional","affiliation":[]},{"given":"Kazuhide","family":"Fukushima","sequence":"additional","affiliation":[]},{"given":"Toshiaki","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Tsuyoshi","family":"Takagi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management - Part 1: General. NIST Special Pablication 800-57 part 1 (2005)","DOI":"10.6028\/NIST.SP.800-57p1"},{"issue":"3","key":"22_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10623-006-9033-6","volume":"42","author":"P. Barreto","year":"2007","unstructured":"Barreto, P., Galbraith, S., \u00d3\u2019h\u00c9igeartaigh, C., Scott, M.: Efficient Pairing Computation on Supersingular Abelian Varieties. Designs, Codes and Cryptography\u00a042(3), 239\u2013271 (2007)","journal-title":"Designs, Codes and Cryptography"},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/11693383_22","volume-title":"SAC 2005","author":"P. Barreto","year":"2006","unstructured":"Barreto, P., Naehrig, M.: Pairing-Friendly Elliptic Curves of Prime Order. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 319\u2013331. Springer, Heidelberg (2006)"},{"key":"22_CR4","unstructured":"Devegili, A., \u00d3\u2019h\u00c9igeartaigh, C., Scott, M., Dahab, R.: Multiplication and Squaring on Pairing-Friendly Fields. Cryptography ePrint Archive, Report 2006\/471 (2006)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-3-540-73489-5_10","volume-title":"Pairing 2007","author":"A. Devegili","year":"2007","unstructured":"Devegili, A., Scott, M., Dahab, R.: Implementing Cryptographic Pairings over Barreto-Naehrig Curves. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol.\u00a04575, pp. 197\u2013207. Springer, Heidelberg (2007)"},{"key":"22_CR6","first-page":"188","volume-title":"Identity-Based Cryptography","author":"D. Hankerson","year":"2009","unstructured":"Hankerson, D., Menezes, A., Scott, M.: Software Implementation of Pairings. In: Identity-Based Cryptography, pp. 188\u2013206. IOS Press, Amsterdam (2009)"},{"issue":"10","key":"22_CR7","doi-asserted-by":"publisher","first-page":"4595","DOI":"10.1109\/TIT.2006.881709","volume":"52","author":"F. Hess","year":"2006","unstructured":"Hess, F., Smart, N., Vercauteren, F.: The Eta Pairing Revisited. IEEE Transactions on Information Theory\u00a052(10), 4595\u20134602 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"22_CR8","first-page":"3743","volume":"49","author":"T. Ishiguro","year":"2008","unstructured":"Ishiguro, T., Shirase, M., Takagi, S.T.: Efficient Implementation of the Pairing on ATmega128L. IPSJ Journal\u00a049(11), 3743\u20133753 (2008)","journal-title":"IPSJ Journal"},{"issue":"1","key":"22_CR9","first-page":"427","volume":"49","author":"Y. Kawahara","year":"2008","unstructured":"Kawahara, Y., Takagi, S.T., Okamoto, E.: Efficient Implementation of Tate Pairing on Mobile Phones using Java. IPSJ Journal\u00a049(1), 427\u2013435 (2008)","journal-title":"IPSJ Journal"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/11586821_2","volume-title":"Cryptography and Coding 2005","author":"N. Koblitz","year":"2005","unstructured":"Koblitz, N., Menezes, A.: Pairing-Based Cryptography at High Security Levels. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 13\u201336. Springer, Heidelberg (2005)"},{"issue":"4","key":"22_CR11","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1109\/TIT.2009.2013048","volume":"55","author":"E. Lee","year":"2009","unstructured":"Lee, E., Lee, H.-S., Park, C.-M.: Efficient and Generalized Pairing Computation on Abelian Varieties. IEEE Transactions on Information Theory\u00a055(4), 1793\u20131803 (2009)","journal-title":"IEEE Transactions on Information Theory"},{"key":"22_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"22_CR13","unstructured":"Miyazaki, Y., Shirase, M., Takagi, S.T.: Elliptic Curve\/Pairing-based Cryptographies on MICAz With Some Security Levels. In: WISA 2009, Short Presentation Track, pp. 183\u2013195 (2009)"},{"key":"22_CR14","unstructured":"Oliveira, L., Scott, M., Lopez, J., Dahab, R.: TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. In: INSS 2008, pp. 173\u2013180 (17-19, 2008)"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/978-3-642-03298-1_6","volume-title":"Pairing 2009","author":"M. Scott","year":"2009","unstructured":"Scott, M., Benger, N., Charlemagne, M.: On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic Curves. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol.\u00a05671, pp. 78\u201388. Springer, Heidelberg (2009)"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","first-page":"159","volume-title":"CHES 2002","author":"M. Scott","year":"2003","unstructured":"Scott, M., Costigan, N., Abdulwahab, W.: Implementing Cryptographic Pairings on Smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a02523, pp. 159\u2013174. Springer, Heidelberg (2003)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Information Security Applications","author":"M. Shirase","year":"2008","unstructured":"Shirase, M., Kawahara, Y., Takagi, S.T., Okamoto, E.: Universal \u03b7 t Pairing Algorithm over Arbitrary Extension Degree. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"22_CR18","unstructured":"Standards for Efficient Cryptography Group (SECG), SEC 2: Recommended Elliptic Curve Domain Parameter, Ver. 2.0 (2010), http:\/\/www.secg.org\/"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","first-page":"134","volume-title":"EWSN 2008","author":"P. Szczechowiak","year":"2006","unstructured":"Szczechowiak, P., Oliveira, L., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04249, pp. 134\u2013147. Springer, Heidelberg (2006)"},{"issue":"5","key":"22_CR20","first-page":"1330","volume":"E91-D","author":"M. Yoshitomi","year":"2008","unstructured":"Yoshitomi, M., Takagi, S.T., Kiyomoto, S., Tanaka, T.: Efficient Implementation of the Pairing on Mobilephones using BREW. IEICE Transaction\u00a0E91-D(5), 1330\u20131337 (2008)","journal-title":"IEICE Transaction"},{"key":"22_CR21","unstructured":"Yoshitomi, M., Kiyomoto, S., Fukushima, K., Tanaka, T., Takagi, S.T.: Implementation of the Pairings on the Ordinary Elliptic Curves using BREW Mobilephones. In: Symposium on Cryptography and Information Security, SCIS 2009, 3C2-2 (2009)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16825-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T20:59:52Z","timestamp":1559768392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16825-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168246","9783642168253"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16825-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}