{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:21:39Z","timestamp":1745986899139,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642363337"},{"type":"electronic","value":"9783642363344"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36334-4_2","type":"book-chapter","created":{"date-parts":[[2013,1,31]],"date-time":"2013-01-31T00:55:13Z","timestamp":1359593713000},"page":"19-34","source":"Crossref","is-referenced-by-count":1,"title":["Factor-4 and 6 (De)Compression for Values of Pairings Using Trace Maps"],"prefix":"10.1007","author":[{"given":"Tomoko","family":"Yonemura","sequence":"first","affiliation":[]},{"given":"Taichi","family":"Isogai","sequence":"additional","affiliation":[]},{"given":"Hirofumi","family":"Muratani","sequence":"additional","affiliation":[]},{"given":"Yoshikazu","family":"Hanatani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/3-540-58691-1_48","volume-title":"Algorithmic Number Theory","author":"L.M. Adleman","year":"1994","unstructured":"Adleman, L.M.: The Function Field Sieve. In: Huang, M.-D.A., Adleman, L.M. (eds.) ANTS 1994. LNCS, vol.\u00a0877, pp. 108\u2013121. Springer, Heidelberg (1994)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management - Part 1: Genaral (Revised). Special Publication 800\/57, NIST (2007)","DOI":"10.6028\/NIST.SP.800-57p1r2007"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013220. Springer, Heidelberg (2001)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/3-540-36178-2_3","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"W. Bosma","year":"2002","unstructured":"Bosma, W., Hutton, J., Verheul, E.R.: Looking beyond XTR. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 46\u201363. Springer, Heidelberg (2002)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Giuliani, K.J., Gong, G.: Efficient Key Agreement and Signature Schemes Using Compact Representations in GF(p 10). In: ISIT 2004, p. 13. IEEE (2004)","DOI":"10.1109\/ISIT.2004.1365050"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1109\/18.796413","volume":"45","author":"G. Gong","year":"1999","unstructured":"Gong, G., Harn, L.: Public-key Cryptosystems besed on Cubic Finite Field Extensions. IEEE Trans. Inform. Theory\u00a045, 2601\u20132605 (1999)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1137\/0406010","volume":"6","author":"D. Gordon","year":"1993","unstructured":"Gordon, D.: Discrete Logarithms in GF(p) Using the Number Field Sieve. SIAM J. on Discrete Math.\u00a06, 124\u2013138 (1993)","journal-title":"SIAM J. on Discrete Math."},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0890-5401(88)90024-7","volume":"78","author":"T. Itoh","year":"1988","unstructured":"Itoh, T., Tsujii, S.: A Fast Algorithm for Computing Multiplicative Inverses in GF(2 m ) Using Normal Bases. Information and Computation\u00a078(3), 171\u2013177 (1988)","journal-title":"Information and Computation"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Algorithmic Number Theory","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 385\u2013393. Springer, Heidelberg (2000)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/11761679_16","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"A. Joux","year":"2006","unstructured":"Joux, A., Lercier, R.: The Function Field Sieve in the Medium Prime Case. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 254\u2013270. Springer, Heidelberg (2006)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/11818175_19","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"A. Joux","year":"2006","unstructured":"Joux, A., Lercier, R., Smart, N.P., Vercauteren, F.: The Number Field Sieve in the Medium Prime Case. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 326\u2013344. Springer, Heidelberg (2006)"},{"issue":"1","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jmc.2010.001","volume":"4","author":"K. Karabina","year":"2010","unstructured":"Karabina, K.: Factor-4 and 6 Compression of Cyclotomic Subgroups. J. of Mathematical Cryptology\u00a04(1), 1\u201342 (2010)","journal-title":"J. of Mathematical Cryptology"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Karabina, K.: Torus-based Compression by Factor 4 and 6. Cryptology ePrint Archive, Report 2010\/525 (2010)","DOI":"10.1515\/jmc.2010.001"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A.K. Lenstra","year":"2000","unstructured":"Lenstra, A.K., Verheul, E.R.: The XTR Public Key System. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"issue":"5","key":"2_CR15","first-page":"1234","volume":"E84-A","author":"A. Miyaji","year":"2001","unstructured":"Miyaji, A., Nakabayashi, M., Takano, S.: New Explicit Conditions of Elliptic Curve Traces for FR-Reduction. IEICE Trans.\u00a0E84-A(5), 1234\u20131243 (2001)","journal-title":"IEICE Trans."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-540-45146-4_21","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"K. Rubin","year":"2003","unstructured":"Rubin, K., Silverberg, A.: Torus-Based Cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 349\u2013365. Springer, Heidelberg (2003)"},{"key":"2_CR17","unstructured":"Sakai, R., Ohgishi, K., Kasahara, M.: Cryptsystems based on Pairing. In: SCIS 2000 (2000)"},{"issue":"10","key":"2_CR18","doi-asserted-by":"publisher","first-page":"2843","DOI":"10.1093\/ietfec\/e91-a.10.2843","volume":"E91-A","author":"M. Shirase","year":"2008","unstructured":"Shirase, M., Han, D., Hibino, Y., Kim, H., Takagi, T.: A More Compact Representation of XTR Cryptosystem. IEICE Trans.\u00a0E91-A(10), 2843\u20132850 (2008)","journal-title":"IEICE Trans."},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","first-page":"357","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"P. Smith","year":"1995","unstructured":"Smith, P., Skinner, C.: A Public-key Cryptosystem and a Digital Signature Based on the Lucas Function Analogue to Discrete Logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 357\u2013364. Springer, Heidelberg (1995)"}],"container-title":["Lecture Notes in Computer Science","Pairing-Based Cryptography \u2013 Pairing 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36334-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:58:08Z","timestamp":1745953088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36334-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642363337","9783642363344"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36334-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}