{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:21:28Z","timestamp":1755800488733},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219689"},{"type":"electronic","value":"9783642219696"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_12","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T15:41:28Z","timestamp":1309275688000},"page":"188-205","source":"Crossref","is-referenced-by-count":8,"title":["Efficient Multiplication in Finite Field Extensions of Degree 5"],"prefix":"10.1007","author":[{"given":"Nadia","family":"El Mrabet","sequence":"first","affiliation":[]},{"given":"Aurore","family":"Guillevic","sequence":"additional","affiliation":[]},{"given":"Sorina","family":"Ionica","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Recommendations for Key Management, Special Publication 800-57 Part 1 (2007)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Stochastic Algorithms: Foundations and Applications","author":"R. Avanzi","year":"2007","unstructured":"Avanzi, R., Cesena, E.: Trace Zero Varieties over Fields of Characteristic 2 for Cryptographic Applications. In: Hromkovi\u010d, J., Kr\u00e1lovi\u010d, R., Nunkesser, M., Widmayer, P. (eds.) SAGA 2007. LNCS, vol.\u00a04665, Springer, Heidelberg (2007)"},{"issue":"9","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TC.2006.136","volume":"55","author":"J.C. Bajard","year":"2006","unstructured":"Bajard, J.C., Imbert, L., Negre, C.: Arithmetic operations in finite fields of medium prime characteristic using the Lagrange representation. IEEE Transactions on Computers\u00a055(9), 1167\u20131177 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-73074-3_10","volume-title":"Arithmetic of Finite Fields","author":"M. Bodrato","year":"2007","unstructured":"Bodrato, M.: Towards Optimal Toom-Cook Multiplication for Univariate and Multivariate Polynomials in Characteristic 2 and 0. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 116\u2013133. Springer, Heidelberg (2007)"},{"key":"12_CR5","unstructured":"Devegili, A.J., \u00d3 h\u00c9igeartaigh, C., Scott, M., Dahab, R.: Multiplication and squaring on pairing-friendly fields. Cryptology ePrint Archive, Report 2006\/471 (2006), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/11426639_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"M. Dijk van","year":"2005","unstructured":"van Dijk, M., Granger, R., Page, D., Rubin, K., Silverberg, A., Stam, M., Woodruff, D.: Practical cryptography in high dimensional tori. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 234\u2013250. Springer, Heidelberg (2005)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/11792086_32","volume-title":"Algorithmic Number Theory","author":"D. Freeman","year":"2006","unstructured":"Freeman, D.: Constructing pairing-friendly elliptic curves with embedding degree 10. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol.\u00a04076, pp. 452\u2013465. Springer, Heidelberg (2006)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00145-009-9048-z","volume":"23","author":"D. Freeman","year":"2010","unstructured":"Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. Journal of Cryptology\u00a023, 224\u2013280 (2010)","journal-title":"Journal of Cryptology"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Granger, R., Page, D., Smart, N.: On small characteristic algebraic tori in pairing based cryptography. LMS Journal of Computation and Mathematics\u00a0(9), 64\u201385 (2006)","DOI":"10.1112\/S1461157000001194"},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A Fast Algorithm for Computing Multiplicative Inverses in GF(2\n                    m\n                  ) Using Normal Bases. Info. and Comp.\u00a078(3), 171\u2013177 (1988)","journal-title":"Info. and Comp."},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/11586821_2","volume-title":"Cryptography and Coding","author":"N. Koblitz","year":"2005","unstructured":"Koblitz, N., Menezes, A.: Pairing-based cryptography at high security levels. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol.\u00a03796, pp. 13\u201336. Springer, Heidelberg (2005)"},{"key":"12_CR12","volume-title":"Finite Fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite Fields, 2nd edn. Cambridge University Press, Cambridge (1997)","edition":"2"},{"key":"12_CR13","volume-title":"Handbook of Applied Cryptology","author":"A. Menezes","year":"2001","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptology. CRC Press, Boca Raton (2001)"},{"issue":"3","key":"12_CR14","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2005.49","volume":"54","author":"P.L. Montgomery","year":"2005","unstructured":"Montgomery, P.L.: Five, six, and seven-term Karatsuba-like formulae. IEEE Transactions on Computers\u00a054(3), 362\u2013369 (2005)","journal-title":"IEEE Transactions on Computers"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-68164-9_25","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"M. Naehrig","year":"2008","unstructured":"Naehrig, M., Barreto, P., Schwabe, P.: On compressible pairings and their computation. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 371\u2013388. Springer, Heidelberg (2008)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-540-45146-4_21","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"K. Rubin","year":"2003","unstructured":"Rubin, K., Silverberg, A.: Torus-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 349\u2013365. Springer, Heidelberg (2003)"},{"key":"12_CR17","unstructured":"Thales Communications. LibCryptoLCH Librairie cryptographique du Laboratoire Chiffre (2011)"},{"key":"12_CR18","volume-title":"Modern Computer Algebra","author":"J. ZurGathen Von","year":"2003","unstructured":"Von ZurGathen, J., Gerhard, J.: Modern Computer Algebra. Cambridge University Press, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T11:42:56Z","timestamp":1553859776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}