{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:26:38Z","timestamp":1773231998998,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642349607","type":"print"},{"value":"9783642349614","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34961-4_43","type":"book-chapter","created":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T09:22:26Z","timestamp":1353057746000},"page":"718-739","source":"Crossref","is-referenced-by-count":32,"title":["Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Longa","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Sica","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-33481-8_10","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2012","author":"D.F. Aranha","year":"2012","unstructured":"Aranha, D.F., Faz-Hern\u00e1ndez, A., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.: Faster Implementation of Scalar Multiplication on Koblitz Curves. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol.\u00a07533, pp. 177\u2013193. Springer, Heidelberg (2012)"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards Curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 389\u2013405. Springer, Heidelberg (2008)"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-23951-9_9","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"D.J. Bernstein","year":"2011","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-Speed High-Security Signatures. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 124\u2013142. Springer, Heidelberg (2011)"},{"key":"43_CR4","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. In: Mangard, S., Standaert, F.-X. (eds.) Proceedings of the 12th USENIX Security Symposium. LNCS, vol.\u00a06225, pp. 80\u201394. Springer (2003)"},{"key":"43_CR5","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol.\u00a0138. Springer (1996)"},{"key":"43_CR6","first-page":"33","volume":"46","author":"G. Cornacchia","year":"1908","unstructured":"Cornacchia, G.: Su di un metodo per la risoluzione in numeri interi dell\u2019equazione \n                    \n                      \n                    \n                    $\\sum_{h=0}^nC_hx^{n-h}y^h=P$\n                  . Giornale di Mathematiche di Battaglini\u00a046, 33\u201390 (1908)","journal-title":"Giornale di Mathematiche di Battaglini"},{"key":"43_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"44","author":"H. Edwards","year":"2007","unstructured":"Edwards, H.: A normal form for elliptic curves. Bulletin of the American Mathematical Society\u00a044, 393\u2013422 (2007)","journal-title":"Bulletin of the American Mathematical Society"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-642-01001-9_30","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"S.D. Galbraith","year":"2009","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 518\u2013535. Springer, Heidelberg (2009)"},{"issue":"3","key":"43_CR9","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/s00145-010-9065-y","volume":"24","author":"S.D. Galbraith","year":"2011","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Cryptology\u00a024(3), 446\u2013469 (2011)","journal-title":"J. Cryptology"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"R.P. Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"key":"43_CR11","unstructured":"Hamburg, M.: Fast and compact elliptic-curve cryptography. Cryptology ePrint Archive, Report 2012\/309 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/2012\/309"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards Curves Revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 326\u2013343. Springer, Heidelberg (2008)"},{"issue":"3","key":"43_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s10623-011-9558-1","volume":"63","author":"Z. Hu","year":"2012","unstructured":"Hu, Z., Longa, P., Xu, M.: Implementing 4-dimensional GLV method on GLS elliptic curves with j-invariant 0. Designs, Codes and Cryptography\u00a063(3), 331\u2013343 (2012); also in Cryptology ePrint Archive, Report 2011\/315, \n                    \n                      http:\/\/eprint.iacr.org\/2011\/315","journal-title":"Designs, Codes and Cryptography"},{"key":"43_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-642-02384-2_21","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"M. Joye","year":"2009","unstructured":"Joye, M., Tunstall, M.: Exponent Recoding and Regular Exponentiation Algorithms. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol.\u00a05580, pp. 334\u2013349. Springer, Heidelberg (2009)"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Kasper, E.: Fast elliptic curve cryptography in openssl. In: 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (2011)","DOI":"10.1007\/978-3-642-29889-9_4"},{"key":"43_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"43_CR17","first-page":"513","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra Jr., H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Mathematische Ann.\u00a0261, 513\u2013534 (1982)","journal-title":"Mathematische Ann."},{"key":"43_CR18","unstructured":"Longa, P.: High-speed elliptic curve and pairing-based cryptography. PhD thesis, University of Waterloo (2011), \n                    \n                      http:\/\/hdl.handle.net\/10012\/5857"},{"key":"43_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-15031-9_6","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"P. Longa","year":"2010","unstructured":"Longa, P., Gebotys, C.: Efficient Techniques for High-Speed Elliptic Curve Cryptography. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 80\u201394. Springer, Heidelberg (2010)"},{"key":"43_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-78440-1_14","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"P. Longa","year":"2008","unstructured":"Longa, P., Miri, A.: New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. In: Cramer, R. (ed.) PKC 2008. LNCS, vol.\u00a04939, pp. 229\u2013247. Springer, Heidelberg (2008)"},{"key":"43_CR21","unstructured":"Longa, P., Sica, F.: Four-dimensional Gallant-Lambert-Vanstone scalar multiplication (full version). Cryptology ePrint Archive, Report 2011\/608 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/2011\/608"},{"key":"43_CR22","unstructured":"Morain, F.: Courbes elliptiques et tests de primalit\u00e9. PhD thesis, Universit\u00e9 de Lyon I (1990), \n                    \n                      http:\/\/www.lix.polytechnique.fr\/Articles\/english.html\n                    \n                    \n                  ; Chapter 2: On Cornacchia\u2019s algorithm (joint with J-L. Nicolas)"},{"key":"43_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-540-24847-7_26","volume-title":"Algorithmic Number Theory","author":"P.Q. Nguy\u00ean","year":"2004","unstructured":"Nguy\u00ean, P.Q., Stehl\u00e9, D.: Low-Dimensional Lattice Basis Reduction Revisited. In: Buell, D.A. (ed.) ANTS 2004. LNCS, vol.\u00a03076, pp. 338\u2013357. Springer, Heidelberg (2004)"},{"key":"43_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-36563-X_23","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"K. Okeya","year":"2003","unstructured":"Okeya, K., Takagi, T.: The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 328\u2013342. Springer, Heidelberg (2003)"},{"key":"43_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-36492-7_3","volume-title":"Selected Areas in Cryptography","author":"F. Sica","year":"2003","unstructured":"Sica, F., Ciet, M., Quisquater, J.-J.: Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 21\u201336. Springer, Heidelberg (2003)"},{"key":"43_CR26","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-540-38509-7_5","volume-title":"Modular functions of one variable, I (Proc. Internat. Summer School, Univ. Antwerp, Antwerp, 1972)","author":"H.M. Stark","year":"1973","unstructured":"Stark, H.M.: Class-numbers of Complex Quadratic Fields. In: Modular functions of one variable, I (Proc. Internat. Summer School, Univ. Antwerp, Antwerp, 1972). Lecture Notes in Mathematics, vol.\u00a0320, pp. 153\u2013174. Springer, Berlin (1973)"},{"key":"43_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-23951-9_8","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"J. Taverne","year":"2011","unstructured":"Taverne, J., Faz-Hern\u00e1ndez, A., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F., Hankerson, D., L\u00f3pez, J.: Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 108\u2013123. Springer, Heidelberg (2011)"},{"issue":"262","key":"43_CR28","first-page":"1075","volume":"77","author":"Z. Zhou","year":"2010","unstructured":"Zhou, Z., Hu, Z., Xu, M., Song, W.: Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves. Inf. Proc. Lett.\u00a077(262), 1075\u20131104 (2010)","journal-title":"Inf. Proc. Lett."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34961-4_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:08:48Z","timestamp":1620133728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34961-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642349607","9783642349614"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34961-4_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}