{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T06:32:13Z","timestamp":1768545133929,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642219689","type":"print"},{"value":"9783642219696","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_17","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T19:41:28Z","timestamp":1309290088000},"page":"278-289","source":"Crossref","is-referenced-by-count":19,"title":["Hashing into Hessian Curves"],"prefix":"10.1007","author":[{"given":"Reza Rezaeian","family":"Farashahi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"17_CR2","unstructured":"Bernstein, D.J., Lange, T.: Explicit-formulas database, \n                    \n                      http:\/\/www.hyperelliptic.org\/EFD\/"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-14623-7_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"E. Brier","year":"2010","unstructured":"Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., Tibouchi, M.: Efficient indifferentiable hashing into ordinary elliptic curves. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 237\u2013254. Springer, Heidelberg (2010)"},{"issue":"4","key":"17_CR5","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Mathematics\u00a07(4), 385\u2013434 (1986)","journal-title":"Advances in Applied Mathematics"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"124","DOI":"10.7146\/math.scand.a-10433","volume":"3","author":"K. Dalen","year":"1955","unstructured":"Dalen, K.: On a theorem of Stickelberger. Math. Scand.\u00a03, 124\u2013126 (1955)","journal-title":"Math. Scand."},{"key":"17_CR7","unstructured":"Farashahi, R.R., Fouque, P.-A., Shparlinski, I., Tibouchi, M., Voloch, F.: Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Cryptology ePrint Archive, Report 2010\/539 (2010), \n                    \n                      http:\/\/eprint.iacr.org\/2010\/539"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-13013-7_15","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"R.R. Farashahi","year":"2010","unstructured":"Farashahi, R.R., Joye, M.: Efficient Arithmetic on Hessian Curves. In: Nguyen, P., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 243\u2013260. Springer, Heidelberg (2010)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1515\/JMC.2009.022","volume":"3","author":"R.R. Farashahi","year":"2009","unstructured":"Farashahi, R.R., Shparlinski, I., Voloch, F.: On hashing into elliptic curves. J. Math. Cryptology\u00a03, 353\u2013360 (2009)","journal-title":"J. Math. Cryptology"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-14712-8_5","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2010","author":"P.-A. Fouque","year":"2010","unstructured":"Fouque, P.-A., Tibouchi, M.: Estimating the size of the image of deterministic hash functions to elliptic curves. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol.\u00a06212, pp. 81\u201391. Springer, Heidelberg (2010)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-17455-1_17","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"P.-A. Fouque","year":"2010","unstructured":"Fouque, P.-A., Tibouchi, M.: Deterministic encoding and hashing to odd hyperelliptic curves. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 265\u2013277. Springer, Heidelberg (2010)"},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1515\/crll.1844.28.68","volume":"10","author":"O. Hesse","year":"1844","unstructured":"Hesse, O.: \u00dcber die Elimination der Variabeln aus drei algebraischen Gleichungen vom zweiten Grade mit zwei Variabeln. Journal F\u00fcr Die Reine und Angewandte Mathematik\u00a010, 68\u201396 (1844)","journal-title":"Journal F\u00fcr Die Reine und Angewandte Mathematik"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-77026-8_11","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"H. Hisil","year":"2007","unstructured":"Hisil, H., Carter, G., Dawson, E.: New formul\u00e6 for efficient elliptic curve arithmetic. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 138\u2013151. Springer, Heidelberg (2007)"},{"key":"17_CR14","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Faster group operations on elliptic curves. In: Brankovic, L., Susilo, W. (eds.) AISC 2009, vol.\u00a098, pp. 7\u201319 (2009)"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-03356-8_18","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"T. Icart","year":"2009","unstructured":"Icart, T.: How to hash into elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 303\u2013316. Springer, Heidelberg (2009)"},{"issue":"5","key":"17_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D.P. Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev.\u00a026(5), 5\u201326 (1996)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-44709-1_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"M. Joye","year":"2001","unstructured":"Joye, M., Quisquater, J.-J.: Hessian elliptic curves and side-channel attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 402\u2013410. Springer, Heidelberg (2001)"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-17455-1_18","volume-title":"Pairing-Based Cryptography - Pairing 2010","author":"J.-G. Kammerer","year":"2010","unstructured":"Kammerer, J.-G., Lercier, R., Renault, G.: Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol.\u00a06487, pp. 278\u2013297. Springer, Heidelberg (2010)"},{"key":"17_CR19","volume-title":"Finite fields","author":"R. Lidl","year":"1997","unstructured":"Lidl, R., Niederreiter, H.: Finite fields. Cambridge University Press, Cambridge (1997)"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/11792086_36","volume-title":"Algorithmic Number Theory","author":"A. Shallue","year":"2006","unstructured":"Shallue, A., van de Woestijne, C.: Construction of rational points on elliptic curves over finite fields. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol.\u00a04076, pp. 510\u2013524. Springer, Heidelberg (2006)"},{"key":"17_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-44709-1_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"N.P. Smart","year":"2001","unstructured":"Smart, N.P.: The hessian form of an elliptic curve. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 118\u2013125. Springer, Heidelberg (2001)"},{"key":"17_CR22","unstructured":"Stickelberger, L.: \u00dcber eine neue Eigenschaft der Diskriminanten algebraischer Zahlk\u00f6rper. In: Verh. 1 Internat. Math. Kongresses, Z\u00fcrich, Leipzig, pp. 182\u2013193 (1897)"},{"key":"17_CR23","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.2140\/pjm.1962.12.1099","volume":"19","author":"R.G. Swan","year":"1962","unstructured":"Swan, R.G.: Factorization of Polynomials over Finite Fields. Pac. J. Math.\u00a019, 1099\u20131106 (1962)","journal-title":"Pac. J. Math."},{"issue":"2","key":"17_CR24","doi-asserted-by":"publisher","first-page":"97","DOI":"10.4064\/ba55-2-1","volume":"55","author":"M. Ulas","year":"2007","unstructured":"Ulas, M.: Rational points on certain hyperelliptic curves over finite fields. Bull. Polish Acad. Sci. Math.\u00a055(2), 97\u2013104 (2007)","journal-title":"Bull. Polish Acad. Sci. Math."},{"key":"17_CR25","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1006\/ffta.1997.0191","volume":"3","author":"U. Vishne","year":"1997","unstructured":"Vishne, U.: Factorization of Trinomials over Galois Fields of Characteristic 2. Finite Fields and Their Applications\u00a03, 370\u2013377 (1997)","journal-title":"Finite Fields and Their Applications"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T15:31:28Z","timestamp":1553873488000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}