{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:26:39Z","timestamp":1773231999161,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642349300","type":"print"},{"value":"9783642349317","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34931-7_22","type":"book-chapter","created":{"date-parts":[[2012,12,5]],"date-time":"2012-12-05T22:24:04Z","timestamp":1354746244000},"page":"378-398","source":"Crossref","is-referenced-by-count":7,"title":["Efficient Arithmetic on Elliptic Curves in Characteristic 2"],"prefix":"10.1007","author":[{"given":"David","family":"Kohel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-540-76900-2_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Faster Addition and Doubling on Elliptic Curves. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 29\u201350. Springer, Heidelberg (2007)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards Curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 389\u2013405. Springer, Heidelberg (2008)"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1016\/j.jnt.2010.06.015","volume":"131","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Lange, T.: A complete set of addition laws for incomplete Edwards curves. J. Number Theory\u00a0131, 858\u2013872 (2011)","journal-title":"J. Number Theory"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-540-85053-3_16","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Lange, T., Rezaeian Farashahi, R.: Binary Edwards Curves. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol.\u00a05154, pp. 244\u2013265. Springer, Heidelberg (2008)"},{"key":"22_CR5","unstructured":"Bernstein, D.J., Kohel, D., Lange, T.: Twisted Hessian curves (unpublished 2009)"},{"key":"22_CR6","unstructured":"Bernstein, D.J., Lange, T.: Explicit-formulas database (2012), \n                    \n                      http:\/\/www.hyperelliptic.org\/EFD\/"},{"issue":"2","key":"22_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1006\/jnth.1995.1088","volume":"53","author":"W. Bosma","year":"1995","unstructured":"Bosma, W., Lenstra Jr., H.W.: Complete systems of two addition laws for elliptic curves. J. Number Theory\u00a053(2), 229\u2013240 (1995)","journal-title":"J. Number Theory"},{"issue":"4","key":"22_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"D.V. Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., Chudnovsky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Adv. in Appl. Math.\u00a07(4), 385\u2013434 (1986)","journal-title":"Adv. in Appl. Math."},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"22_CR10","unstructured":"Diao, O.: Quelques aspects de l\u2019arithmtique des courbes hyperelliptiques de genre 2, Ph.D. thesis, Universit\u00e9 de Rennes (2011)"},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H. Edwards","year":"2007","unstructured":"Edwards, H.: A normal form for elliptic curves. Bulletin of the American Mathematical Society\u00a044, 393\u2013422 (2007)","journal-title":"Bulletin of the American Mathematical Society"},{"issue":"2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.ffa.2008.12.006","volume":"15","author":"P. Gaudry","year":"2009","unstructured":"Gaudry, P., Lubicz, D.: The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines. Finite Fields and Their Applications\u00a015(2), 246\u2013260 (2009)","journal-title":"Finite Fields and Their Applications"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards Curves Revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 326\u2013343. Springer, Heidelberg (2008)"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-642-13013-7_15","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"R.R. Farashahi","year":"2010","unstructured":"Farashahi, R.R., Joye, M.: Efficient Arithmetic on Hessian Curves. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 243\u2013260. Springer, Heidelberg (2010)"},{"key":"22_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The Montgomery Powering Ladder. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 291\u2013302. Springer, Heidelberg (2003)"},{"key":"22_CR16","unstructured":"Kim, K.H., Kim, S.I.: A new method for speeding up arithmetic on elliptic curves over binary fields (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2007\/181"},{"issue":"5","key":"22_CR17","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1016\/j.jnt.2010.12.001","volume":"131","author":"D. Kohel","year":"2011","unstructured":"Kohel, D.: Addition law structure of elliptic curves. Journal of Number Theory\u00a0131(5), 894\u2013919 (2011)","journal-title":"Journal of Number Theory"},{"key":"22_CR18","unstructured":"Kohel, D.: A normal form for elliptic curves in characteristic 2. In: Arithmetic, Geometry, Cryptography and Coding Theory (AGCT 2011), Luminy, talk notes (March 15, 2011)"},{"key":"22_CR19","unstructured":"Kohel, D., et al.: Echidna algorithms, v.3.0 (2012), \n                    \n                      http:\/\/echidna.maths.usyd.edu.au\/echidna\/index.html"},{"issue":"3","key":"22_CR20","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/BF01388526","volume":"79","author":"H. Lange","year":"1985","unstructured":"Lange, H., Ruppert, W.: Complete systems of addition laws on abelian varieties. Invent. Math.\u00a079(3), 603\u2013610 (1985)","journal-title":"Invent. Math."},{"key":"22_CR21","unstructured":"Magma Computational Algebra System, Computational Algebra Group, University of Sydney (2012), \n                    \n                      http:\/\/magma.maths.usyd.edu.au\/"},{"key":"22_CR22","unstructured":"Milne, J.S.: Abelian Varieties, version 2.00 (2012), \n                    \n                      http:\/\/www.jmilne.org\/math\/CourseNotes\/av.html"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P.L. Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation\u00a048, 243\u2013264 (1987)","journal-title":"Mathematics of Computation"},{"key":"22_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/3-540-36288-6_18","volume-title":"Public Key Cryptography - PKC 2003","author":"M. Stam","year":"2002","unstructured":"Stam, M.: On Montgomery-Like Representationsfor Elliptic Curves over GF(2\n                    k\n                  ). In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 240\u2013253. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - INDOCRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34931-7_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:07:51Z","timestamp":1620133671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34931-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349300","9783642349317"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34931-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}