{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:09:58Z","timestamp":1725570598428},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176180"},{"type":"electronic","value":"9783642176197"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17619-7_14","type":"book-chapter","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:45:07Z","timestamp":1291117507000},"page":"184-198","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations"],"prefix":"10.1007","author":[{"given":"Roghaie","family":"Mahdavi","sequence":"first","affiliation":[]},{"given":"Abolghasem","family":"Saiadian","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miler","year":"1986","unstructured":"Miler, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"key":"14_CR3","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"Morain, F., Olivos, J.: Speed up the computations on an elliptic curve using addition-subtraction. chains. RAIRO Theoretical Informatics and Applications\u00a024, 531\u2013543 (1990)","journal-title":"RAIRO Theoretical Informatics and Applications"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-540-28628-8_8","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"K. Okeya","year":"2004","unstructured":"Okeya, K.: Signed binary representations revisited. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 123\u2013139. Springer, Heidelberg (2004)"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TC.2006.3","volume":"55","author":"K. Schmidt-Samoa","year":"2006","unstructured":"Schmidt-Samoa, K., Semay, O., Takagi, T.: Analysis of Fractional Window Recoding Methods and Their Application to Elliptic curve cryptosystems. IEEE Transactions on Computers\u00a055, 48\u201357 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"14_CR7","unstructured":"IEEE Standard 1363-2000, IEEE Standard Specifications for Public Key Cryptography. IEEE Computer Society, Los Alamitos (August 29, 2000)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/BFb0052247","volume-title":"CRYPTO \u201997","author":"J. Guajardo","year":"1997","unstructured":"Guajardo, J., Paar, C.: Efficient algorithms for elliptic curve cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 342\u2013356. Springer, Heidelberg (1997)"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.amc.2007.01.015","volume":"190","author":"P. Balasubramaniam","year":"2007","unstructured":"Balasubramaniam, P., Karthikeyan, E.: Elliptic curve scalar multiplication algorithm using complementary recoding. Applied Mathematics and Computation\u00a0190, 51\u201356 (2007)","journal-title":"Applied Mathematics and Computation"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JPROC.2005.862438","volume":"94","author":"A. Cilardo","year":"2006","unstructured":"Cilardo, A., Coppolino, L., Mazzocca, N., Romano, L.: Elliptic Curve Cryptography Engineering. Proceeding of the IEEE\u00a094, 395\u2013406 (2006)","journal-title":"Proceeding of the IEEE"},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K. Lauter","year":"2004","unstructured":"Lauter, K.: The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Commun.\u00a011(1), 62\u201367 (2004)","journal-title":"IEEE Wireless Commun."},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/12.863044","volume":"49","author":"K. Joye","year":"2000","unstructured":"Joye, K., Yen, S.: Optimal left-to-right binary signed digit recoding. IEEE Transactions on Computers\u00a049, 740\u2013748 (2000)","journal-title":"IEEE Transactions on Computers"},{"key":"14_CR14","unstructured":"Li, Z., Higgins, J., Clement, M.: Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. IEEE, New York (2001); 0-7695-1315-8\/01"},{"issue":"1","key":"14_CR15","first-page":"54","volume":"J88","author":"D. Adachi","year":"2005","unstructured":"Adachi, D., Gamou, M., Hirata, T.: Efficient scalar multiplication on elliptic curve using direct computations. IEICE Trans. Fundamentals\u00a0J88(1), 54\u201361 (2005) (in Japanese)","journal-title":"IEICE Trans. Fundamentals"},{"key":"14_CR16","unstructured":"http:\/\/www.hyperelliptic.org\/EFD"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17619-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T14:07:36Z","timestamp":1553263656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17619-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176180","9783642176197"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17619-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}